Avaya Call Management System
Security
                             Release 16.2
                           November 2010
© 2010 Avaya Inc. All Rights Reserved.                                               Preventing toll fraud
                                                                                     "Toll fraud" is the unauthorized use of your telecommunications system by an
Notice
                                                                                     unauthorized party (for example, a person who is not a corporate employee,
While reasonable efforts were made to ensure that the information in this            agent, subcontractor, or is not working on your company's behalf). Be aware
document was complete and accurate at the time of printing, Avaya Inc. can           that there can be a risk of toll fraud associated with your system and that, if toll
assume no liability for any errors. Changes and corrections to the information       fraud occurs, it can result in substantial additional charges for your
in this document might be incorporated in future releases.                           telecommunications services.
Documentation disclaimer                                                             Avaya fraud intervention
Avaya Inc. is not responsible for any modifications, additions, or deletions to      If you suspect that you are being victimized by toll fraud and you need technical
the original published version of this documentation unless such modifications,      assistance or support, call Technical Service Center Toll Fraud Intervention
additions, or deletions were performed by Avaya. Customer and/or End User            Hotline at +1-800-643-2353 for the United States and Canada. For additional
agree to indemnify and hold harmless Avaya, Avaya's agents, servants and             support telephone numbers, see the Avaya Support Web site:
employees against all claims, lawsuits, demands and judgments arising out of,
                                                                                     http://www.avaya.com/support
or in connection with, subsequent modifications, additions or deletions to this
documentation to the extent made by the Customer or End User.                        Trademarks
Link disclaimer                                                                      Avaya and the Avaya logo are either registered trademarks or trademarks of
                                                                                     Avaya Inc. in the United States of America and/or other jurisdictions.
Avaya Inc. is not responsible for the contents or reliability of any linked Web
sites referenced elsewhere within this documentation, and Avaya does not             All other trademarks are the property of their respective owners.
necessarily endorse the products, services, or information described or offered
                                                                                     Downloading documents
within them. We cannot guarantee that these links will work all the time and we
have no control over the availability of the linked pages.                           For the most current versions of documentation, see the Avaya Support Web
                                                                                     site:
Warranty                                                                             http://www.avaya.com/support
Avaya Inc. provides a limited warranty on this product. Refer to your sales
agreement to establish the terms of the limited warranty. In addition, Avaya’s       Avaya support
standard warranty language, as well as information regarding support for this        Avaya provides a telephone number for you to use to report problems or to ask
product, while under warranty, is available through the Avaya Support Web            questions about your product. The support telephone number
site:                                                                                is 1-800-242-2121 in the United States. For additional support telephone
http://www.avaya.com/support                                                         numbers, see the Avaya Support Web site:
                                                                                     http://www.avaya.com/support
License
USE OR INSTALLATION OF THE PRODUCT INDICATES THE END USER'S
ACCEPTANCE OF THE TERMS SET FORTH HEREIN AND THE GENERAL
LICENSE TERMS AVAILABLE ON THE AVAYA WEB SITE
http://www.avaya.com/support/LicenseInfo ("GENERAL LICENSE TERMS").
IF YOU DO NOT WISH TO BE BOUND BY THESE TERMS, YOU MUST
RETURN THE PRODUCT(S) TO THE POINT OF PURCHASE WITHIN TEN
(10) DAYS OF DELIVERY FOR A REFUND OR CREDIT.
Avaya grants End User a license within the scope of the license types
described below. The applicable number of licenses and units of capacity for
which the license is granted will be one (1), unless a different number of
licenses or units of capacity is specified in the Documentation or other
materials available to End User. "Designated Processor" means a single
stand-alone computing device. "Server" means a Designated Processor that
hosts a software application to be accessed by multiple users. "Software"
means the computer programs in object code, originally licensed by Avaya and
ultimately utilized by End User, whether as stand-alone Products or
pre-installed on Hardware. "Hardware" means the standard hardware
Products, originally sold by Avaya and ultimately utilized by End User.
License type(s)
Designated System(s) License (DS). End User may install and use each
copy of the Software on only one Designated Processor, unless a different
number of Designated Processors is indicated in the Documentation or other
materials available to End User. Avaya may require the Designated
Processor(s) to be identified by type, serial number, feature key, location or
other specific designation, or to be provided by End User to Avaya through
electronic means established by Avaya specifically for this purpose.
Concurrent User License (CU). End User may install and use the Software on
multiple Designated Processors or one or more Servers, so long as only the
licensed number of Units are accessing and using the Software at any given
time. A "Unit" means the unit on which Avaya, at its sole discretion, bases the
pricing of its licenses and can be, without limitation, an agent, port or user, an
e-mail or voice mail account in the name of a person or corporate function
(e.g., webmaster or helpdesk), or a directory entry in the administrative
database utilized by the Product that permits one user to interface with the
Software. Units may be linked to a specific, identified Server.
Copyright
Except where expressly stated otherwise, the Product is protected by copyright
and other laws respecting proprietary rights. Unauthorized reproduction,
transfer, and or use can be a criminal, as well as a civil, offense under the
applicable law.
Third-party components
Certain software programs or portions thereof included in the Product may
contain software distributed under third party agreements ("Third Party
Components"), which may contain terms that expand or limit rights to use
certain portions of the Product ("Third Party Terms"). Information identifying
Third Party Components and the Third Party Terms that apply to them is
available on the Avaya Support Web site:
http://www.avaya.com/support/ThirdPartyLicense
                                                      Contents
Preface       . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                           7
   Purpose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                             7
   Intended users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                             7
   Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                             8
   Conventions and terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                                   9
   Reasons for reissue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                              9
   Documentation Web sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                                 9
   Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                            10
Avaya CMS security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                              11
   Operating system hardening . . . . . . . . . . . . . . . . . .                                     .   .   .   .   .   .   .   .   .   .   .   .   .   .   11
     Third party security and management packages/tools . .                                           .   .   .   .   .   .   .   .   .   .   .   .   .   .   12
     Patching and patch qualification . . . . . . . . . . . . . .                                     .   .   .   .   .   .   .   .   .   .   .   .   .   .   12
     Operating System level security logs and audit trails . .                                        .   .   .   .   .   .   .   .   .   .   .   .   .   .   12
     Altering the ssh, telnet and ftp network service banners .                                       .   .   .   .   .   .   .   .   .   .   .   .   .   .   13
     Banner modifications . . . . . . . . . . . . . . . . . . . .                                     .   .   .   .   .   .   .   .   .   .   .   .   .   .   13
     E-mail and SMTP. . . . . . . . . . . . . . . . . . . . . . .                                     .   .   .   .   .   .   .   .   .   .   .   .   .   .   14
     DNS and NFS. . . . . . . . . . . . . . . . . . . . . . . . .                                     .   .   .   .   .   .   .   .   .   .   .   .   .   .   14
     User file permissions and masks . . . . . . . . . . . . . .                                      .   .   .   .   .   .   .   .   .   .   .   .   .   .   15
     Support for KVM and headless CMS systems . . . . . . .                                           .   .   .   .   .   .   .   .   .   .   .   .   .   .   15
   Authentication and session encryption . . . . . . .                            .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   15
      User authentication and authorization . . . . . .                           .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   16
      Password complexity and expiration. . . . . . .                             .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   18
         Enabling password aging . . . . . . . . . . .                            .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   18
         Using passwd_age. . . . . . . . . . . . . . .                            .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   18
      Lockouts and logging for failed logins . . . . . .                          .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   19
      Session timeouts and multiple-login prevention                              .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   20
      Encryption (including FIPS considerations) . . .                            .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   20
      Use of telnet, ftp, tftp, rsh . . . . . . . . . . . . .                     .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   20
      Using ssh within CMS . . . . . . . . . . . . . . .                          .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   21
         SSH on R12 and R13/R13.1 . . . . . . . . . .                             .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   22
   CMS application security . . . . .     .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   23
     SPI link . . . . . . . . . . . . .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   23
     Application-level audit logging      .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   24
     Backup and restore support .         .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   24
     Database security controls . .       .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   24
   Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                              25
      Physical server protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                                25
      EEPROM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                                 25
Avaya CMS R16.2 Security                                                                                                              November 2010           3
    Services security and CMS support . . . . .        .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   25
       Remote connectivity and authentication .        .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   26
       Services password management . . . . .          .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   26
       Reviewing log files. . . . . . . . . . . . .    .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   26
       Adding a firewall . . . . . . . . . . . . . .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   26
       Transmitting passwords . . . . . . . . .        .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   27
CMS version specific security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                    29
    Limiting external access to UNIX services. . . . . . . . . . . . . . . . . . . . . . . . .                                                     29
    Solaris services that can be disabled . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                    30
    Additional OS hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                    31
    Firewall traversal considerations / Open ports (R12 and later) . . . . . . . . . . . . . .                                                     32
          Optional ports: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                  32
    New security enhancements with R15 (r15ab.d and later) . . . . . . . . . . . . . . . .                                                         33
    Other (optional) scripts provided with r15ab.d and r15auxab.d . . . . . . . . . . . . .                                                        34
    Changing the default password encryption algorithm on Solaris™                                     .   .   .   .   .   .   .   .   .   .   .   35
       Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                           .   .   .   .   .   .   .   .   .   .   .   35
       Steps to Follow . . . . . . . . . . . . . . . . . . . . . . . . . .                             .   .   .   .   .   .   .   .   .   .   .   35
       Implementation . . . . . . . . . . . . . . . . . . . . . . . . . .                              .   .   .   .   .   .   .   .   .   .   .   36
       Verify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                          .   .   .   .   .   .   .   .   .   .   .   37
       Enabling long passwords in Solaris™ 10 . . . . . . . . . . . .                                  .   .   .   .   .   .   .   .   .   .   .   38
    Manual password complexity changes for R15 and Later (optional) . . . . . . . . . .                                                            39
      Changes to /etc/default/login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                    39
    Security enhancements included with R16 and later . . . . . . . . . . . . . . . . . . .                                                        41
       Basic Audit Reporting Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                    42
           BART Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                       42
           BART Manifest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                   42
           BART Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                   43
           BART Rules File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                   43
           Basic Example of using BART . . . . . . . . . . . . . . . . . . . . . . . . . . .                                                       44
       Permission and Ownership Changes . . . . . . . . . . . . . . . . . . . . . . . . .                                                          44
       Make all cron entries use umask of 077 . . . . . . . . . . . . . . . . . . . . . . . .                                                      45
       The /cms filesystem is mounted with nosuid option . . . . . . . . . . . . . . . . .                                                         45
       Modify permissions of CMS user home directories as created by CMS application                                                               46
       Optional scripted security enhancements . . . . . . . . . . . . . . . . . . . . . . .                                                       46
       Audit controls and logadm changes for rotation of audit logs . . . . . . . . . . . .                                                        47
       Controlling who can connect to the CMS system . . . . . . . . . . . . . . . . . . .                                                         48
       Restricting access to the database. . . . . . . . . . . . . . . . . . . . . . . . . . .                                                     49
4   Avaya CMS R16.2 Security                                                                                                       November 2010
Appendix A: Enabling and Disabling Services in Solaris 9 and 10 . . . . . . . . . . . . .                                    53
   Solaris 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                          53
   Service Management Facility (SMF) . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                 53
         svcs command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                54
         svcadm command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                  55
   Solaris 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   .   .   .   .   .   .   .   .   .   .   .   .   60
          The inetd configuration file . . . . . . . . . . . . . . . . .     .   .   .   .   .   .   .   .   .   .   .   .   61
          Limiting services to your machine to specific addresses            .   .   .   .   .   .   .   .   .   .   .   .   61
          To disable a network service completely . . . . . . . . .          .   .   .   .   .   .   .   .   .   .   .   .   61
   CMS permissive use support policy . . . . . . . . . . . . . . . . . . . . . . . . . . . .                                 62
   Links to Avaya security resource. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                               64
Appendix B: CMS security/Hardening offer . . . . . . . . . . . . . . . . . . . . . . . . . .                                 67
   CMS security / Hardening offer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                              67
Avaya CMS R16.2 Security                                                                             November 2010           5
6   Avaya CMS R16.2 Security   November 2010
Preface
      Avaya Call Management System (CMS) is an application for businesses and organizations that
      use Avaya communication servers to process large volumes of telephone calls using the
      Automatic Call Distribution (ACD) feature. Avaya CMS supports solutions for routing and agent
      selection, multi-site contact centers, remote agents, reporting, interfaces to other systems,
      workforce management, desktop applications, system recovery, and quality monitoring.
      Avaya CMS is part of the Operational Effectiveness solution of the Avaya Customer Interaction
      Suite.
      This section includes the following topics:
         ●   Purpose on page 7
         ●   Intended users on page 7
         ●   Overview on page 8
         ●   Conventions and terminology on page 9
         ●   Reasons for reissue on page 9
         ●   Documentation Web sites on page 9
         ●   Support on page 10
Purpose
      The purpose of this document is to describe how to implement security features in Avaya CMS.
Intended users
      This document is written for:
         ●   Avaya support personnel.
         ●   Avaya factory personnel.
         ●   Contact center administrators.
      Users of this document must be familiar with Avaya CMS and the Solaris operating system.
Avaya CMS R16.2 Security                                                         November 2010        7
Preface
Overview
      This document includes the following topics:
          ●   Avaya CMS security on page 11
              This topic discusses the common security features available in CMS across all releases.
