Previous | Table of Contents | Next |
This section describes what ASET does. You should understand each ASET task to interpret and use the reports effectively, including:
ASET report files contain messages that describe as specifically as possible any problems discovered by each ASET task. These messages can help you diagnose and correct these problems. Successful use of ASET assumes that you understand system administration and system components.
Reports are generated by the taskstat utility, which identifies the tasks that have been completed and the ones that are still running. Each completed task produces a report file. For a complete description of the taskstat utility, refer to the taskstat(1M) manual page.
You set up tasks and choose the files to be checked for each security level by setting environment variables in the User Configurable Parameters part of the /usr/aset/asetenv script:
########################################### # # # User Configurable Parameters # # # ########################################### CKLISTPATH_LOW=${ASETDIR}/tasks:${ASETDIR}/util:${ASETDIR}/masters:/etc CKLISTPATH_MED=${CKLISTPATH_LOW}:/usr/bin:/usr/ucb CKLISTPATH_HIGH=${CKLISTPATH_MED}:/usr/lib:/sbin:/usr/sbin:/usr/ucblib YPCHECK=false UID_ALIASES=${ASETDIR}/masters/uid_aliases PERIODIC_SCHEDULE="0 0 * * *" TASKS="firewall env sysconf usrgrp tune cklist eeprom"
For more information about ASET environment variables, see "ASET Environment File (asetenv)" on page 463.
The tune task sets the permissions on system files to the security level you designate. It is run when the system is installed. If you decide later to alter the previously established levels, you must run this task again. At low security, the permissions are set to values that are appropriate for an open information-sharing environment. At medium security, the permissions are tightened to produce adequate security for most environments. At high security, they are tightened to severely restrict access.
Any modifications that this task makes to system files permissions or parameter settings are reported in the tune.rpt file.
The cklist task examines system files and compares each one with a description of that file listed in a master file. The master file is created the first time ASET runs the task. The master file contains the system file settings enforced by cklist for the specified security level.
ASET defines a default list of directories whose files are to be checked for each security level. You can use the default list or you can modify it, specifying different directories for each level.
For each file, the following criteria are checked:
Any discrepancies are reported in the cklist.rpt file. This file contains the results of comparing system file size, permission, and checksum values to the master file.
The usrgrp task checks the consistency and integrity of user accounts and groups as defined in the passwd and group files. It checks the local and NIS or NIS+ password files. NIS+ password file problems are reported but not corrected.
This task checks for the following violations:
Discrepancies are reported in the usrgrp.rpt file.
The sysconf task checks various system tables, most of which are in the /etc directory:
ASET performs various checks and modifications on these files and reports all problems in the sysconf.rpt file.
The env task checks how the PATH and UMASK environment variables are set for root and other users in the /.profile, /.login, and /.cshrc files.
The results of checking the environment for security are reported in the env.rpt file.
The eeprom task checks the value of the eeprom security parameter to ensure that it is set to the appropriate security level. You can set the eeprom security parameter to:
ASET does not change the eeprom setting, but reports its recommendations in the eeprom.rpt file.
The firewall task ensures that the system can be safely used as a network relay. It protects an internal network from external public networks by setting up a dedicated system as a firewall. The firewall system separates two networks, each of which approaches the other as untrusted. The firewall setup task disables the forwarding of Internet Protocol (IP) packets and hides routing information from the external network.
The firewall task runs at all security levels, but takes action only at the highest level. If you want to run ASET at high security, but find that your system does not require firewall protection, you can eliminate the firewall task; simply remove it from the list of tasks specified by the TASKS environment variable in the asetenv file.
Any changes made by this task are reported in the firewall.rpt file.
Previous | Table of Contents | Next |