JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11 Security Guidelines     Oracle Solaris 11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Overview of Oracle Solaris 11 Security

2.  Configuring Oracle Solaris 11 Security

Installing the Oracle Solaris OS

Securing the System

Verify Your Packages

Disable Unneeded Services

Remove Power Management Capability From Users

Place Security Message in Banner Files

Place Security Message on the Desktop Login Screen

Securing Users

Set Stronger Password Constraints

Set Account Locking for Regular Users

Set More Restrictive umask Value for Regular Users

Audit Significant Events in Addition to Login/Logout

Monitor lo Events in Real Time

Remove Unneeded Basic Privileges From Users

Securing the Kernel

Configuring the Network

Display Security Message to ssh and ftp Users

Disable the Network Routing Daemon

Disable Broadcast Packet Forwarding

Disable Responses to Echo Requests

Set Strict Multihoming

Set Maximum Number of Incomplete TCP Connections

Set Maximum Number of Pending TCP Connections

Specify a Strong Random Number for Initial TCP Connection

Reset Network Parameters to Secure Values

Protecting File Systems and Files

Protecting and Modifying Files

Securing Applications and Services

Creating Zones to Contain Critical Applications

Managing Resources in Zones

Configuring IPsec and IKE

Configuring IP Filter

Configuring Kerberos

Adding SMF to a Legacy Service

Creating a BART Snapshot of the System

Adding Multilevel (Labeled) Security

Configuring Trusted Extensions

Configuring Labeled IPsec

3.  Monitoring and Maintaining Oracle Solaris 11 Security

A.  Bibliography for Oracle Solaris Security

Securing the System

The following tasks are best performed in order. At this point, the Oracle Solaris 11 OS is installed and only the initial user who can assume the root role has access to the system.

Task
Description
For Instructions
1. Verify the packages on the system.
Checks that the packages from the installation media are identical to the installed packages.
2. Safeguard the hardware settings on the system.
Protects hardware by requiring a password to change hardware settings.
3. Disable unneeded services.
Prevents processes that are not part of the system's required functions from running.
4. Require device allocation.
Prevents the use of removable media without explicit authorization. Devices include microphones, USB drives, and CDs.
5. Prevent the workstation owner from powering down the system.
Prevents the Console User from shutting down or suspending the system.
6. Create a login warning message that reflects your site's security policy.
Notifies users and would-be attackers that the system is monitored.

Verify Your Packages

Immediately after installation, validate the installation by verifying your packages.

Before You Begin

You must be in the root role.

  1. Run the pkg verify command.

    To keep a record, send the command output to a file.

    # pkg verify > /var/pkgverifylog
  2. Review the log for any errors.
  3. If you find errors, reinstall from the media or fix the errors.

See Also

For more information, see the pkg(1) and pkg(5) man pages. The man pages contain examples of using the pkg verify command.

Disable Unneeded Services

Use this procedure to disable services that are not required, given the purpose of your system.

Before You Begin

You must be in the root role.

  1. List the online services.
    # svcs | grep network
    online         Sep_07   svc:/network/loopback:default
    ...
    online         Sep_07   svc:/network/ssh:default
  2. Disable the services that are not required by this system.

    For example, if the system is not an NFS server or a web server and the services are online, disable them.

    # svcadm disable svc:/network/nfs/server:default
    # svcadm disable svc:/network/http:apache22

See Also

For more information, see Chapter 6, Managing Services (Overview), in Oracle Solaris Administration: Common Tasks and the svcs(1) man page.

Remove Power Management Capability From Users

Use this procedure to prevent users of this system from suspending the system or powering it down.

Before You Begin

You must be in the root role.

  1. Review the contents of the Console User rights profile.
    % getent prof_attr | grep Console
    Console User:RO::Manage System as the Console User:
    profiles=Desktop Removable Media User,Suspend To RAM,Suspend To Disk,
    Brightness,CPU Power Management,Network Autoconf User;
    auths=solaris.system.shutdown;help=RtConsUser.html
  2. Create a rights profile that includes any rights in the Console User profile that you want users to retain.

    For instructions, see How to Create or Change a Rights Profile in Oracle Solaris Administration: Security Services.

  3. Comment out the Console User rights profile in the /etc/security/policy.conf file.
    #CONSOLE_USER=Console User
  4. Assign users the rights profile that you created in Step 2.
    # usermod -P +new-profile username

See Also

For more information, see policy.conf File in Oracle Solaris Administration: Security Services and the policy.conf(4) and usermod(1M) man pages.

Place Security Message in Banner Files

Use this procedure to create warning messages that reflect your site's security policy. The contents of these files display at local and remote login.


Note - The sample messages in this procedure do not satisfy U.S. government requirements and likely do not satisfy your security policy.


Before You Begin

You must be in the root role. Best practice is to consult with your company's legal counsel about the content of the security message.

  1. Type a security message into the /etc/issue file.
    # vi /etc/issue
          ALERT   ALERT   ALERT   ALERT   ALERT
    
    This machine is available to authorized users only.
    
    If you are an authorized user, continue. 
    
    Your actions are monitored, and can be recorded.

    For more information, see the issue(4) man page.

    The telnet program displays the contents of the /etc/issue file as its login message. For use of this file by other applications, see Display Security Message to ssh and ftp Users and Place Security Message on the Desktop Login Screen.

  2. Add a security message to the /etc/motd file.
    # vi /etc/motd
    This system serves authorized users only. Activity is monitored and reported.

Place Security Message on the Desktop Login Screen

Choose from several methods to create a security message for users to review at login.

For more information, click the System > Help menu on the desktop to bring up the GNOME Help Browser. You can also use the yelp command. Desktop login scripts are discussed in the GDM Login Scripts and Session Files section of the gdm(1M) man page.


Note - The sample message in this procedure does not satisfy U.S. government requirements and likely does not satisfy your security policy.


Before You Begin

You must be in the root role. Best practice is to consult with your company's legal counsel about the content of the security message.

Example 2-1 Creating a Short Warning Message at Desktop Login

In this example, the administrator types a short message as an argument to the zenity command in the desktop file. The administrator also uses the --warning option, which displays a warning icon with the message.

# vi /usr/share/gdm/autostart/LoginWindow/bannershort.desktop
[Desktop Entry]
Type=Application
Name=Banner Dialog
Exec=/usr/bin/zenity --warning --width=800  --height=150 --title="Security Message" \
--text="This system serves authorized users only. Activity is monitored and reported."
OnlyShowIn=GNOME;
X-GNOME-Autostart-Phase=Application