          ●   CMS version specific security on page 29
              This topic discusses security features available in CMS in each version. It discusses in
              detail the progression in security aspects of CMS with new releases.
          ●   Enabling and Disabling Services in Solaris 9 and 10 on page 53
              This topic discusses the facilities provided by Solaris 9 and Solaris 10 to enable and
              disable system services.
8   Avaya CMS R16.2 Security                                                              November 2010
                                                                                          Conventions and terminology
Conventions and terminology
      If you see any of the following safety labels in this document, take careful note of the information
      presented.
                          !   CAUTION:
      CAUTION:                Caution statements call attention to situations that can result in harm to software,
                              loss of data, or an interruption in service.
                          !   WARNING:
      WARNING:                Warning statements call attention to situations that can result in harm to hardware
                              or equipment.
                          !   DANGER:
      DANGER:                 Danger statements call attention to situations that can result in harm to personnel.
                          !   SECURITY ALERT:
      SECURITY ALERT:         Security alert statements call attention to situations that can increase the potential
                              for unauthorized use of a telecommunications system.
Reasons for reissue
      This document includes the following update:
                 ●       Information on security features in CMS.
                        Note:
      Note:                  Oracle Corporation now owns Sun Microsystems. Instead of rebranding
                             references to Sun Microsystems with the Oracle name, all occurrences of Sun
                             and Sun Microsystems will remain as is in this document.
Documentation Web sites
      All CMS documentation can be found at http://www.avaya.com/support. New issues of CMS
      documentation will be placed on this Web site when available.
Avaya CMS R16.2 Security                                                                             November 2010     9
Preface
      Use the following Web sites to view related support documentation:
          ●   Information about Avaya products and service
              http://www.avaya.com
          ●   Sun hardware documentation
              http://docs.sun.com
Support
      Contacting Avaya technical support
      Avaya provides support telephone numbers for you to report problems or ask questions about
      your product.
      For United States support:
      1- 800- 242-2121
      For international support:
      See the Support Directory listings on the Avaya Web site.
      Escalating a technical support issue
      Avaya Global Services Escalation Management provides the means to escalate urgent service
      issues.
10   Avaya CMS R16.2 Security                                                       November 2010
Avaya CMS security
      This document covers security-related information and configuration settings in the Solaris
      Operating System and Call Management System (CMS) applications that interest customers.
      This chapter covers the following topics:
         ●   Operating system hardening on page 11
         ●   Authentication and session encryption on page 15
         ●   CMS application security on page 23
         ●   Physical Security on page 24
         ●   Services security and CMS support on page 25
Operating system hardening
      The services discussed here can be disabled by customers, business partners, or professional
      services associates. Avaya provides support for disabling services only if the
      customer-documented procedures in the administration guide have been followed. Avaya
      Professional Services also provides a security hardening offer, discussed later, that can
      upgrade CMS systems to current hardening levels. This results in additional customizable
      security scripts and features, such as preventing more than one login by a user or an automatic
      session timeout. The hardening offer is available for CMS systems r3v9 and later. CMS R15
      systems must be on load r15ab.d (r15auxab.d) or later. The only R15 load before r15ab.d was
      r15aa.m or r15auxaa.m. For more information on security features for different versions of
      CMS, see chapter CMS version specific security on page 29.
      Operating system (OS) hardening can be achieved in the following ways:
         ●   Third party security and management packages/tools on page 12
         ●   Patching and patch qualification on page 12
         ●   Operating System level security logs and audit trails on page 12
         ●   Banner modifications on page 13
         ●   E-mail and SMTP on page 14
         ●   DNS and NFS on page 14
         ●   User file permissions and masks on page 14
         ●   Support for KVM and headless CMS systems on page 15
Avaya CMS R16.2 Security                                                         November 2010      11
Avaya CMS security
Third party security and management packages/tools
      Traditionally, viruses do not target Solaris. However, several antivirus and other security
      software for Solaris are now available. Avaya does not support the use of such software on the
      CMS product as it can severely impact performance.
      The Avaya Permissive Use Support Policy for customers who require third party software to be
      installed on their CMS system is reproduced in CMS permissive use support policy on
      page 62.This policy is subject to change in the future releases of CMS.
Patching and patch qualification
      Avaya continuously monitors security alerts from a variety of sources, analyzes potential
      product impact, and posts appropriate product advisories at the Avaya Product Security Support
      web site, http://support.avaya.com/security. Customers can register at this web site to receive
      automatic notification of new and updated security advisories.
      Avaya Labs conducts research and participates in international activities of security bodies,
      creating best practices for product development groups. Products are measured against such
      best practices, and improvements regularly made based on these assessments.
      CMS includes all necessary components including security patches at the time of release.
      Avaya receives additional patch notifications from Sun Microsystems and certifies new Solaris
      OS patches. Then, Avaya assembles the Sun patch clusters and makes these available to
      customers. Avaya also updates security advisories with instructions on downloading and
      applying these certified patches when they are made available on the Avaya support Web site.
      Installation of patches is a customer responsibility unless specified otherwise in a premium
      services contract. Customers must contact services if they have questions regarding a specific
      patch.
      Only the Avaya approved Solaris patches must be installed. All Sun Solaris patches are not
      required or fit for use on the CMS system as it does not incorporate all aspects of the Solaris
      OS. Installing non-Avaya-recommended Solaris patches can cause problems with the CMS
      server.
              Note:
      Note:        Avaya approves installation of Solaris kernel patches through the baseload or
                   version upgrade process. The kernel patches are not released through any other
                   method.
Operating System level security logs and audit trails
      Log files can be used to detect suspicious system activity. The customer can review the
      following log files on a routine basis for signs of unusual activities:
12   Avaya CMS R16.2 Security                                                            November 2010
                                                                                      Operating system hardening
                   ●   /var/adm/messages. This log includes system messages (syslog), including failed login
                       attempts if auth.debug is enabled in /etc/syslog.conf.
                   ●   /var/adm/sulog. This log contains su records for access to root privileges.
                   ●   /var/cron/log. This log contains cron records for automated scripts run under the cron
                       process.
      New auditing options are discussed in the Security enhancements included with R16 and
      later on page 41.
Altering the ssh, telnet and ftp network service banners
      Altering the telnet and ftp network service banners hides operating system information from
      individuals who want to take advantage of known operating system security holes.
      To alter the telnet and ftp network service banners:
                   1. Create or edit the file /etc/default/telnetd.
                   2. Add the line:
                       BANNER="CMS OS"
                       !   Important:
      Important:           Add a blank line before and after the BANNER="CMS OS" line. If you do not, the
                           Avaya CMS system will not display the CMS OS message correctly. When users
                           either telnet or ftp to the CMS, the users will see a message similar to the
                           following example:
                   3. Save the file.
                   4. Change the file permissions to 444.
Banner modifications
      You can modify the banners displayed on login to any CMS system to obscure OS or application
      information or display legal access warnings.
      Displaying a restricted warning for telnet users performs the following functions:
                   ●   Displays your corporate policy for illegal computer activity
                   ●   Scares off individuals who want to access a system illegally
                   ●   Allows you to prosecute an individual who has illegally accessed the system
      To display a restricted warning for telnet users:
Avaya CMS R16.2 Security                                                                    November 2010    13
Avaya CMS security
         1. Create or edit the file /etc/issue
            # telnet cms_box
            Trying 192.168.1.22...
            Connected to cms_box.
            Escape character is '^]'.
            CMS OS
         2. Add a message similar to the following:
                 WARNING: This system is restricted to Company Name authorized users for
                 business purposes. Unauthorized access is a violation of the law. This system
                 may be monitored for administrative and security reasons. By proceeding, you
                 consent to this monitoring.
            When users connect to the Avaya CMS system using network services, the system
            displays the warning message. A user would see the message if they telnet into the Avaya
            CMS system.
         3. Save the file.
         4. Change the file permissions to 644.
E-mail and SMTP
      You must not configure CMS as a mail relay and not enable the Simple Mail Transfer Protocol
      (SMTP) daemon. You must reconfigure the SMTP daemon accordingly on older CMS systems
      (pre-R12).
DNS and NFS
      In general, there is no support for sharing file systems to and from CMS system and you must
      disable associated daemons on older CMS systems. If hosts.allow and hosts.deny (or
      .rhosts) files are used for access control, any servers or files that control name resolution
      (Domain Name Servers or entries in the /etc/hosts file) are under appropriate administrative
      control within the customer network. This prevents an attacker from leveraging DNS services to
      enter a system.
User file permissions and masks
      You can configure older CMS systems (pre-R12) with default file creation masks that customers
      consider excessively permissive. If this is a concern, the customer can implement the CSI
      Hardening Offer or upgrade to get the default umask set to 022. Due to limitations in the CMS
      system, a more stringent umask cannot be supported without impacting product functionality.
14   Avaya CMS R16.2 Security                                                         November 2010
                                                                       Authentication and session encryption
Support for KVM and headless CMS systems
      It has come to the attention of Avaya that several customers have requested support for
      headless and/or KVM solutions for CMS systems. CMS does not support the use of headless or
      KVM solutions for CMS systems. Use of these solutions is only by Permissive Use. See the
      Permissive Use policy in CMS permissive use support policy on page 62.
                  Note:
      Note:            If a customer insists on using a KVM for a CMS, it is suggested that they look at
                       Network Technologies Incorporated (NTI) KVM switches. The NTI brand KVM
                       switches seem to work better than other KVM switches for Sun SPARC systems.
Authentication and session encryption
      This section covers the following topics:
              ●    User authentication and authorization on page 15
              ●    Password complexity and expiration on page 17
              ●    Lockouts and logging for failed logins on page 19
              ●    Session timeouts and multiple-login prevention on page 19
              ●    Encryption (including FIPS considerations) on page 19
              ●    Use of telnet, ftp, tftp, rsh on page 20
              ●    Using ssh within CMS on page 20
User authentication and authorization
      CMS uses login and password security measures within the Solaris OS and provides multiple
      levels of system access. To authenticate users, CMS uses Solaris capabilities, based on
      Pluggable Authentication Modules (PAM). At the system level, standard UNIX permissions are
      used. Within CMS, data permissions are administered per user.
      When you create a user in Call Management System, you provide the user either administrator
      or user access rights. As an administrator, your ability to modify the configuration of a CMS
      server is limited to the feature permissions provided to you. CMS user accounts are not
      permitted to make administrative changes unless they have been given the required feature
      permissions. Ordinary CMS users are not provided OS privileges and can be limited within the
      application, to particular skills, VDN, and trunk groups. Avaya also implements feature controls
      that must be unlocked in order to access the feature.
Avaya CMS R16.2 Security                                                                November 2010      15
Avaya CMS security
      Using PAM configuration files, Solaris allows for integration with external authentication within a
      UNIX domain using a Network Integration Service (NIS or NIS+). CMS does not support add-on
      authentication packages for other external authentication services for Solaris. Use of external
      authentication can bypass local rules configured for password expiration and complexity, such
      as the settings within the two OS files /etc/passwd and /etc/shadow.
      Avaya Access Security Gateway (ASG) software can authenticate Avaya Services and other
      remote users. This mechanism supports a one-time password. The system presents the user
      with a challenge string to which they respond with a string generated by a software tool, based
      on the challenge and product identification information.
      You can define the following access permissions for each user login and password in CMS:
         ●   ACD Access: User can assign, view, delete, and modify another user's ability to gain
             access to more than one real or pseudo ACDs. You can also turn on or off the exceptions
             notification for ACDs in this window.
         ●   Feature Access: User can assign, view, or modify user access permissions for the CMS
             subsystems such as Reports, Dictionary and Exceptions and certain function key (SLK)
             menu items, such as UNIX system/Solaris system and Timetable. The access permissions
             given to a user affect what that user is able to do with CMS.
         ●   Main Menu Addition Access - User can assign, view, or modify other users' access
             permissions for the additional menu items of your choosing. These items can provide
             access to your local electronic mail environment or daily news articles about your call
             center for agents or split/skill supervisors.
16   Avaya CMS R16.2 Security                                                             November 2010
                                                                   Authentication and session encryption
         ●   Split/Skill Access - User can assign, view, modify, or delete another user's permissions to
             specific splits/skills. Split/Skill Access permissions determine your ability to access and
             administer agent/queue data for a particular split or skill. You must also turn on or off the
             exceptions notification for splits/skills in this window.
         ●   Trunk Group Access - User can assign, view, modify, or delete another user's access
             permissions to specific trunk groups. Trunk Group Access permissions determine a user's
             ability to access and administer data for a particular trunk group. You must also turn on or
             off the exceptions notification for trunk groups in this window.
         ●   User Data - User can assign CMS user IDs, specify a default printer,specify whether the
             user is an administrator, or a normal user such as a splits/skill supervisor, and administer
             the maximum number of open windows, the minimum refresh rate for real-time reports,
             and the default login ACD.
         ●   VDN Access - User can assign, view, modify, or delete another CMS user's access
             permissions to specific VDNs. VDN access permissions determine a user's ability to
             administer VDNs with the various CMS subsystems and to access report/administration
             data for VDNs.
         ●   Vector Access - User can define vector access permissions. These permissions specify
             the user's ability to administer vectors and to access report/administration data for vectors.
             Use to assign, view, modify, or delete a CMS user's access permissions to specific
             vectors.
