HP Host Intrusion Detection System (HIDS) manual Tip, Transport the Certificates

Models: Host Intrusion Detection System (HIDS)

1 270
Download 270 pages 6.58 Kb
Page 35
Image 35

TIP

Configuration

Setting Up the HP-UX HIDS Secure Communications

*

*They are stored in /var/opt/ids/tmp as hostname.tar.Z

*You should now transfer the bundles via a secure channel

*to the IDS agent machines.

*

*On each agent you will need to run the IDS_importAgentKeys

*script to finish the installation.

************************************************************

The agent certificate bundles are generated and stored in the files:

/var/opt/ids/tmp/myhost1.tar.Z

/var/opt/ids/tmp/myhost2.tar.Z

/var/opt/ids/tmp/15.27.43.6.tar.Z

You can automate agent certificate creation by creating a file of host names and IP addresses, one host name or IP address per line. Each entry must refer to a single IP address on an agent system. (See “Configuring a Multihomed Agent System” on page 25 for more information.)

If your file name is list_of_hosts, then the command is:

cat list_of_hosts IDS_genAgentCerts

NOTE

The IDS_genAdminKeys and IDS_genAgentCerts commands have options to provide alternate key lengths and alternate expiration dates for the administration and agent certificates. For more information, see the manpages IDS_genAdminKeys (1M) and IDS_genAgentCerts (1M). The default key length is 1024 bits. The default expiration is after 700 days.

Step 2. Transport the Certificates

 

Transfer the agent certificate bundles via a secure channel to the agent systems.

 

To securely transport the certificate bundles stored in

 

/var/opt/ids/tmp/hostname.tar.Z to each of the agent machines, you will need an

 

out-of-band secure channel. There are different ways to move your files from one

 

machine to another securely. For example, you could use encrypted PGP e-mail, a

 

portable medium (like a floppy disk or tape cassette) that you carry from the first system

 

to another, an NFS mount, or an FTP site. However, since every environment is

 

different, you will need to determine which method is best for your particular situation.

 

FTP, RCP, and unencrypted e-mail are not considered to be secure methods of

CAUTION

 

transportation; the contents of the file could be exposed to eavesdroppers which would

 

threaten the security of the communication system.

 

 

Chapter 2

23

Page 35
Image 35
HP Host Intrusion Detection System (HIDS) manual Tip, Transport the Certificates