JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11 Security Guidelines     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Overview of Oracle Solaris Security

2.  Configuring Oracle Solaris Security

Installing the Oracle Solaris OS

Securing the System

How to Verify Your Packages

How to Disable Unneeded Services

How to Remove Power Management Capability From Users

How to Place a Security Message in Banner Files

How to Place a Security Message on the Desktop Login Screen

Securing Users

How to Set Stronger Password Constraints

How to Set Account Locking for Regular Users

How to Set More Restrictive umask Value for Regular Users

How to Audit Significant Events in Addition to Login/Logout

How to Monitor lo Events in Real Time

How to Remove Unneeded Basic Privileges From Users

Securing the Kernel

Configuring the Network

How to Display a Security Message to ssh Users

How to Use TCP Wrappers

Protecting File Systems and Files

How to Limit the Size of the tmpfs File System

Protecting and Modifying Files

Securing Applications and Services

Creating Zones to Contain Critical Applications

Managing Resources in Zones

Configuring IPsec and IKE

Configuring IP Filter

Configuring Kerberos

Adding SMF to a Legacy Service

Creating a BART Snapshot of the System

Adding Multilevel (Labeled) Security

Configuring Trusted Extensions

Configuring Labeled IPsec

3.  Monitoring and Maintaining Oracle Solaris Security

A.  Bibliography for Oracle Solaris Security

Securing the System

The following tasks are best performed in order. At this point, the Oracle Solaris OS is installed and only the initial user who can assume the root role has access to the system.

Task
Description
For Instructions
1. Verify the packages on the system.
Checks that the packages from the installation media are identical to the installed packages.
2. Safeguard the hardware settings on the system.
Protects hardware by requiring a password to change hardware settings.
3. Disable unneeded services.
Prevents processes that are not part of the system's required functions from running.
5. Prevent the workstation owner from powering down the system.
Prevents the Console User from shutting down or suspending the system.
6. Create a login warning message that reflects your site's security policy.
Notifies users and would-be attackers that the system is monitored.

How to Verify Your Packages

Immediately after installation, validate the installation by verifying your packages.

Before You Begin

You must assume the root role. For more information, see How to Use Your Assigned Administrative Rights in Oracle Solaris 11.1 Administration: Security Services.

  1. Run the pkg verify command.

    To keep a record, send the command output to a file.

    # pkg verify > /var/pkgverifylog
  2. Review the log for any errors.
  3. If you find errors, reinstall from the media or fix the errors.

See Also

For more information, see the pkg(1) and pkg(5) man pages. The man pages contain examples of using the pkg verify command.

How to Disable Unneeded Services

Use this procedure to disable services that are not required, given the purpose of your system.

Before You Begin

You must assume the root role. For more information, see How to Use Your Assigned Administrative Rights in Oracle Solaris 11.1 Administration: Security Services.

  1. List the online services.
    # svcs | grep network
    online         Sep_07   svc:/network/loopback:default
    ...
    online         Sep_07   svc:/network/ssh:default
  2. Disable the services that are not required by this system.

    For example, if the system is not an NFS server or a web server and the services are online, disable them.

    # svcadm disable svc:/network/nfs/server:default
    # svcadm disable svc:/network/http:apache22

See Also

For more information, see Chapter 1, Managing Services (Overview), in Managing Services and Faults in Oracle Solaris 11.1 and the svcs(1) man page.

How to Remove Power Management Capability From Users

Use this procedure to prevent users of this system from suspending the system or powering it down.

Before You Begin

You must assume the root role. For more information, see How to Use Your Assigned Administrative Rights in Oracle Solaris 11.1 Administration: Security Services.

  1. Review the contents of the Console User rights profile.
    % getent prof_attr | grep Console
    Console User:RO::Manage System as the Console User:
    profiles=Desktop Removable Media User,Suspend To RAM,Suspend To Disk,
    Brightness,CPU Power Management,Network Autoconf User;
    auths=solaris.system.shutdown;help=RtConsUser.html
  2. Create a rights profile that includes any rights in the Console User profile that you want users to retain.

    For instructions, see How to Create a Rights Profile in Oracle Solaris 11.1 Administration: Security Services.

  3. Comment out the Console User rights profile in the /etc/security/policy.conf file.
    #CONSOLE_USER=Console User
  4. Assign users the rights profile that you created in Step 2.
    # usermod -P +new-profile username

See Also

For more information, see policy.conf File in Oracle Solaris 11.1 Administration: Security Services and the policy.conf(4) and usermod(1M) man pages.

How to Place a Security Message in Banner Files

Use this procedure to create security messages in two banner files that reflect your site's security policy. The contents of these banner files display at local and remote login.


Note - The sample messages in this procedure do not satisfy U.S. government requirements and likely do not satisfy your security policy. Best practice is to consult with your company's legal counsel about the content of the security message.


Before You Begin

You must become an administrator who is assigned the Administrator Message Edit rights profile. For more information, see How to Use Your Assigned Administrative Rights in Oracle Solaris 11.1 Administration: Security Services.

  1. Add a security message to the /etc/issue file.
    $ pfedit /etc/issue
          ALERT   ALERT   ALERT   ALERT   ALERT
    
    This machine is available to authorized users only.
    
    If you are an authorized user, continue. 
    
    Your actions are monitored, and can be recorded.

    The login command displays the contents of /etc/issue before authentication, as do the the telnet and FTP services. To enable other applications to use this file, see How to Display a Security Message to ssh Users and How to Place a Security Message on the Desktop Login Screen.

    For more information, see the issue(4) and pfedit(1M) man pages.

  2. Add a security message to the /etc/motd file.
    $ pfedit /etc/motd
    This system serves authorized users only. Activity is monitored and reported.

    In Oracle Solaris, the user's initial shell displays the contents of the /etc/motd file.

How to Place a Security Message on the Desktop Login Screen

Choose from several methods to create a security message for users to review at login.

For more information, click the System → Help menu from the desktop to bring up the GNOME Help Browser. You can also use the yelp command. Desktop login scripts are discussed in the GDM Login Scripts and Session Files section of the gdm(1M) man page.


Note - The sample message in this procedure does not satisfy U.S. government requirements and likely does not satisfy your security policy. Best practice is to consult with your company's legal counsel about the content of the security message.


Before You Begin

To create a file, you must assume the root role. To modify an existing file, you must become an administrator who is assigned the solaris.admin.edit/path-to-existing-file authorization.

Example 2-1 Creating a Short Warning Message at Desktop Login

In this example, the administrator types a short message as an argument to the zenity command in the desktop file. The administrator also uses the --warning option, which displays a warning icon with the message.

# pfedit /usr/share/gdm/autostart/LoginWindow/bannershort.desktop
[Desktop Entry]
Type=Application
Name=Banner Dialog
Exec=/usr/bin/zenity --warning --width=800  --height=150 --title="Security Message" \
--text="This system serves authorized users only. Activity is monitored and reported."
OnlyShowIn=GNOME;
X-GNOME-Autostart-Phase=Application