Password complexity and expiration
      In Call Management System R9 and later, you can enable and modify the password expiration
      attributes through the CMSADM menu. You can set the expiration intervals from 1 to 52 weeks,
      and the Solaris parameters in MINWEEKS, MAXWEEKS, and WARNWEEKS. For detailed
      instructions for configuring aging, see Enabling password aging on page 17.
      Some custom integrations and configurations with scripted passwords can require careful
      application of password expiration settings. For this, you must always use the CMSADM script.
      Avaya does not recommend direct administration of password aging through Solaris.
Enabling password aging
      Password aging forces users to change their passwords on a regular basis.
Using passwd_age
      Use the passwd_age option to turn password aging on or off. If password aging is on, users will
      be prompted to enter a new password after a predetermined time interval has passed.
      Password aging is off by default.
Avaya CMS R16.2 Security                                                              November 2010      17
Avaya CMS security
                         !   CAUTION:
      CAUTION:               If you have any third party software or Avaya Professional Services (APS) offers,
                             do not turn on password aging. Contact the National Customer Care Center
                             (1-800-242-2121) or consult with your product distributor or representative to
                             ensure that password aging will not disrupt any additional applications.
      The passwd_age option will effect the passwords of all Avaya CMS users and regular UNIX
      users. When password aging is on, the Solaris policy file /etc/default/passwd is modified.
      The passwords of all Avaya CMS users that use the /usr/bin/cms shell and all UNIX users
      will age. If password aging is on when a new user is added, the user's password begins to age
      as soon as a password is entered for that account. You must exclude specific users before
      turning password aging on in order to prevent additional password administration. To prevent
      the aging of a specific user's password, see Adding and removing users from password aging
      and Troubleshooting password aging sections in Avaya CMS Software Installation,
      Maintenance and Troubleshooting.
                         !   Important:
      Important:             Non-CMS users such as root, root2, or informix will not age. Password
                             aging will not function on an Avaya CMS system that uses a NIS, NIS+, or LDAP
                             directory service. If you are using NIS, NIS+, or LDAP, contact your network
                             administrator. The passwords will need to be aged from the server running the
                             directory service.
      To use the passwd_age option:
                   1. Enter:
                        cmsadm
                        The system displays the CMSADM menu.
                   2. Select number for “passwd_age” menu item.
                        The system displays the following message:
                       Note:
      Note:                 The system will also display a message that indicates that password aging is off
                            or the current password aging schedule. You can enter q at any point to exit the
                            password aging options.
                   3. Perform one of the following actions:
                   ●    To turn password aging on:
                        a. Enter: 1
                        The system displays the following message:
                        b. Enter the number of weeks before passwords expire and users are prompted to enter
                           a new password. The range is from 1 to 52 weeks.
                   ●    To turn password aging off:
18   Avaya CMS R16.2 Security                                                                       November 2010
                                                                 Authentication and session encryption
             a. Enter: 2
             The system displays the following message:
             b. Perform one of the following actions:
                - To turn password aging off, enter: yes
                - To leave password aging on, enter: no
         ●   To change the password aging interval:
             a. Enter: 3
             The system displays the following message:
             b. Enter the number of weeks before passwords expire and users are prompted to enter
                a new password. The range is from 1 to 52 weeks.
      See the Manual password complexity changes for R15 and Later (optional) on page 39 for more
      options for R15 and later systems.
Lockouts and logging for failed logins
      CMS does not currently support account lockouts, but if you enable auth.debug in /etc/
      syslog.conf, you can log the failed login attempts in the system message log (syslog).
      R15 and later have added options that handle this to a certain extent. See Other (optional)
      scripts provided with r15ab.d and r15auxab.d on page 34.
Session timeouts and multiple-login prevention
      By default, no timeouts exist for agent or administrator login sessions on the CMS system.
      However, you can configure a cron job for this purpose. Avaya also offers a custom hardening
      service that you can use to create an equivalent function. In addition, the CSI hardening offer
      prevents a login from being used more than once concurrently.
      See more details on this hardening offer in CMS security/Hardening offer on page 67.
Encryption (including FIPS considerations)
      The CMS system has not been formally FIPS-approved but it can use FIPS-based algorithms
      and key lengths within the SSH family of protocols (ssh, sftp) as long as the SSH server and
      client configurations are set to use FIPS-approved cryptosuites (the specific algorithm is
      negotiated between client and server). Selection of an algorithm takes place at run time. SSH
      uses RSA or DSA. The default encryption used is RSA and key length of 1024 bits.
Avaya CMS R16.2 Security                                                          November 2010       19
Avaya CMS security
      Standard UNIX one-way password encryption is used within the /etc/shadow file.
      For R15 and later systems, the Standard UNIX one-way password encryption can be changed
      to the md5 method using the instructions in Changing the default password encryption algorithm
      on Solaris™ on page 35. If you have an Oracle/Sun account you can refer directly to the Oracle
      document at http://sunsolve.sun.com/search/document.do?assetkey=1-71-1001835.1-1.
Use of telnet, ftp, tftp, rsh
      Traditionally, computer-based CMS clients, such as Supervisor, Terminal Emulator, and
      Network Reporting, use telnet to interface with the CMS server. Do not use telnet for
      communication over a network because it is an insecure protocol. For example, in telnet,
      passwords are exchanged in clear text.
      Therefore, Avaya has created a secure alternative for several customers. This alternative is
      now available in CMS Supervisor R13, and later. Terminal Emulator, R15 and later, also has this
      capability. Network Reporting uses telnet as the only connection option. In the case of tftp and
      rsh, these protocols are unauthenticated (or easily spoofed). So use the secure equivalents,
      such as ssh and sftp.
      To limit interactive access, you must always provision ordinary users with the /usr/bin/cms
      shell.
Using ssh within CMS
      CMS R13 and later deliver simplified installation of a secure Supervisor client login over a public
      or unsecured network. To do this, CMS uses Secure Shell (SSH), a protocol that encrypts the
      packets sent between a client workstation and a host server. This secures the transmission of
      login information and other sensitive data.
      On the client, an SSH client package creates the SSH tunnel and does the encryption/
      decryption for the SSH connection. In addition, the Microsoft Crypto API provides the password
      encryption and decryption functionality. It protects the login/password information stored in the
      registry for automatic scripts.
      On the CMS server, the solution utilizes the Solaris SSH packages SUNWsshcu, SUNWsshdr,
      SUNWsshdu, SUNWsshr, and SUNWsshu. The following figure illustrates the connectivity
      between the various components:
20   Avaya CMS R16.2 Security                                                             November 2010
                                                                  Authentication and session encryption
      On the CMS server, you can restrict the telnet service to the local host using the following
      restrictions:
         ●   /etc/hosts.allow
             in.telnetd : localhost # allow telnet only from within the server
         ●   /etc/hosts.deny
             in.telnetd: ALL # deny all telnet except as specified in hosts.allow
      Other points to be noted:
         ●   Although the telnet service runs on the CMS server, it is configured so that any attempt to
             gain access to port 23 from outside the system results in a "connection refused" message.
             This is now true for R16.1 and later systems. Previous releases did not work properly to
             restrict the access to localhost only. See above to codify the in.telnetd line for localhost
             access only.
         ●   Multiple applications can run concurrently on the computer. You can allocate the ports
             3000, 3005, 3010, and so on as needed.
         ●   In CMS, the Windows SSH clients and SSH server negotiate the encryption algorithm,
             typically 128-bit AES (recommended) or Blowfish. A variety of industry standard
             algorithms, such as 128-bit AES, Blowfish, SHA-1, MD5, RC4, and key lengths are
             provided as a result of including an SSH client. The specific algorithm is negotiated
             between the client and the server. The U.S. government accepts all for domestic and
             international use, with certain restrictions. Selection of an algorithm takes place at run
             time. SSH uses RSA or DSA. CMS servers use SSH Protocol 2. The default encryption is
             RSA and the key length is 1024 bits. SSH uses SHA-1 or MD5 message authentication.
         ●   This SSH implementation is not available for Network Reporting or Visual Vectors.
Avaya CMS R16.2 Security                                                            November 2010     21
Avaya CMS security
              Note:
      Note:        A minor issue with ssh on R12 and R13/R13.1 systems exists. The details and a
                   workaround are noted below. This is documented in document id KB00105609.
SSH on R12 and R13/R13.1
      Description: Customer having a problem with Supervisor generating errors on SSH logins.
      Customer would like to have this error turned off, as it indicates there is a problem but they are
      not having any login problems.
      Details: Software: Call Management System (CMS) - version r3 any 12 or 13
      Avaya Supervisor (CVSUP) - SSH version
      Cause: sshd is trying to use ipv6.
      Workaround: change sshd from using both ipv4 and ipv6 to just use ipv4 on CMS.
      SSH continues to log messages until this is updated.
      The following steps are required to implement the solution:
      1) vi /etc/ssh/sshd_config
      Change:
      # IPv4 only
      #ListenAddress 0.0.0.0
      # IPv4 & IPv6
      ListenAddress ::
      to this
      # IPv4 only
      ListenAddress 0.0.0.0
      # IPv4 & IPv6
      #ListenAddress ::
      :wq!
      vi /etc/init.d/sshd
      change:
      [ -x /usr/lib/ssh/sshd ]&& /usr/lib/ssh/sshd &
      to this:
      [ -x /usr/lib/ssh/sshd ]&& /usr/lib/ssh/sshd -4 &
      2) Restart sshd
      /etc/init.d/sshd stop
      /etc/init.d/sshd start
22   Avaya CMS R16.2 Security                                                             November 2010
                                                                              CMS application security
      This issue must be resolved in CMS R14.The workaround will be implemented as part of the
      base CMS package.
CMS application security
      This section covers the following topics:
         ●   SPI link on page 23
         ●   Application-level audit logging on page 23
         ●   Backup and restore support on page 24
         ●   Database security controls on page 24
SPI link
      The SPI link is a binary (not text-based), proprietary protocol used to communicate between the
      CMS system and the Communication Manager ACD switch. Access can be controlled by IP
      address. Communication Manager sends ACD configuration information and ACD-related
      events to the CMS using this communication channel. For instance, CMS systems can use the
      SPI link to modify CM vectors, agent and VDN assignments.
Application-level audit logging
      There are several application logs with CMS. The most detailed application audit trails can be
      traced through the /cms/install/logdir/admin.log and the /cms/pbx/acd?/
      spi.err logs. The admin.log records administrative changes to the CMS application. The
      spi.err logs show the information for setting up and debugging ACD links. These logs are
      intended for support purposes, but can provide a partial audit trail for customers.
      CMS also provides the log /opt/cc/ahl/log. This log tracks changes to specific system files
      that affect the administration of the Solaris system. Example: changes to /etc/hosts are
      logged in the ahl log.
      Avaya COMPAS Document ID 90815 (R3V11 CMS Maintenance Logs Guide) provides detailed
      information regarding these log files, their formats and messages.
      The customer error log is accessible from the main CMS menu ("Error log report" under the
      maintenance menu).This log was designed to be the primary customer-facing application log,
      but does not capture the debug and trace information included in other logs, such as admin.log
      and spi.err.
Avaya CMS R16.2 Security                                                          November 2010        23
Avaya CMS security
Backup and restore support
      CMS supports direct backup to a tape system. CMS versions V11 and later support a LAN
      backup solution through the use of IBM Tivoli Backup software (see Avaya Call Management
      System LAN Backup User Guide). No other 3rd party backup software is supported on CMS,
      and backup media cannot be encrypted. It is a customer responsibility to ensure regular
      backups are successfully performed so that a restore can be successful in the event of a
      disaster.
Database security controls
      CMS users do not log into the Informix database or have any privileges within the Informix
      subsystem. High-level users and administrators can use the dbaccess utility on CMS for
      accessing data. However, ordinary users can access the database only through the CMS
      application that has its own access controls. An ISQL interface is installed on new CMS
      systems. This is an internal password-protected interface that does not have an external
      (network-facing) listener. Access to the database is provided only through inter-process
      communication (IPC), so an external exposure to the CMS database is limited to the above
      interfaces unless Openlink ODBC (port 121/tcp) is enabled. ODBC is as an option for all
      versions of CMS but is not enabled by default. The ODBC interface requires a password for all
      client connections.
      Update for R15 and later with Informix ODBC/JDBC enabled. See Restricting access to the
      database on page 49 for new dbaccess password options in R16.1 and later.
Physical Security
      The Avaya CMS system must be installed in an area restricted to persons of trust, such as a
      locked server room or data center. This section covers the following topics:
         ●   Physical server protection on page 24
         ●   EEPROM security on page 25
Physical server protection
      The keyboard, console, CD-ROM, and tape drive are all sensitive devices and can be used to
      compromise an unprotected CMS system. If the Avaya CMS system is a Sun Fire, E3x00, or
      Netra server, turn the key switch to the locked position.
24   Avaya CMS R16.2 Security                                                         November 2010
                                                                         Services security and CMS support
      Store all backup tapes and all original Avaya CMS software in a secure location on site. Store a
      copy of the backup tapes at an off site location to aid disaster recovery.
      The modem connected to the Avaya CMS system can provide secure remote access and also
      allow Avaya CMS services personnel to perform remote support. Avaya CMS systems can be
      ordered with an Access Security Gateway (ASG) to provide secure remote access.
                  Note:
      Note:            A lock and key modem will also provide secure remote access but it is no longer
                       available for purchase from Avaya.
EEPROM security
      Sun provides an EEPROM-level security mechanism for controlling access to the boot console.
