Open System Services Management and Operations Guide (G06.30+, H06.08+, J06.03+)
tftpdaccess.cf
◦ In any of various directories:
.plan
.project
sendmail.cf
◦ The /home/quotas file, used to establish user disk space quotas
Some of these files and directories also provide mechanisms that intruders can use to
compromise UNIX system security or integrity.
• The OSS file system does not provide the following UNIX features that are sometimes used to
impose security on a system:
◦ Immutable files (other than those secured read-only through normal permissions) or
append-only files
◦ Partitions within filesets
• On systems running H-series RVUs before H06.08 and G-series RVUs before G06.29, the
OSS implementation of object security does not conform to POSIX.6 draft 12, IEEE Standard
1003-1e, or IEEE Standard 1003-2c. In particular, the OSS environment does not provide
the acl() or aclsort() function calls. On systems running J-series RVUs, H06.08 and later
H-series RVUs, and G06.29 and later G-series RVUs, ACLs are supported.
• OSS file-auditing mechanisms and policies are implemented through the Guardian environment
Safeguard product instead of through such UNIX commands or utilities as:
/etc/reboot
/etc/shutdown
/etc/syslog
passwd
Access to OSS auditing logs occurs through the Safeguard audit reduction tool (SAFEART)
program. UNIX directories and files such as the following are not provided and therefore do
not require monitoring:
◦ In /var:
aculog adm/wwtmp
adm/wtmpxadm/acct
spool/atrunadm/lastlog
spool/ftpadm/loginlog
sulogadm/messages
vold.logadm/pacct
xferlogadm/utmp
adm/utmpx
◦ In /usr:
adm/wtmp (FTP login log)
etc/rpc.mountd (NFS access log)
lib/aliases
local/etc/http/logs/access_log
• The OSS environment uses the following files and directories that might be found on UNIX
systems:
◦ In /dev:
null
218 Managing Security