This article hasn't been updated for over 5 years. The information below may be obsolete.
Solaris Automated Security Enhancement Tool (ASET)
The Solaris ASET allows you to monitor and to control system security by automatically performing tasks that you would otherwise do manually. It can be configured for three security levels.
The ASET security package provides automated administration tools that enable you to control and monitor your system's security. You specify a security level at which to run ASET. The security levels are low, medium, and high. At each higher level, ASET's file-control functions increase to reduce file access and tighten your system security.
| Security Level |
Description |
|---|---|
| Low | ASET doesn't modify any system files, but reports on potential security weaknesses. |
| Medium | Some system files may be modified to restrict access. This should not affect system services. It will report on security weaknesses and changes performed. |
| High | Further restrictions are made to provide a secure system. System parameters are changed to provide minimal access. Most system applications should still work normally, but security is considered more important than applications at this level. |
At the highest level the checks performed by ASET are:
- Verify appropriate permissions for system files
- Verify contents of system files
- Check consistency and integrity of entries in passwd and group
- Check contents of system configuration files
- Check environment files: .profile, .cshrc, .login
- Verify appropriate eeprom settings to restrict console login access
- Disables IP packet forwarding so that the system can be used as a firewall or gateway machine
- It checks files such as:
/etc/hosts.equiv for "+" entries /etc/inetd.conf for tftp, ps, netstat, and rexd entries /etc/aliases for the decode alias /etc/default/login for root access via the CONSOLE= entry /etc/vfstab for world-readable/writable file systems /etc/dfs/dfstab for files shared without restrictions /etc/ftpusers at high security places root in this file to disallow access for root /var/adm/utmp
/var/adm/utmpxchanges world-writable access at high security level /.rhosts removes this for medium and high security levels - ASET uses the directory
/usr/asetfor its scripts and reports. Some of the scripts used to control ASET actions aretune.low,tune.medium, andtune.highin the/usr/aset/mastersdirectory, which specify file ownership and permissions. - ASET requires the package
SUNWastbe installed on the system.