      You need a password to access the boot console. For support purposes, customers must use
      other methods since a forgotten password can require hardware replacement.
Services security and CMS support
      This section covers the following topics:
              ●    Remote connectivity and authentication on page 25
              ●    Services password management on page 25
Remote connectivity and authentication
      CMS supports the Access Security Guard (ASG) software or ASG guard hardware to provide a
      one-time, challenge-response authentication for remote access. Contact your Avaya Services
      representative for options and details.
Services password management
      Avaya Services can automatically change services passwords for the CMS system under an
      active maintenance contract. Contact your Avaya Services representative for details on how to
      enable this service.
Avaya CMS R16.2 Security                                                               November 2010     25
Avaya CMS security
Reviewing log files
      Log files can be used to detect suspicious system activity. Review the following log files on a
      routine basis:
         ●   /var/adm/messages
             This log contains system messages.
         ●   /var/adm/sulog
             This log contains su records.
         ●   /var/cron/log
             This log contains cron records.
Adding a firewall
      Add a firewall on the edge of the network where the Avaya CMS system and Avaya CMS
      Supervisor clients reside. Both the Avaya CMS system and Avaya CMS Supervisor clients must
      remain behind a firewall to provide protection from the internet.
      Firewalls are commonly used to prevent denial of service attacks on application servers similar
      to the Avaya CMS system. Firewalls will also prevent snooping of sensitive data, and hijacked
      sessions from appearing as an authenticated user.
Transmitting passwords
      Do not use telnet or ftp to transmit passwords over the network in clear text. If you do so, the
      password can be snooped in transit.
26   Avaya CMS R16.2 Security                                                             November 2010
CMS version specific security
      This chapter covers the version-specific security aspects of CMS. There have been
      enhancements in CMS versions R12 and later, R15 and R16.1 in areas of operating system
      hardening that was introduced in the first chapter. The following topics explain the areas where
      these enhancements have occurred:
              ●    Limiting external access to UNIX services on page 29
              ●    Solaris services that can be disabled on page 30
              ●    Additional OS hardening on page 31
              ●    Firewall traversal considerations / Open ports (R12 and later) on page 32
              ●    New security enhancements with R15 (r15ab.d and later) on page 33
              ●    Other (optional) scripts provided with r15ab.d and r15auxab.d on page 34
              ●    Changing the default password encryption algorithm on Solaris™ on page 35
              ●    Manual password complexity changes for R15 and Later (optional) on page 39
              ●    Security enhancements included with R16 and later on page 41
Limiting external access to UNIX services
      In CMS R12 and later, the CMS security script creates the files /etc/hosts.allow and /
      etc/hosts.deny. Use these files to control which IP addresses are permitted to connect to
      the Avaya CMS system. Note that settings in /etc/hosts.allow cannot re-enable any
      services disabled through other means.
                  Note:
      Note:            /etc/hosts.allow and /etc/hosts.deny are only honored when
                       TCPWRAPPERS are enabled (which they are by default).
      For example, your actions can be to:
              ●    Deny telnet access to IP addresses outside the company firewall
              ●    Permit SSH connections from IP addresses outside the company firewall
              ●    Only permit SSH connections.
      Detailed instructions for modifying services configuration files are found in Controlling who can
      connect to the CMS system on page 48.
Avaya CMS R16.2 Security                                                                November 2010   29
CMS version specific security
Solaris services that can be disabled
      On CMS systems prior to R12, the network services listed below are not required for standard
      CMS operations and can be disabled. For CMS systems R12 and later, these unnecessary
      services have been disabled by default. Note that custom scripts or other custom integration
      added after installation as part of an Avaya Professional Services Offer can require more than
      one of these services. The following network services are allowed to be disabled when not
      required for customized integration:
         ●   Services can be enabled or disabled using information in Appendix A.
         ●   Cache File System
         ●   CDE Calendar (rpc.cmsd)
         ●   CDE Desktop Subprocess Control Daemon (remote CDE support - 6112/tcp)
         ●   Chargen (19/tcp, 19/udp)
         ●   Daytime (13/tcp, 13/udp)
         ●   Discard (9/tcp, 9/udp)
         ●   Echo (network echo - 7/tcp, 7/udp)
         ●   Finger (79/tcp)
         ●   FTP (inbound - 21/tcp)
         ●   Kerberos V5 Warning Message Daemon (88/tcp, 88/udp)
         ●   Name (42/udp)
         ●   NFS Server (2049/tcp, 2049/udp)
         ●   NFS Client (lockd - 4045/tcp, 4045/udp)
         ●   NIS Client
         ●   OCF (Smart card) Daemon
         ●   Printer (Network printing services, local printing is enabled - 515/tcp)
         ●   Rexec (512/tcp)
         ●   Syslog (514/udp)
         ●   Rsh (514/tcp)
         ●   Rlogin (513/tcp)
         ●   Metastat Remote Services
         ●   Sadmind (distributed sys admin agent)
         ●   Sendmail (inbound - 25/tcp)
         ●   Spray (100012/tcp, 100012/udp)
30   Avaya CMS R16.2 Security                                                           November 2010
                                                                                Additional OS hardening
         ●   Sun Font Server (7100/tcp)
         ●   Sun ToolTalk Database Server
         ●   Talk (517/tcp)
         ●   UUCP Network services (540/tcp)
         ●   Time Service (37/tcp, 37/udp)
         ●   Wall
      Disabling some of these services can interfere with network-related troubleshooting activities
      such as echo, and network monitoring tools.
      Telnet (23/tcp) cannot be disabled even if ssh has been configured for clients, but it can be
      restricted to the local host so that it does not respond externally.
Additional OS hardening
      On CMS R12 and later systems, root logins are only permitted on the console. In addition, cron
      is limited to users root, sys, lp, adm, and cmssvc, while at is limited to root, sys, and
      cmssvc. The umask for system daemons is set to 022. Customers running older versions of
      CMS must upgrade to the latest version to benefit from the more limited umask settings.
      Otherwise, a custom Avaya Professional Services offer must be pursued for older system
      umask changes.
      In addition:
         ●   The system stack is non executable.
         ●   TCP sequence numbers are more difficult to determine (prevents packet snooping).
         ●   TCP Wrappers are installed and enabled.
         ●   Remote CDE sessions are disabled.
         ●   Remote DT login is disabled.
         ●   Ordinary users do not have interactive shell accounts unless the privilege is granted within
             CMS user permissions.
Avaya CMS R16.2 Security                                                            November 2010      31
CMS version specific security
Firewall traversal considerations / Open ports (R12 and
later)
      The CMS system can be placed behind a packet filtering firewall, although no support for such
      configurations is provided (especially when Network Address Translation (NAT) takes place).
      See below for a list of port requirements for various aspects of CMS operations. Note that many
      CMS systems receive additional customization and configuration that can add to this list or
      make some optional items mandatory.
      Also note that ports administered for the ACDs can be changed (default is 5001-5009)
         ●   22/tcp ssh (optional, can be used by Supervisor, clients)
         ●   23/tcp telnet (used by Supervisor; optional for Terminal Emulator)
         ●   111/tcp/udp sunrpc (required by CDE)
         ●   5001-5009/tcp (used by switch CLAN connection to the ACD)
         ●   32771-32777/tcp/udp (sometimes used by rps-X, sunrpc)
Optional ports:
         ●   21/tcp: ftp, used by a CSI (customized configuration) offer
         ●   25/smtp: sendmail, used by a CSI offer
         ●   37/tcp time: used by a CSI offer
         ●   121/tcp erpc: used by Openlink ODBC for the optional CMS data report capability (CMS
             R14.1 and earlier systems)
         ●   514/tcp: rsh, used by the High Availability option for the admin-sync utility (CSI offer) Also
             required for remote tape copy (provisioning)
         ●   540/tcp: uucp, used by the External Call History (ECH) interface
         ●   4008/tcp: required for Avaya Visual Vectors Server
         ●   9100/tcp, udp: hp-printers
         ●   515/tcp, udp: Printer server
         ●   6060: Geotel
         ●   9999: CVLan
         ●   9980: Link Admin
         ●   5678: Definity LAN Gateway
         ●   5011/5012: ASAI
         ●   5000 - 5020: OpenLink ODBC (CMS R14.1 and earlier systems)
32   Avaya CMS R16.2 Security                                                              November 2010
                                                      New security enhancements with R15 (r15ab.d and later)
                  Note:
      Note:            Older systems use 4000-range ports. The ACD integration ports are different if
                       the 5000-5009 range is used."
              ●    50000 - 50001/tcp: Informix ODBC Connections (CMS R15 and later, can be enabled for
                   earlier releases, but uncommon)
              ●    60001/udp: OpenLink ODBC Connection Setup (CMS R14.1 and earlier systems)
              ●    4000-range: Visual Vectors
                  Note:
      Note:            Each time a user logs in to visual vectors, the port increments for the next user;
                       VV uses port 2890 for the Orbix Daemon and ports 4000-4200. Once the ports
                       are incremented to 4200, VV reuses the released ports. The comments apply to
                       vvsv12aa.x and higher, which means CMS R12 and higher. The port range is not
                       administrable.
              ●    540/tcp: uucp for the External Call History (ECH) interface.
New security enhancements with R15 (r15ab.d and later)
      CMS R15 maintenance release r15ab.d or r15auxab.d contains some additional operating
      system hardening based on results from a United States Air Force scan to qualify CMS for use
      in Department of Defense installations. The qualification is not yet complete, but some of the
      findings have been included with the latest R15 load.
      The /etc/shells file has been populated with the following shells as the only shells allowable
      to be used on the system:
              ●    /bin/sh (Bourne shell)
              ●    /usr/bin/ksh (Korn shell)
              ●    /usr/bin/csh (C-shell)
              ●    /usr/bin/pfksh (profile Korn shell, used for Solaris 10 role-based access)
              ●    /usr/bin/cms (CMS application shell)
      In addition, the file has been created with root user and group ownership and permissions set to
      640.
Avaya CMS R16.2 Security                                                                 November 2010      33
CMS version specific security
      Additions have been made to the S98cms_ndd script that enables the system to prevent
      network Denial of Service (DoS) attacks. Specifically, the attempt is to prevent TCP SYN attacks
      by increasing the TCP queue for unestablished connections and the TCP queue for established
      connections. This does not deter a TCP SYN attack from a system that has more resources
      allocated than the larger queues can handle, but it prevents the known TCP SYN attacks.
                   ndd -set /dev/tcp tcp_conn_req_max_q0                  2048
                   ndd -set /dev/tcp tcp_conn_req_max_q                   1024
      The cron.allow, at.allow, cron.deny, and at.deny files have been modified to
      restrict usage and make the files accessible only to root.
      The /etc/ftpd/ftpusers file has been restricted to only be accessible by root.
      When the cms_security script is run on the system, it modifies ownership and permissions
      on any and all *.mib files it finds.
                  Note:
      Note:            This causes an issue if the customer system has remote mounts to other systems
                       and has permission to change files on the remote mount. Any *.mib files on the
                       remote system are also modified if the system has proper permissions on the
                       remote mount. CMS R16.1 no longer has this issue. CMS R16.1 and later
                       specifically search only the local filesystems for *.mib files.
      Permissions on man pages and their directory structure are made to restrict user's ability to
      write or execute. This script restricts itself to known man page areas on the system.
      Syslog is restricted from logging from any remote systems. The permissions on the syslog.conf
      file are restricted to root.
      The /etc/mail/helpfile is truncated to zero length. Version information is removed from
      the sendmail greeting. Privacy options are restricted (noexpn, novrfy). The decode alias has
      been commented out in /etc/mail/aliases.
Other (optional) scripts provided with r15ab.d and
r15auxab.d
      There are some additional scripts that are provided on the CMS CD that are not automatically
      run on CMS systems.
              ●    logperms - Restricts the permissions on several system log files. Intended to prevent
                   tampering with log files.
              ●    userperms - Restricts permissions on user home directories and files. See the script on
                   the CD for specific limitations on running the script. Fixes only for existing users, it does
                   not handle new users. The script must be run each time a user is added.
34   Avaya CMS R16.2 Security                                                                    November 2010
                                        Changing the default password encryption algorithm on Solaris™
         ●   acctvrfy - A Perl script that attempts to lock user accounts for inactivity. This script does
             not attempt to check on current sessions and verify an inactive session. See the script for
             instructions on how to use.
Changing the default password encryption algorithm on
Solaris™
      This section consists of the following topics:
         ●   Description on page 35
         ●   Steps to Follow on page 35
         ●   Implementation on page 36
         ●   Verify on page 37
         ●   Enabling long passwords in Solaris™ 10 on page 38
Description
      In the era of increased security awareness, many people are looking for better ways to encrypt
      data and passwords. This document explains the steps necessary to configure Solaris™ 9 12/
      02 and later to use Blowfish or MD5 encryption algorithm as the default method for encrypting
      user passwords.
Steps to Follow
      Every user on a UNIX system has a password associated with their login account. These
      passwords are encrypted in a one-way hash using the traditional UNIX crypt algorithm called
      crypt_unix. This algorithm is no longer regarded sufficiently secure for current systems and
      is provided for backward compatibility. This remains the default algorithm used for password
      encryption on Solaris™.
      One of the biggest limitations is that only the first 8 characters of the key passed to this
      algorithm are used. The rest are silently ignored.
