usenet@mcdchg.UUCP (02/20/87)
Announcing: The Lachman Security Audit - a product from Lachman Associates. The Security Audit from LAI provides a cost effective approach to achieving a secure and protected UNIX system. The Audit detects security violations, specifies actions to correct them, and suggests procedures to reduce the threat of future security problems. The product is compatible with most versions of the UNIX operating system, including System V and 4.2/4.3BSD. Discovering security problems early can prevent the accidental or deliberate loss of critical data, an eliminate the need for costly recovery strategies. Developed by LAI, one of the world's leading UNIX system software and consulting companies, the Security Audit represents the distillation of over 10 years of experience with system security and administration. The product detects security violations and security risks in the following categories: * Logins susceptible to break-ins by intruders * Files with insufficient protection * Trojan horses and back doors * Unauthorized superuser priveleges * Illegal access through network software * Bugs allowing a breach of security The product includes source code and up to 2 days of on-site consulting to install, configure, and run the Audit for the first time, as well as addressing other security related concerns. Some of the outstanding features of the Audit include: * Password guessing - attempting to find easily guessable passwords using permutations of login name and other personal information. * Finding dangerous PATHs - similar to the DoD "trusted path" idea, this will look at user environments to make sure that the PATH is not susceptible to trojan horses. * System file checks - making sure that permissions, owner, group, and even contents of critical system and device files remain intact. * User file checks - making sure that users have protected files properly and that no copies of unauthorized files (e.g., games) have been made. * Setuid/setgid file control - making sure that there are no unauthorized or writable setuid/setgid files around the system. * Unauthorized superuser detection - finding those who are attempting to gain superuser privileges through the "su" command or zero user id. * Uucp security detection - discovering bad uucp configuration allowing remote system access to unauthorized local directories. * Common bug detection - finding bugs in system utilities that could allow a breach of security. * And many more checks for security holes and violations. The approach taken by the Lachman Security Audit was recently published in the last Uniforum Conference Proceedings (January, 1987 - An Automated Approach to UNIX System Security) and will soon be published in /usr/group's Communixations. For further technical and/or pricing information, please contact: Carol Bair Lachman Associates, Inc. 1901 N. Naper Blvd. Naperville, Illinois 60540 Outside of Illinois: 1-800-LAI-UNIX Within Illinois: (312) 505-9100