Your SlideShare is downloading. ×
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Solaris servers sec
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Solaris servers sec


Published on

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Securing Solaris Servers Randy Marchany
  • 2. General Strategy
    • Most Solaris security checklists recommend installing the minimum set of software needed to run the system.
    • Most sysadmins don’t do this.
    • General strategy
      • Remove all privilege and access and grant or enable only what is needed.
      • Enable as much system logging as possible!
  • 3. Two Strategies
    • Use the SANS Securing Solaris checklist
    • Use the Center for Internet Security Securing Solaris Benchmark
    • Use the CERT Securing Solaris Server checklist.
      • Use the SANS or CIS checklists when the CERT checklist recommends it.
  • 4. Solaris Installation
    • Disconnect the system from the net?
      • Optional
    • Download patches, other software to another machine if possible.
    • Obtain the following information
      • IP name, IP address, subnet mask, default gateway, DNS server, Domain name, Time Zone
  • 5. Solaris Installation
    • Boot time configuration
      • SANS Guide steps 1.1.1-1.1.8, Basic OS Installation
      • Step 1.1.5, select ‘other’.
    • Minimal OS installation (optional)
      • SANS Guide steps 1.2.1-1.2.7, select “system accounting”.
  • 6. Solaris Hardening
    • Remove all packages not needed for the operation of the server.
    • Verify /etc/hostname.<interface name> contains only the machine name.
    • Verify /etc/inet/hosts (aka /etc/hosts) contains the following entries:
      • localhost
      • <IP address> FQDN UQHN loghost
      • <IP address> central syslog server (optional)
  • 7. Solaris Hardening
    • Verify /etc/nsswitch.conf contains the following entry:
      • hosts: files dns
    • Verify /etc/netmasks contains:
      • <network number> <subnet mask>
      • SANS guide steps 1.3.1 – 1.35, Post Install/networking configuration
      • Pick a secure password for the root account
      • SANS guide steps 1.4.2-1.4.7, Installing Patches
  • 8. Solaris Hardening
    • Installing patches takes time, about 1 hour.
    • It’s CRITICAL that you install the most current set of patches. Check security patches at least once a month. Use tools like patchdiag or GASP to make installation easier.
    • Install Tripwire.
    • Install SSH
  • 9. Solaris Hardening
    • SANS Guide step 2.1.1, purging boot directories of Unnecessary Services
    • SANS Guide step 2.1.2-2.1.5, 2.1.7, 2.1.8, 2.1.9, 2.1.10
      • Set umask to 027
    • Remove all services from /etc/inet.conf
    • SANS Guide 2.2.1-2.2.5, Cleaning House
  • 10. Solaris Hardening
    • Install TCP Wrappers
    • SANS Guide 2.3.1-2.3.3, file system configuration
    • Set enhanced syslog logging
      • Set debug level for kern, user, mail, daemon, auth, syslog, lpr, news, uucp, cron, local0-7
    • SANS Guide 2.4.3-2.4.4, Additional Logging
  • 11. Solaris Hardening
    • Sendmail
      • Obtain updated sendmail kit via anonymous ftp. One such site is:
    • SANS guide 2.6.1-2.6.5
    • SANS guide 2.7.1-2.7.9, Miscellaneous