      Solaris 9 12/02 introduces the ability to change the default encryption algorithm for passwords
      to use the Blowfish (crypt_bsdbf) or MD5 (crypt_sunmd5/crypt_bsdmd5) algorithms.
      There are two versions of the MD5 algorithm:
      crypt_sunmd5: This is Sun's implementation of the MD5 algorithm
Avaya CMS R16.2 Security                                                              November 2010    35
CMS version specific security
      crypt_bsdmd5: This is the BSD implementation of the MD5 algorithm and provides
      compatibility with md5crypt on BSD and Linux systems.
Implementation
         1. Establish that your release of Solaris 10 is 10/08 or later.
      $ cat /etc/release
                             Solaris 10 10/08 s10s_u6wos_07b SPARC
                  Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
                               Use is subject to license terms.
                                   Assembled 27 October 2008
             The first line of the output provides you with the release number. This example is using
             Solaris 10 10/08.
         2. Change the default algorithm for user passwords.
             a. Login as root and open /etc/security/policy.conf using vi.
                 The file looks as follows by default:
      #
      # Copyright 1999-2002 Sun Microsystems, Inc. All rights reserved.
      # Use is subject to license terms.
      #
      # /etc/security/policy.conf
      #
      # security policy configuration for user attributes. see policy.conf(4)
      #
      #ident "@(#)policy.conf         1.6     02/06/19 SMI"
      #
      AUTHS_GRANTED=solaris.device.cdrw
      PROFS_GRANTED=Basic Solaris User
      # crypt(3c) Algorithms Configuration
      #
      # CRYPT_ALGORITHMS_ALLOW specifies the algorithms that are allowed to
      # be used for new passwords. This is enforced only in crypt_gensalt(3c).
      #
      CRYPT_ALGORITHMS_ALLOW=1,2a,md5
      # To deprecate use of the traditional unix algorithm, uncomment below
      # and change CRYPT_DEFAULT= to another algorithm. For example,
      # CRYPT_DEFAULT=1 for BSD/Linux MD5.
      #
      #CRYPT_ALGORITHMS_DEPRECATE=__unix__
      # The Solaris default is the traditional UNIX algorithm. This is not
      # listed in crypt.conf(4) since it is internal to libc. The reserved
      # name __unix__ is used to refer to it.
      #
      CRYPT_DEFAULT=__unix__
             b. Decide which algorithm you wish to use for encrypting the passwords. The
                "CRYPT_ALGORITHMS_ALLOW" line lists the available algorithms.
36   Avaya CMS R16.2 Security                                                           November 2010
                                      Changing the default password encryption algorithm on Solaris™
      1 = BSD/Linux compatible MD5 algorithm
      2a = Blowfish algorithm
      md5 = Sun's MD5 algorithm
                 Sun's MD5 is regarded stronger than the BSD/Linux compatible version, but it is not
                 compatible with non-Solaris™ systems.
                 The Blowfish implementation is the most secure, and is compatible with other BSD/
                 Linux/UNIX systems that utilize this algorithm.
             c. Deprecate the less secure traditional UNIX algorithm by uncommenting the line
                containing "CRYPT_ALGORITHMS_DEPRECATE=unix"
            d. Set the new default encryption algorithm by changing "CRYPT_DEFAULT=unix" to the
               appropriate algorithm that you wish to use.
                 For example:
                    CRYPT_DEFAULT=1
                 will implement the BSD/Linux compatible MD5 algorithm.
            e. Save the file and exit your text editor.
            The default encryption algorithm will take effect immediately. All subsequent password
            changes will be encrypted using the new selected algorithm. Passwords encrypted using
            the traditional UNIX crypt algorithm will continue to work too.
Verify
      You can verify that the new passwords are being encrypted using the new algorithm by
      checking the password field in the /etc/shadow file. Each of the new algorithms have an
      identifier at the beginning of the password field.
      Traditional UNIX crypt encrypted passwords are short with no distinguishing pattern at the
      beginning.
      Example:
      testuser:SkRrs95xihsQ.:12384::::::
      BSD/Linux compatible MD5 encrypted passwords can be identified by "$1$" as the first 3
      characters of the encrypted password:
      Example:
      testuser:$1$26sYv4pB$zo4xkXLRyBrolTF9IuT8d/:12384::::::
      Blowfish encrypted passwords can be identified by "$2a$" as the first 4 characters of the
      encrypted password.
      Example:
      testuser:$2a$04$Ap60ohzOKIcRPJLazpcaBO4liyUzdYdbCpM.p6T6Q1W1ExOnkStiu:12384::::::
Avaya CMS R16.2 Security                                                         November 2010       37
CMS version specific security
      Sun MD5 encrypted passwords can be identified by "$md5$" as the first 4 characters of the
      encrypted password:
      Example:
      testuser:$md5$RPgLF6IJ$WTvAlUJ7MqH5xak2FMEwS/:12384::::::
Enabling long passwords in Solaris™ 10
      The default encryption method for Solaris 10 is the traditional UNIX encryption. By changing the
      encryption method in Solaris 10, you can enable long (up to 256 characters) passwords.
      In Solaris 10, the maximum number of characters for a password has been changed from 8 to
      256. This change was made in the PASS_MAX variable in the limits.h (/usr/include/
      limits.h) file. The getconf and getpass commands have been updated to interact with
      this change.
      To change the encryption scheme from the default UNIX algorithm, modify /etc/security/
      policy.conf.
      Example edit of /etc/security/policy.conf:
      --- BEGIN SNIP DEFAULT ENCRYPTION ---
      # The Solaris default is the traditional UNIX algorithm. This is not
      # listed in crypt.conf(4) since it is internal to libc. The reserved
      # name __unix__ is used to refer to it.
      #
      CRYPT_DEFAULT=__unix__
        --- END SNIP DEFAULT ENCRYPTION ---
        --- BEGIN SNIP CHANGE TO MD5 ENCRYPTION ---
      # The Solaris default is the traditional UNIX algorithm. This is not
      # listed in crypt.conf(4) since it is internal to libc. The reserved
      # name __unix__ is used to refer to it.
      #
      CRYPT_DEFAULT=md5
      --- END SNIP CHANGE TO MD5 ENCRYPTION ---
      After changing, no reboot is required. Validate by changing the password. Using md5, a sample
      encrypted password string in /etc/shadow will look like:
      root:$md5$e8C9kZU9$$Ye6tfFUnKTF/K.jLoSuw8/:12858::::::
              Note:
      Note:        After changing the encryption type back to unix from md5 you will notice the
                   system still accepts long passwords. Looking at the /etc/shadow file, you can
                   see that the password string will remain as an md5 encryption string.
38   Avaya CMS R16.2 Security                                                           November 2010
                                      Manual password complexity changes for R15 and Later (optional)
Manual password complexity changes for R15 and Later
(optional)
              Note:
      Note:        These manual changes require the latest CMS Supervisor (R16.1 KB.17) be used
                   to assure connection compatibility.
      There are many options for improving security through restricting the login process and
      password policies. Many of these settings can also cause accessibility issues in some cases
      because of an overly strict set of rules. Customers are responsible for being cautious, and
      understanding the effect of these policy and login changes before implementing them.
Changes to /etc/default/login
      There are several options in the /etc/default/login that can be changed to enhance the
      security of the system. One option that must not be used, but is required by some policies is
      changing the CONSOLE line to "/dev/null". This disallows direct root logins from the
      console. Use with extreme care.
      Other options that can be set are in the following table:
              Option                   Initial       Description
                                       Value
              MAXWEEKS                 {Null}        Maximum time period that password is valid.
                                                     (Best controlled through CMSADM
                                                     passwd_age option)
              MINWEEKS                 {Null}        Minimum time period before the password can
                                                     be changed. (Best controlled through
                                                     CMSADM passwd_age option)
              WARNWEEKS                {Null}        Time period until warning of date of
                                                     password's ensuing expiration. (Best
                                                     controlled through CMSADM passwd_age
                                                     option)
              PASSLENGTH               6             Minimum length of password, in characters. If
                                                     the policy.conf is still using the default
                                                     Solaris encryption, then only 8 characters are
                                                     allowed. To use more than 8 characters, you
                                                     must set a different encryption algorithm that
                                                     supports more than 8 characters, see
                                                     Changing the default password encryption
                                                     algorithm on Solaris™ on page 35.
Avaya CMS R16.2 Security                                                           November 2010      39
CMS version specific security
          Option                Initial   Description
                                Value
          HISTORY               {Null}    Maximum number of prior password history to
                                          keep for a user. Setting the HISTORY value to
                                          zero (0), or removing the flag, causes the prior
                                          password history of all users to be discarded
                                          at the next password change by any user. The
                                          maximum value is 26. Currently, this
                                          functionality is enforced only for user accounts
                                          defined in the files name service.
          MINUPPER              {Null}    Minimum number of upper case letters
                                          required. If MINUPPER is not set or is zero
                                          (0), the default is no checks.
          MINLOWER              {Null}    Minimum number of lower case letters
                                          required. If not set or zero (0), the default is no
                                          checks.
          MAXREPEATS            {Null}    Maximum number of allowable consecutive
                                          repeating characters.
          MINSPECIAL            {Null}    Minimum number of special (non-alpha and
                                          non-digit) characters required. You cannot
                                          specify MINSPECIAL if you also specify
                                          MINNONALPHA.
          MINDIGIT              {Null}    Minimum number of digits required. You
                                          cannot be specify MINDIGIT if
                                          MINNONALPHA is also specified.
          DICTIONLIST           {Null}    DICTIONLIST can contain list of comma
                                          separated dictionary files such as
                                          DICTIONLIST=file1, file2, file3. Each
                                          dictionary file contains multiple lines and each
                                          line consists of a word and a NEWLINE
                                          character (similar to /usr/share/lib/
                                          dict/words.) You must specify full
                                          pathnames. The words from these files are
                                          merged into a database that is used to
                                          determine whether a password is based on a
                                          dictionary word.
          DICTIONBDIR           {Null}    The directory where the generated dictionary
                                          databases reside. Defaults to /var/passwd.
          MINNONALPHA           {Null}    Minimum number of non-alpha (including
                                          numeric and special) required. If
                                          MINNONALPHA is not set, the default is 1.
                                          You cannot specify MINNONALPHA if
                                          MINDIGIT or MINSPECIAL is also specified.
40   Avaya CMS R16.2 Security                                                    November 2010
                                                          Security enhancements included with R16 and later
                  Option                    Initial       Description
                                            Value
                  MINDIFF                   {Null}        Minimum differences required between an old
                                                          and a new password. If MINDIFF is not set, the
                                                          default is 3.
                  WHITESPACE                {Null}        Determine if white space characters are
                                                          allowed in passwords. Valid values are YES
                                                          and NO. If WHITESPACE is not set or is set to
                                                          YES, white space characters are allowed.
                  NAMECHECK                 YES           Enable/disable checking or the login name.
                                                          The default is to do login name checking. A
                                                          case insensitive value of no disables this
                                                          feature.
                  Note:
      Note:            There are too many possible options for complete testing of these features to be
                       done. Many combinations have been tested, but your specific implementation
                       need not have been tested.
Security enhancements included with R16 and later
      With the release of CMS R16.1, some new enhancements to system security have been
      implemented. Many of these enhancements were found to be needed by running JITC tests
      against the R15 CMS system. Three classes of enhancements have been introduced in CMS
      R16.1 and later systems. The first class of enhancements has been implemented in the CMS
      code and is part of the base product with R16.1 and later. The second class is provided through
      optional scripts that can be run to enforce the new security enhancement specified. A third class
      of enhancements is documented but not scripted or included on the CMS sytem. These three
      classes of enhancements make it easier for customers to choose the enhancements that are
      required by their industry without being forced to take enhancements that need not be required
      for their specific circumstances.
      The security enhancements included in CMS R16.1 are as follows:
              ●    Set up basic auditing on the system.
              ●    Change the ownership and permissions on several files that defaulted to less restrictive
                   permissions than recommended.
              ●    Make all cron entries specify umask of 077.
              ●    Mount the /cms/filesystem with the nosuid option.
              ●    Modify permissions of CMS user home directories as created by CMS application.
              ●    Optional scripted security enhancements
Avaya CMS R16.2 Security                                                                November 2010      41
CMS version specific security
                 ●    Audit controls and logadm changes for rotation of audit logs
                 ●    Controlling who can connect to the CMS system.
                 ●    Restricting access to the database.
Basic Audit Reporting Tool
      Basic Audit Reporting Tool (BART) is a file tracking tool that operates entirely at the file system
      level. Using BART gives you the ability to quickly, easily, and reliably gather information about
      the components of the software stack that is installed on deployed systems. Using BART can
      greatly reduce the costs of administering a network of systems by simplifying time-consuming
      administrative tasks.
                       !   WARNING:
      WARNING:             As with any other auditing tool, BART can use a lot of space if you keep many
                           copies of the manifest and comparisons. Take care not to overrun your filesystem
                           space. This is not something Avaya has the ability or responsibility to manage.
      BART enables you to determine what file-level changes have occurred on a system, relative to
      a known baseline. You use BART to create a baseline or control manifest from a fully installed
      and configured system. You can then compare this baseline with a snapshot of the system at a
      later time, generating a report that lists file-level changes that have occurred on the system
      since it was installed.
                     Note:
      Note:               For a more information on BART see http://dlc.sun.com/pdf/816-4557/
                          816-4557.pdf and "Integrating BART and the Solaris™ Fingerprint Database in
                          the Solaris 10 Operating System" at http://www.sun.com/blueprints.
