Sponsored Content
Operating Systems AIX Is it must to enable TCB on AIX LPARs ? Post 302865495 by System Admin 77 on Friday 18th of October 2013 03:11:23 PM
Old 10-18-2013
Quote:
Originally Posted by blackrageous
It does not seem clear what you are asking. TCB stands for the trusted computing base (Trusted AIX) and it's designed to aid in the security of your system. It's also called Multi-Level Security (label-based security). In short, it tracks "objects" like files, IPC, etc to insure they aren't changed or compromised. Enabling TCB is a matter of policy for your business. You usually turn trusted aix on when you're doing an installation. Please refer to the documentation for additional information.
@ blackrageous
Thanks for your response. We did not enable the TCB (Trusted Computing Base) during installation. My question was " is it MUST to enable TCB on AIX LPARs"
Qn) If yes or no, in what case / situation ?

---------- Post updated at 03:11 PM ---------- Previous update was at 03:03 PM ----------

Quote:
Originally Posted by bakunin
In fact this is the only point in time where you can switch it on. TCB creates checksums for every file and because the status of a file can only be verified to be uncompromised during an original install this is the only place/time to switch it on. Further, switching on TCB will prevent any further update and/or alt_disk_install of the system because of exactly this fact. (You can indeed do updates but these will disable TCB in the process.)

Best practice is to stay clear of TCB because it creates more problems than it solves, but this is common sense - don't argue that way with managers, only with technical persons.



Yes - and i do not have a wheel chair. Not, because i could not get one, but because i do not need one. There are no known viruses for AIX in existence and as long as you follow best practices for administrating AIX systems (for instance, using "root" only for administration, ...) there is no way a virus could affect them. Affording every system to have virus scanners is a plan usually hatched by managers who do not understand the difference between their Windoze-laptop and an AIX-LPAR.

Do not try to educate them (if they could be brought to thinking they wouldn't be in the position they are). The best way to deal with them is to silently ignore them.

I hope this helps.

bakunin

@ bakunin

Thanks much for your explanation. Its sensible and understood. I just want to give some info from my side before i conclude this topic.

We've installed AIX 7.1 (standard edition). and everything seems to be working fine (as we expected). As i said earlier we do not enable accounting/auditing, TCB and no anti-virus.
I just want to confirm , that this is normal and its not must have TCB/anti-virus.
appreciate your help.

Thanks,
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

regular user - enable printer - aix unix

how can I let a regular user enable a printer? (0 Replies)
Discussion started by: naes
0 Replies

2. AIX

AIX and TCB

Hi I have a question with regards to AIX 5.3 & TCB. I have a client that is requesting TCB to be installed in AIX. However it seems that the perception of TCB is that it causes major headaches when it comes to configuring the system in real world environments, such as large scale Oracle... (15 Replies)
Discussion started by: kimyo
15 Replies

3. AIX

Implementing a TCB-Environment in AIX

Habe folgende Frage an der ich mich schwer tue, Welche Möglichkeiten bietet IBM's Betriebssystem "AIX" hinsichtlich der Ausbildung einer TCB-Umgebung? vielen Dank (6 Replies)
Discussion started by: Invisibleye86
6 Replies

4. AIX

Enable send email through smtp - exchange on AIX 6.1

Please help, i can not to send email from AIX 6.1 to outside network through STMP - Exchange. Any one can help ? (1 Reply)
Discussion started by: ichsan
1 Replies

5. AIX

Enable large filesize option in NFS mount in AIX 4.3

Hi All, I have a NFS mount filesystem, however it is not supporting a creation of filesize greater than 2 GB in it, how can i enable the option (bf = true) in it. The AIX version is 4.3.2 Thanks in Advance!! (1 Reply)
Discussion started by: mad_man12
1 Replies