BART Components
      BART has two main components and one optional component:
                 ●    BART Manifest
                 ●    BART Report
                 ●    BART Rules File
BART Manifest
      You use the bart create command to take a file-level snapshot of a system at a particular
      time. The output is a catalog of files and file attributes called a manifest. The manifest lists
      information about all the files or specific files on a system. It contains information about
      attributes of files, which can include some uniquely identifying information, such as an MD5
      checksum.
42   Avaya CMS R16.2 Security                                                                    November 2010
                                                            Security enhancements included with R16 and later
BART Report
      The report tool has three inputs. The first two are manifests to be compared and the third one is
      the optional user-provided rules file that indicates which discrepancies are to be flagged.
      You use the bart compare command to compare two manifests, a control manifest and a test
      manifest. These manifests must be prepared with the same file systems, options, and rules file
      that you use with the bart create command.
      The output of the bart compare command is a report that lists per-file discrepancies between
      the two manifests. A discrepancy is a change to any attribute for a given file that is cataloged for
      both manifests. Additions or deletions of file entries between the two manifests are also
      regarded as discrepancies.
      There are two levels of control when reporting discrepancies:
              ●    When generating a manifest
              ●    When producing reports
      These levels of control are intentional, since generating a manifest is more costly than reporting
      discrepancies between two manifests. Once you have created manifests, you have the ability to
      compare manifests from different perspectives by running the bart compare command with
      different rules files.
BART Rules File
      The rules file is a text file that you can optionally use as input to the bart command. This file
      uses inclusion and exclusion rules. A rules file is used to create custom manifests and reports.
      A rules file enables you to express in a concise syntax which sets of files to catalog, as well as
      which attributes to monitor for any given set of files. When you compare manifests, the rules file
      aids in flagging discrepancies between the manifests. Using a rules file is an effective way to
      gather specific information about files on a system.
      Using a rules file to monitor specific files and file attributes on a system requires planning.
      Before you create a rules file, decide which files and file attributes on the system to monitor.
      Depending on what you are trying to accomplish, you can use a rules file to create manifests,
      compare manifests, or for other purposes.
                  Note:
      Note:            You can create several rules files for different purposes. However, if you create a
                       manifest by using a rules file, you must use the same rules file when you compare
                       the manifests. If you do not use the same rules file when comparing manifests
                       that were created with a rules file, the output of the bart compare command will
                       list many invalid discrepancies.
      A rules file can also contain syntax errors and other ambiguous information as a result of user
      error. If a rules file contains misinformation, these errors will also be reported.
Avaya CMS R16.2 Security                                                                  November 2010      43
CMS version specific security
Basic Example of using BART
      Create a manifest using the following commands:
                   cd /
                   bart create > /var/cms/security/bart_manifest
      When needed, or in a cron job, run a bart compare periodically using the following commands:
                   cd /
                   bart create > /var/cms/security/bart_test
                   bart compare         /var/cms/security/bart_manifest /var/cms/security/
                     bart_test
                  Note:
      Note:            By default, BART tracks and reports on all attributes except directory timestamps.
                       Even with minimal changes to the system like a user changing permissions on
                       some home directory files resulting in system level logs being rotated, there can
                       be significant differences. Use the bart rules file to limit the attributes collected if
                       you need more change information than desired.
      See the bart man page or the references at the beginning of this section for more information
      on using BART.
Permission and Ownership Changes
      Permission and ownership changes are made to several files. The following is a list of the
      changes made to the files or file types.
              ●    Change logfile permissions of any file named btmp, messages, wtmp, nlog,
                   cronlog, utmp, shutdownlog, syslog, sudo.log, loginlog,
                   syslog.log, lastlog, or log in the /var directory structure to 644. Intended targets
                   include, but are not limited to :
                  - /var/adm/messages
                  - /var/adm/sudo.log
                  - /var/sadm/lastlog
                  - /var/cron/log
              ●    chmod 750 /var/audit
              ●    chmod 640 /etc/security/audit_user
              ●    chmod 640 /etc/ftpd/ftpusers
              ●    chmod 700 /var/crash
              ●    Remove world write from the following files:
44   Avaya CMS R16.2 Security                                                                       November 2010
                                                   Security enhancements included with R16 and later
             - /cms/cc/install.aot.cssrVVXX.X/data/log
             where VV is the version number and XX.X is the release
             - /cms/db/journal/timetable/10
             - /cms/db/journal/timetable/11
             - /cms/perfbin/perf
             - /cms/perfbin/perf/occ.thresh
             - /cms/tmp
             - /cms/tmp/errfile
             - /cms/tmp/disklist
             - /etc/lp/interfaces/tmp
             - /opt/informix/etc/ilslsfl
             - /opt/informix/etc/Lsils-cr
             - /usr/lib/cms/pbxtrcflags
             - /usr/dbtemp
             - /var/adm/spellhist
             - /var/dt/dtpower/_current_scheme
             - /var/elog/elogLocal
         ●   Change ownership fo directory /cms/perfbin to root:sys
Make all cron entries use umask of 077
      The file /etc/cron/.proto has been modified to include the following line:
             umask 077
      This makes all future entries to cron use a umask of 077.
The /cms filesystem is mounted with nosuid option
      The /cms/ filesystem is now mounted using the nosuid option.
Avaya CMS R16.2 Security                                                       November 2010     45
CMS version specific security
Modify permissions of CMS user home directories as created by
CMS application
      When a new user is created, the system creates a new home directory for the user in /
      export/home/[userid]. The directory is created with permissions of 755, and must be
      more restrictive. CMS now creates the user's home directory and modifies the permissions to
      750. Additional files created by users can be changed to this setting by running the
      userperms.sh script.
Optional scripted security enhancements
      The optional security scripts can be found at /cms/install/bin. The scripts included with
      CMS R16.1 include the following:
         ●   tcp_trace
             Enables TCP conection tracing. Use with caution. This type of tracing can make extremely
             large log files in the /var filesystem.
         ●   disable_core
             Disables core files on the system. Also to be used with extreme caution. Core files can be
             very useful in determining the cause of application problems.
         ●   disable_crash
             Disable crash files on the system. Another one to be cautious of using as crash files can
             be useful in determining system and OS problems that cause panics. Without crash files,
             your system panics might not be traceable.
         ●   move_root_home
             Change the root user home directory from / to /root.
         ●   enable_audit
             This script sets some auditing control parameters, enables auditing, and sets up
             logadm.conf to rotate log files in /var/audit. Details of what has been done are
             outlined below. Take care with auditing because once enabled, it can use large amounts of
             the /var/filesystem. With both auditing enabled and TCP connection tracing turned
             on, a system with many users can fill up the /var file system fairly quickly. Observe your
             filesystems when these items are in use.
46   Avaya CMS R16.2 Security                                                           November 2010
                                                            Security enhancements included with R16 and later
Audit controls and logadm changes for rotation of audit logs
              1. The enable_audit script above makes the following changes to the /etc/security/
                 audit_control file:
                  ●   dir:/var/audit
                      Directory location where auditing logs are placed.
                  ●   flags:fr,fd,am,lo,fm
                      Set the fr (file read), fd (file delete), am (Administrative [meta-class]), lo (login [or]
                      logout), and fm (file attribute modify) audit class flags.
                  ●   minfree:20
                      Set the minimum free space percentage. This setting causes auditd to invoke
                      audit_warn if the free space falls below this percentage.
                  ●   naflags:lo
                      Set naflags to audit lo (login [or] logout) even if the user cannot be identified.
              2. It then modifies the /etc/logadm.conf file to include the following:
                  ●   audit -M '/usr/sbin/audit -n; sleep 1' -R '/bin/rm $file' -T '/
                      var/audit/[0-9]*.[0-9]*.*' -t '$file' -z 0 -z"perl -ni -e 'print
                      unless /^.var.audit.*not_terminated/' /etc/logadm.conf" /var/
                      audit/*.not_terminated.*
              3. Enable auditing using this command:
                 /etc/security/bsmconv
              4. The customer system must now be restarted to invoke auditing functionality. The script
                 does not do so.
                 shutdown -y -i6 -g0
                Note:
      Note:          Turning on auditing disables the volfs service. This service is used to
                     automatically mount CDs and DVDs with other removable media devices. For
                     CMS systems, the main focus would be on the CDs and DVDs. Typically, volfs is
                     running on the system in which CMS is installed. If it is not, a CD or DVD needs to
                     be manually mounted. Some customers can want the volfs service to be left
                     turned off for security reasons. However, Avaya Provisioning and Services can
                     turn the service back on. Therefore, customers must make prior arrangements to
                     ensure the service is not enabled, or not left enabled.
Avaya CMS R16.2 Security                                                                    November 2010      47
CMS version specific security
              5. To disable auditing, use the following commands:
                 svcadm milestone svc:/milestone/single-user
                 /etc/security/bsmunconv
                 svcadm milestone svc:/milestone/multi-user
                 shutdown -y -i6 -g0
Controlling who can connect to the CMS system
      The CMS Security Script creates the files /etc/hosts.allow and /etc/hosts.deny. Use
      these files to control which IP addresses are permitted to connect to the Avaya CMS system.
                Note:
      Note:          The CMS security script will NOT write over existing /etc/hosts.allow and /etc/
                     hosts.deny files. If you use an upgrade to get to CMS R16.1, the files will not
                     contain the same information as below. To get the updated files, insert the CMS
                     R16.1 Software DVD into the system DVD drive, then run the following
                     commands:
                          cp /cdrom/cdrom0/security/sec_files/hosts.allow /etc/
                          cp /cdrom/cdrom0/security/sec_files/hosts.deny /etc/
      To use the /etc/hosts.allow and /etc/hosts.deny files:
              1. Edit /etc/hosts.allow
                 This file contains the following settings:
                  ●   ALL: localhost
                  ●   sshd : ALL
                  ●   ALL : ALL : DENY
                Note:
      Note:          Network services rsh, rexec, and rlogin are disabled on Avaya CMS
                     systems. The lines in this file do not affect a service if the daemon for that service
                     is not running.
      This disables telnet from all remote hosts but still allows telnet via port forwarding from
      Supervisor users.
                Note:
      Note:          Avaya CMS Supervisor supports telnet and SSH connections.
              2. Edit /etc/hosts.deny
              3. It currently has the following entry:
                 ALL : ALL
48   Avaya CMS R16.2 Security                                                                   November 2010
                                                        Security enhancements included with R16 and later
              4. In order to allow certain IP addresses and subnets to connect to Avaya CMS system using
                 a particular service, change file /etc/hosts.allow by replacing ALL with the permitted
                 IP addresses.
      The following table contains some examples of security setting use:
              Example setting                                   Explanation of use
              in.telnetd : 10.8.10.0/255.255.255.0              This setting allows telnet connections
                                                                from all IP addresses from 10.8.10.1 to
                                                                10.8.10.255.
              sshd : 10.0.0.0/255.0.0.0                         This setting allows ssh connections
                                                                from all IP addresses from 10.0.0.1 to
                                                                10.255.255.255.
              in.rshd :     10.8.31.100 10.8.31.55              This setting allows connections from IP
                                                                addresses 10.8.31.100 and 10.8.31.55.
Restricting access to the database
      Use dbaccess to limit which CMS logins have ODBC/JDBC access to the CMS database. The
      CMS database has “open access” permissions as a standard feature which allows permission
      to any CMS login, connecting to the CMS server via ODBC/JDBC, to view any CMS table. No
      action is required if all CMS logins are allowed open access to the CMS database.
      The dbaccess utility does not provide the ability to control which tables the CMS login has
      access to, or which ACD data the CMS login can view. The process of setting the secure
      database access is performed in two parts. First, all CMS login ids that are allowed CMS
      database access must be members of the UNIX group dbaccess. Second, you must execute
      the dbaccess option under the cmsadm menu.
                Note:
      Note:          Adding a single CMS login to the dbaccess group will disable “open access”
                     permissions for all users that are not members of the dbaccess group.
              1. Each CMS login allowed ODBC/JDBC access to the CMS database must be added to the
                 UNIX group dbaccess. To add CMS logins to the dbaccess group, enter:
                 usermod -G dbaccess cmslogin
                 Where cmslogin is the user id of the specific CMS login to be placed in the group. You
                 must execute the usermod command for each CMS login that you wish to provide CMS
                 database access.
              2. To determine which logins are in the dbaccess group, enter:
                 cat /etc/group | grep dbaccess
Avaya CMS R16.2 Security                                                             November 2010        49
CMS version specific security
               3. Open the Avaya Call Management System Administration menu. Enter:
                  cmsadm
                  The system displays the Avaya Call Management System Administration menu.
               4. Select the dbaccess option. The system displays the following message:
              Begin CMS DB Access Permissions changes
              grant resource to "public";
              Your CMS database currently has public access permissions to all resources. Do you
              wish to revoke this access and only grant access to specific CMS users? [y,n,?]
               5. Enter: y
                  The process continues. Messages similar to the following will be displayed:
              Please wait while CMS Informix Database permissions are changed.
              revoke resource from public;
              revoke connect from public;
              grant connect to cms;
              grant connect to cmssvc;
              Revoke resource from public on CMS database.
              Please wait while connect permissions are granted for requested users
              grant connect to <cmslogin>;
              grant connect to <cmslogin>;
              .
              .
              .
              Changes to CMS DB Access Permissions finished.
                 Note:
      Note:           The output will always display one “grant connect” message per CMS logid,
                      including logids already in the dbaccess group with connect permissions.
                  After the changes are complete, you can use the CMS logids to run ODBC/JDBC clients
                  and access the CMS database.
                  To remove ODBC/JDBC access permissions for CMS logids, first remove them from the
                  UNIX dbaccess group then run dbaccess from the Avaya Call Management System
                  Administration menu.
               6. Remove ODBC/JDBC access permissions for CMS logids from the UNIX dbaccess group.
                  Enter:
                  usermod –G “” cmslogin
               7. Open the Avaya Call Management System Administration menu. Enter:
                  cmsadm
                  The system displays the Avaya Call Management System Administration menu.
50   Avaya CMS R16.2 Security                                                               November 2010
                                                   Security enhancements included with R16 and later
         8. Select the dbaccess option. The system displays the following message:
       Begin CMS DB Access Permissions changes
       Please wait while connect permissions are granted for requested users
       grant connect to <cmslogin>;
       .
       .
       .
       Changes to CMS DB Access Permissions finished.
             The UNIX dbaccess group information is re-set to only provide access permissions for
             members remaining in the UNIX dbaccess group.
             Perform the Steps 9 through 11 to remove all the CMS logins from the UNIX dbaccess
             group and restore “open access” permissions to all the CMS logins.
         9. Run the usermod command for each CMS login in the dbaccess group. Enter:
             usermod –G “” cmslogin1
             usermod –G “” cmslogin2
             usermod –G “” cmslogin3
        10. Open the Avaya Call Management System Administration Menu. Enter:
             cmsadm
             The system displays the Avaya Call Management System Administration menu.
        11. Select the dbaccess option. The system displays the following message:
       Begin CMS DB Access Permissions changes
       No   CMS   user ids are in UNIX group dbaccess.
       If   you   proceed, the CMS database will
       be   set   to public permissions access for all resources.
       Do   you   really want to do this? [y,n,?]
        12. Enter: y
             The process restores public permissions to the CMS database. Messages similar to the
             following will be displayed:
       Please wait while CMS Informix Database permissions are set to public.
       grant resource to public;
       revoke connect from cms;
       revoke connect from cmssvc;
       Grant resource to public on CMS database.
       Changes to CMS DB Access Permissions finished.
Avaya CMS R16.2 Security                                                        November 2010       51
CMS version specific security
52   Avaya CMS R16.2 Security   November 2010
Appendix A: Enabling and Disabling
            Services in Solaris 9 and 10
      CMS R12 through R14.1 use Solaris 9 as the underlying OS. CMS R15 and later systems use
      Solaris 10. Follow the proper procedure for the OS for your CMS.
      This section covers the following topics:
         ●   Solaris 10 on page 53
         ●   Service Management Facility (SMF) on page 53
         ●   Solaris 9 on page 60
         ●   CMS permissive use support policy on page 62
         ●   Links to Avaya security resource on page 64
Solaris 10
      Solaris 10 includes a new facility called the Service Management Facility (SMF) for managing
      most services on the system. A few services are still managed by inetd. See Table A-1 below.
Service Management Facility (SMF)
      SMF provides an infrastructure that augments the traditional UNIX start-up scripts, init run
      levels, and configuration files. SMF provides the following functions:
      Automatically restarts failed services in dependency order, whether they failed as a result of an
      administrator error, software bug, or were affected by an uncorrectable hardware error. The
      dependency order is defined by dependency statements.
      Makes services objects that can be viewed, with the new svcs command, and managed, with
      svcadm and svccfg commands. You can also view the relationships between services and
      processes using svcs -p, for both SMF services and legacy init.d scripts.
      Makes it easy to backup, restore, and undo changes to services by taking automatic snapshots
      of service configurations.
Avaya CMS R16.2 Security                                                           November 2010      53
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
       Makes it easy to debug and ask questions about services by providing an explanation of why a
       service isn't running by using svcs -x. Also, this process is eased by individual and persistent
       log files for each service.
       Allows for services to be enabled and disabled using svcadm. These changes can persist
       through upgrades and reboots. If the -t option is used, the changes are temporary.
       Enhances the ability of administrators to securely delegate tasks to non-root users, including
       the ability to modify properties and enable, disable, or restart services on the system.
       Boots faster on large systems by starting services in parallel according to the dependencies of
       the services. The opposite process occurs during shutdown.
       Allows you to customize the boot console output to either be as quiet as possible, which is the
       default, or to be verbose by using boot -m verbose.
       Preserves compatibility with existing administrative practices wherever possible. For example,
       most customer and ISV-supplied rc scripts still work as usual.
       Dependency statements define relationships between services. These relationships can be
       used to provide precise fault containment by restarting only those services that are directly
       affected by a fault, rather than restarting all of the services. Another advantage of dependency
       statements is that the statements allow scalable and reproducible initialization processes. By
       defining all of the dependencies, you can take advantage of modern, highly parallel machines,
       because all independent services can be started in parallel.
       SMF defines a set of actions that can be invoked on a service by an administrator. These
       actions include enable, disable, refresh, restart, and maintain. Each service is managed by a
       service restarter which carries out the administrative actions. In general, the restarters carry out
       actions by executing methods for a service. Methods for each service are defined in the service
       configuration repository. These methods allow the restarter to move the service from one state
       to another.
       The service configuration repository provides a per-service snapshot at the time that each
       service is successfully started so that fallback is possible. In addition, the repository provides a
       consistent and persistent way to enable or disable a service, as well as a consistent view of
       service state. This capability helps you debug service configuration problems.
       SMF includes a couple of commands that allows you to display, troubleshoot, enable , disable,
       and restart SMF services. The commands are svcs and svcadm.
svcs command
       The svcs command has several options, but only two of those options are discussed for now.
       More information on SMF and its commands can be found at http://docs.sun.com/app/docs/doc/
       817-1985.
       The "svcs -a" command displays all services on the system. You can then pipe to grep to find
       information on specific services or to find the exact service name you need.
       The "svcs -xv" command shows SMF services that are not running properly. This is useful in
       troubleshooting service issues.
54   Avaya CMS R16.2 Security                                                               November 2010
                                                                     Service Management Facility (SMF)
svcadm command
      The svcadm command is used to enable, disable or restart system services managed by SMF.
      To enable a service, use the command:
              svcadm enable {Service FMRI}
      where the {Service FMRI} is the fully qualified service description item listed in Table 1 below.
      You can sometimes use the simple name (ssh), but it must be unique for the svcadm command
      to accept.
      The following table lists some of the services that have been converted to use SMF. Each
      service includes the daemon or service name, the FMRIs for that service, the run script that is
      used to start the service, and whether the service is started by inetd.
      .
          Table 1: SMF Services
           Service         FMRI                                     Run Script    inetd Service
           Name
           automount       svc:/system/filesystem/autofs:default    autofs        Not applicable
           consadmd        svc:/system/consadm:default              rootusr       Not applicable
           coreadm         svc:/system/coreadm:default              coreadm       Not applicable
           cron            svc:/system/cron:default                 cron          Not applicable
           cryptoadm       svc:/system/cryptosvc:default            N/A           Not applicable
           cvcd            svc:/system/cvc:default                  cvcd          Not applicable
           dcs             svc:/platform/<arch>/dcs:default         None          Applicable
           dtlogin         svc:/application/graphical-login/        dtlogin       Not applicable
                           cde-login:default
           dtprintinfo     svc:/application/cde-printinfo:default   dtlogin       Not applicable
           dtspcd          svc:/network/cde-spc:default             None          Applicable
           dumpadm         svc:/system/dumpadm:default              savecore      Not applicable
           efdaemon        svc:/platform/<arch>/                    efcode        Not applicable
                           efdaemon:default
           fmd             svc:/system/fmd:default                  N/A           Not applicable
           gssd            svc:/network/rpc/gss:default             None          Applicable
           imapd           svc:/network/imap/tcp:default            None          Applicable
                           svc:/network/imapnew/tcp:default
Avaya CMS R16.2 Security                                                           November 2010        55
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
         Table 1: SMF Services
          Service          FMRI                                   Run Script    inetd Service
          Name
          in.chargend      svc:/network/chargen:dgram             None          Applicable
                           svc:/network/chargen:stream
          in.comsat        svc:/network/comsat:default            None          Applicable
          in.daytimed      svc:/network/daytime:dgram             None          Applicable
                           svc:/network/daytime:stream
          in.dhcpd         svc:/network/dhcp-server:default       dhcp          Not applicable
          in.discardd      svc:/network/discard:dgram             None          Applicable
                           svc:/network/discard:stream
          in.echod         svc:/network/echo:dgram                None          Applicable
                           svc:/network/echo:stream
          in.fingerd       svc:/network/finger:default            None          Applicable
          in.ftpd          svc:/network/ftp:default               None          Applicable
          in.named         svc:/network/dns/server:default        inetsvc       Not applicable
          in.rarpd         svc:/network/rarp:default              boot.server   Not applicable
          in.rdisc         svc:/network/initial:default           inetinit      Not applicable
          in.rexecd        svc:/network/rexec:default             None          Applicable
          in.rlogind       svc:/network/login:rlogin              None          Applicable
                           svc:/network/login:eklogin
                           svc:/network/login:klogin
          in.routed        svc:/network/initial:default           inetinit      Not applicable
          in.rshd          svc:/network/shell:default             None          Applicable
                           svc:/network/kshell
          in.talkd         svc:/network/talk:default              None          Applicable
          in.telnetd       svc:/network/telnet:default            None          Applicable
          in.tftpd         svc:/network/tftp/udp6:default         None          Applicable
          in.timed         svc:/network/time:dgram                None          Applicable
                           svc:/network/time:stream
          in.tnamed        svc:/network/tname:default             None          Applicable
56   Avaya CMS R16.2 Security                                                         November 2010
                                                                    Service Management Facility (SMF)
        Table 1: SMF Services
          Service          FMRI                                    Run Script    inetd Service
          Name
          in.uucpd         svc:/network/uucp:default               None          Applicable
          inetd-upgrade    svc:/network/inetd-upgrade:default      N/A           Not applicable
          inetd            svc:/network/inetd:default              inetsvc       Not applicable
          intrd            svc:/system/intrd:default               None          Not applicable
          ipop3d           svc:/network/pop3/tcp:default           None          Applicable
          kadmind          svc:/network/security/kadmin:default    kdc.master    Not applicable
          kbd              svc:/system/keymap:default              keymap        Not applicable
          keyserv          svc:/network/rpc/keyserv:default        rpc           Not applicable
          kpropd           svc:/network/security/                  None          Applicable
                           krb5_prop:default
          krb5kdc          svc:/network/security/krb5kdc:default   kdc           Not applicable
          ktkt_warnd       svc:/network/security/                  None          Applicable
                           ktkt_warn:default
          ldap_cachem      svc:/network/ldap/client:default        ldap.client   Not applicable
          gr
          loadkeys         svc:/system/keymap:default              keymap        Not applicable
          lockd            svc:/network/nfs/client:default         nfs.server    Not applicable
                           svc:/network/nfs/server:default
          lpsched and      svc:/application/print/server:default   lp            Not applicable
          lpshut
          mdmonitord       svc:/system/mdmonitor:default           svm.sync      Not applicable
          metainit         svc:/system/metainit:default            svm.init      Not applicable
          metadevadm       svc:/platform/<arch>/                   N/A           Not applicable
                           mpxio-upgrade:default
          mount            svc:/system/filesystem/local:default    nfs.client,   Not applicable
                           svc:/system/filesystem/                 rootusr,
                           minimal:default                         standardmo
                                                                   unts
                           svc:/system/filesystem/root:default
                           svc:/system/filesystem/usr:default
          mountd           svc:/network/nfs/server:default         nfs.server    Not applicable
Avaya CMS R16.2 Security                                                         November 2010    57
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
         Table 1: SMF Services
          Service          FMRI                                     Run Script    inetd Service
          Name
          nfsd             svc:/network/nfs/server:default          nfs.server    Not applicable
          nfsmapid         svc:/network/nfs/client:default          nfs.server    Not applicable
                           svc:/network/nfs/server:default
          nis_cachemgr     svc:/network/rpc/nisplus:default         rpc           Not applicable
          nscd             svc:/system/                             nscd          Not applicable
                           name-service-cache:default
          ntpdate          svc:/network/ntp:default                 xntpd         Not applicable
          ocfserv          svc:/network/rpc/ocfserv:default         ocfserv       Not applicable
          picld            svc:/system/picl:default                 picld         Not applicable
          pmconfig         svc:/system/power:default                power         Not applicable
          printd           svc:/application/print/cleanup:default   spc           Not applicable
          quotaon          svc:/system/filesystem/local:default     ufs_quota     Not applicable
          rcapd            svc:/system/rcap:default                 rcapd         Not applicable
          rpcbind          svc:/network/rpc/bind:default            rpc           Not applicable
          rpc.bootpara     svc:/network/rpc/bootparams:default      boot.server   Not applicable
          md
          rpc.mdcomm       svc:/network/rpc/mdcomm:default          None          Applicable
          rpc.metad        svc:/network/rpc/meta:default            None          Applicable
          rpc.metamed      svc:/network/rpc/metamed:default         None          Applicable
          d
          rpc.metamhd      svc:/network/rpc/metamh:default          None          Applicable
          rpc.nisd         svc:/network/rpc/nisplus:default         rpc           Not applicable
          rpc.nispasswd    svc:/network/rpc/nisplus:default         rpc           Not applicable
          d
          rpc.rexd         svc:/network/rpc/rex:default             None          Applicable
          rpc.rstatd       svc:/network/rpc/rstat:default           None          Applicable
          rpc.rusersd      svc:/network/rpc/rusers:default          None          Applicable
          rpc.smserverd    svc:/network/rpc/smserver:default        None          Applicable
58   Avaya CMS R16.2 Security                                                           November 2010
                                                                     Service Management Facility (SMF)
        Table 1: SMF Services
          Service          FMRI                                    Run Script    inetd Service
          Name
          rpc.sprayd       svc:/network/rpc/spray:default          None          Applicable
          rpc.ttdbserver   svc:/network/rpc/ttdbserver:tcp         None          Applicable
          d
          rpc.walld        svc:/network/rpc/wall:default           None          Applicable
          rpc.yppasswd     svc:/network/nis/server:default         rpc           Not applicable
          d and
          rpc.ypupdated
          rquotad          svc:/network/nfs/rquota:default         None          Applicable
          sadc             svc:/system/sar:default                 perf          Not applicable
          savecore         svc:/system/dumpadm:default             savecore      Not applicable
          sendmail         svc:/network/smtp:sendmail              sendmail      Not applicable
          sf880drd         svc:/platform/<arch>/sf880drd:default   sf880dr       Not applicable
          slpd             svc:/network/slp:default                slpd          Not applicable
          sshd             svc:/network/ssh:default                sshd          Not applicable
          statd            svc:/network/nfs/client:default         nfs.server    Not applicable
                           svc:/network/nfs/server:default
          svc.startd       svc:/system/svc/restarter:default       N/A           Not applicable
          syseventd        svc:/system/sysevent:default            devfsadm      Not applicable
          sysidpm,         svc:/system/sysidtool:system            sysid.sys     Not applicable
          sysidns,
          sysidroot,
          sysidsys
          sysidnet         svc:/system/sysidtool:net               sysid.net     Not applicable
          syslogd          svc:/system/system-log:default          syslog        Not applicable
          ttymon           svc:/system/console-login:default       inittab       Not applicable
          utmpd            svc:/system/utmp:default                utmpd         Not applicable
          vold             svc:/system/filesystem/volfs:default    volmgt        Not applicable
          xntpd            svc:/network/ntp:default                xntpd         Not applicable
          ypbind           svc:/network/nis/client:default         rpc           Not applicable
Avaya CMS R16.2 Security                                                          November 2010    59
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
         Table 1: SMF Services
          Service          FMRI                                     Run Script     inetd Service
          Name
          ypserv           svc:/network/nis/server:default          rpc            Not applicable
          ypxfrd           svc:/network/nis/server:default          rpc            Not applicable
          zoneadm          svc:/system/zones:default                N/A            Not applicable
          None             svc:/network/loopback:default            network        Not applicable
          None             svc:/network/physical:default            network        Not applicable
Solaris 9
       Solaris 9 does not have the Service Management Facility. It uses traditional flat files to manage
       /etc/inetd.conf and the inetd daemon services on the system. Specifically, the /etc/
       inetd.conf file is used.
       Services typically provided using inetd include:
         ●    ftp: File transport protocol which allows users to transport files between remote sites.
          ● telnet: A protocol used to open user sessions from remote sites.
          ● exec, in.rexecd: Remote execution server that allows remote users to execute commands
              on the system provided they have proper authorization.
          ● rlogin: An older method of opening remote sessions, being replaced by telnet.
          ● rsh: Remote shell that you use to execute commands on a remote host.
          ● talk: A communication program that allows two users to talk by copying lines from one
              user's terminal to the other.
          ● finger: A service that allows users to get information about other users currently logged in
              on the local system or remote systems.
          ● comsat: A server that notifies users when they receive mail. The biff program is used to
              turn comsat service on and off for each user.
          ● uucp, uucico:The daemon that processes Unix to Unix copy (UUCP) file transfer requests
              that were queued by uucp or uux.
          ● netstat: A service that displays network connections, routing tables, and other networking
              information about a system. This works on the local system and over a network.
       There are several others, but these are some of the more common services. Most of the list is
       disabled by default on CMS systems. These services can be controlled (added/removed) by
       adding or deleting (commenting out) lines in the file "/etc/inedt.conf". If you make a change to
       this file, you must restart the inetd daemon with the command:
             kill -HUP inetd
60   Avaya CMS R16.2 Security                                                             November 2010
                                                                                                Solaris 9
The inetd configuration file
      The file /etc/inetd.conf is used to configure these networking services. Its format is:
      service      socket type        protocol   flags    user     server path     server arguments
      This is explained in more detail in the "How Linux Works" document.
Limiting services to your machine to specific addresses
         1. If your system is not set for services to use the tcpd daemon rather than the usual deamon
            by substituting the following in the "/etc/inetd.conf" file"
         2. Change lines like this:
            finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd
         3. To this:
            finger stream tcp nowait nobody /usr/sbin/tcpd in.fingerd
         4. Change the hosts deny file so the following lines are included with the comments:
            ALL: ALL
            ALL: PARANOID
         5. Change the hosts.allow file to allow services to desired TCP/IP addresses. For example:
            ALL:   10.1.0.153, 10.1.2.252
            fingerd: 10.1.1.3
         6. Reset the inetd deamon by issuing the command "kill -HUP inetd".
To disable a network service completely
      To disable remote services like finger, who, and w, you must modify /etc/inetd.conf file.
      To disable finger services for example, change the /etc/inetd.conf file so the line that says
      "in.fingerd" at the end, is commented out. Do the same for any other services that you do
      not want to run. Then make the inetd daemon reload its configuration file and restart with the
      command "kill -HUP inetd".
Avaya CMS R16.2 Security                                                         November 2010        61
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
CMS permissive use support policy
       As of October 3, 2006, the following "Permissive Use" policy applies to CMS and must be taken
       into consideration when modifying the CMS system:
             Call Management System (CMS) Standard Operating Environment
             Under the terms of relevant hardware and software support contracts, Avaya will support
             the entire system, hardware and software, from end to end, managing the escalation and
             resolution of problems with any system component to the correct support organization.
             This includes hardware and software categorized as "standard" product. "Standard"
             product refers to configurations that have been initially designed, tested and certified by
             Avaya.
             Some customers require the platform to perform other functions (for example: co-resident
             applications), or to connect with non-standard hardware configurations. Such
             configurations are specifically not recommended, but in the case where they are utilized,
             Avaya Global Services will continue to support the CMS application in a "permissive use"
             mode. For these non-standard configurations, the Avaya Global Services ITAC or Center
62   Avaya CMS R16.2 Security                                                            November 2010
                                                                    CMS permissive use support policy
            of Excellence will troubleshoot problems with the CMS application, but cannot and will not
            accept responsibility for end-to-end system integrity. When operating outside of a
            "standard" configuration, the customer has the added responsibility of managing the
            non-standard configuration and can incur additional charges when Avaya Global Services
            resources are required.
            See Permissive Use statement below for a complete description of the permissive support
            policy and terms and conditions with respect to non-standard CMS configurations.
            Permissive Use of Non-Standard CMS Configurations
            Policy:
            Avaya will allow and thereby support permissive use of non-standard networking,
            non-standard terminal equipment, and other application packages in conjunction with
            CMS. Avaya will not withdraw support of the CMS application if it is determined that other
            packages, applications, or hardware are running concurrently. The software packages
            and hardware connectivity that are running concurrently with the CMS can well be
            packages that are sold and toaab0111 Utilities, Token Ring LAN, or other physical
            interfaces including wallboards), as well as other vendor applications. Non-standard
            configurations are not to be installed by Avaya personnel.
            Avaya reserves the right to implement enhancements or modifications of this policy at any
            time without providing prior written or verbal notice to Avaya maintenance contract
            customers.
            Responsibilities under the Policy:
            Avaya:
            Avaya's responsibilities are limited to correcting faults with the standard CMS application.
            CMS customers operating in a non-standard environment who are seeking assistance
            from Avaya will be subject to standard maintenance response times. They are not eligible
            for priority queuing. When a trouble is reported to Avaya, and it is determined that other
            applications or non-standard terminals, link or hardware connectivity are being used,
            Avaya can require that this non-standard hardware and software be removed from the
Avaya CMS R16.2 Security                                                           November 2010     63
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
                    system and the system be returned to a standard configuration in order to be able to
                    diagnose the CMS trouble. Reasonable and timely effort will be made to troubleshoot the
                    issue prior to requiring the CMS to be returned to a standard configuration; however, this
                    can be the only way to separate CMS troubles from other non-standard issues. This
                    reconfiguration decision is the sole responsibility of the Avaya Tier III engineer.
                    Upgrades: If it is determined that standard Avaya upgrade processes will be impacted by
                    the existence of non-standard configurations, Avaya will not perform said upgrade until the
                    CMS is returned to an Avaya "standard" configuration.
                    Customer:
                    If Avaya requires, it will be the responsibility of the customer to perform a reconfiguration of
                    CMS to return it to a standard configuration. Customers must take notice that the CMS
                    system can remain in a trouble state until this reconfiguration can be performed. Avaya
                    will not be held responsible for any associated damages that can result from this period of
                    delay.
                    Billing:
                    If trouble shooting can only be performed outside of the times of any applicable CMS
                    software support contract (warranty or maintenance), the customer will be billed
                    then-current premium Time and Material charges.
                    If it is determined that the trouble is no longer present after this re-configuration, the
                    customer will be billed Time and Material charges for the trouble shooting effort,
                    regardless of any pre-existing hardware or software contract agreements.
                   Note:
       Note:            This policy is subject to change in the future and is reproduced here for reference
                        purposes only.
Links to Avaya security resource
       List of current versions of the security documents are shown below. Note that these documents
       typically change for each release. You can access these documents at www.avaya.com/
       support.
               ●    Avaya CMS R15 documentation
               ●    Avaya CMS R13 Software Installation, Maintenance and Troubleshooting Guide
                    (07-300338), CID 106947
               ●    Avaya Call Management System: Switch Connections, Administration & Troubleshooting
                    (07-300739): CID 82509 - See CID 121524 FOR R14 (07-601582)
               ●    Avaya Call Management System: LAN Backup Guide (07-601523) CID 106955 - See CID
                    121520 for R14 (07-601589)
               ●    Avaya CMS capacities: CID 114395. See CID 121514 for R14.
64   Avaya CMS R16.2 Security                                                                       November 2010
                                                                   Links to Avaya security resource
         ●   Avaya Call Management System Release 13 Administration (07-600956)
         ●   Avaya Call Management System Release 13 External Call History Interface (07-300737),
             CID 106956. See CID 121516 for R14.
         ●   R3V11 CMS Maintenance Logs Guide -Issue 1.1 (most current version): CID 90815
         ●   Customer Procedures For Securing CMS Servers (for CMS R3V8, R3V9 and R3V11)
Avaya CMS R16.2 Security                                                      November 2010     65
Appendix A: Enabling and Disabling Services in Solaris 9 and 10
66   Avaya CMS R16.2 Security                                     November 2010
Appendix B: CMS security/Hardening offer
CMS security / Hardening offer
      The Avaya Enterprise Security Practice offers CMS Security Hardening, an in-depth review of
      the CMS system that identifies vulnerabilities. It configures the hardening measures needed to
      bring older CMS systems into compliance with today's security requirements. For new CMS
      systems, this custom configuration can also deliver a method to prevent multiple sessions from
      a single agent and to close inactive agent sessions automatically after a timeout period.
      The following security measures can be included in a hardening engagement. Note that items
      with an asterisk have already been delivered by default in newer CMS systems and generally
      apply to CMS systems prior to R12 ONLY:
         ●   Install any critical Solaris security patches not yet installed.
         ●   Disable all unnecessary network daemons (services) for older CMS systems*.
         ●   Reconfigure the Solaris system stack to reduce the risk of buffer overflow attacks*.
         ●   Modify Telnet and FTP login banners to obfuscate operating system information.
         ●   Disable direct login access to "root" ID*.
         ●   Disable privileged accounts from accessing the system using FTP*.
         ●   Modify network device driver characteristics to prevent IP forwarding and redirects*.
         ●   Reconfigure TCP stack to use smarter TCP sequence numbers*.
         ●   Tighten file permissions in /etc and its subdirectories*.
         ●   Modify file permissions and ownership of user shells*.
         ●   Unless CMS utilizes HA Auto-Sync package, remove any "rhosts" files in CMS users'
             home directories.
         ●   Prevent users from sharing authentication credentials.
         ●   Implement Password Aging: All CMS user accounts are required to change their password
             once every 186 days. Users are notified one week before password expires.
         ●   Display a customized warning message for restricted use, prior to login prompt.
         ●   Display of customized warning message, after authentication, of corporate security
             policies must be adhered to and that unauthorized usage can result in disciplinary action.
         ●   Install a script to disable user accounts that have not been utilized for the past 90 days.
         ●   Lock "anonymous" and FTP user accounts*.
Avaya CMS R16.2 Security                                                             November 2010         67
Appendix B: CMS security/Hardening offer
         ●   Schedule automatic nightly logoff of users.
         ●   Install various logging packages for advanced auditing.
68   Avaya CMS R16.2 Security                                          November 2010