6. AIX

How to enable command history in AIX 6

Hi Friends, I am using AIX 6 with ksh shell, i am not able to get the commands histroy which was used earlier by pressing up and down arrow keys. Could you please help me to enable the history for ksh shell in AIX 6 OS. Thanks in Advance. Siva Kumar. (3 Replies)
Discussion started by: sivakumarl
3 Replies

7. AIX

Creating LPARS in AIX

Hi, I have a p520 with 2 cpus and 10gb of ram.Is it sufficient enough to create 2 lpars.What other things we have to check. (2 Replies)
Discussion started by: sekar52
2 Replies

8. AIX

Automation of AIX LPARs reboot

Hello Everyone, Can you please help me with the following questions regarding recycling LPARs. 1) Is it recommended to automate the reboot of AIX LPARs with a script ? i mean we've few App LPARs and Database LPARs. we would like to bring down LPARs on last sunday of every month for about 1... (4 Replies)
Discussion started by: System Admin 77
4 Replies

9. AIX

Privacy enable on SNMPv3 AIX)

I have SNMPv3 working on our server but when viewed from the security software, it shows no privacy enabled AIX 7.1, TL1, snmp.crypto 6.1.2.0 installed, ran snmpv3_ssw -e Unsure what I have configured wrong. What is needed to show Privacy in AIX. I looked at a config on a Solaris box... (5 Replies)
Discussion started by: anrivera140
5 Replies

10. AIX

Changing VLAN on AIX lpars in the same subnet

Hi Guys, Our lpars is currently running on 2 different vlans (20, 30). Now we have a requirement that vlan 30 needs to be change to vlan 31 at the same subnet. I'm not sure on what is the best approach for this or what change is involve on the AIX side. This is our setup. Network switch -... (5 Replies)
Discussion started by: kaelu26
5 Replies
audit_event(4)							   File Formats 						    audit_event(4)

NAME
audit_event - audit event definition and class mapping SYNOPSIS
/etc/security/audit_event DESCRIPTION
/etc/security/audit_event is a user-configurable ASCII system file that stores event definitions used in the audit system. As part of this definition, each event is mapped to one or more of the audit classes defined in audit_class(4). See audit_control(4) and audit_user(4) for information about changing the preselection of audit classes in the audit system. Programs can use the getauevent(3BSM) routines to access audit event information. The fields for each event entry are separated by colons. Each event is separated from the next by a <NEWLINE>.Each entry in the audit_event file has the form: number:name:description:flags The fields are defined as follows: number Event number. Event number ranges are assigned as follows: 0 Reserved as an invalid event number. 1-2047 Reserved for the Solaris Kernel events. 2048-32767 Reserved for the Solaris TCB programs. 32768-65535 Available for third party TCB applications. System administrators must not add, delete, or modify (except to change the class mapping), events with an event number less than 32768. These events are reserved by the system. name Event name. description Event description. flags Flags specifying classes to which the event is mapped. Classes are comma separated, without spaces. Obsolete events are commonly assigned to the special class no (invalid) to indicate they are no longer generated. Obsolete events are retained to process old audit trail files. Other events which are not obsolete may also be assigned to the no class. EXAMPLES
Example 1: Using the audit_event File The following is an example of some audit_event file entries: 7:AUE_EXEC:exec(2):ps,ex 79:AUE_OPEN_WTC:open(2) - write,creat,trunc:fc,fd,fw 6152:AUE_login:login - local:lo 6153:AUE_logout:logout:lo 6154:AUE_telnet:login - telnet:lo 6155:AUE_rlogin:login - rlogin:lo ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability | See below | +-----------------------------+-----------------------------+ The file format stability is evolving. The file content is unstable. FILES
/etc/security/audit_event SEE ALSO
bsmconv(1M), getauevent(3BSM), audit_class(4), audit_control(4), audit_user(4) NOTES
This functionality is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information. SunOS 5.10 6 Jan 2003 audit_event(4)
All times are GMT -4. The time now is 04:53 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy