HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 5.35 Use of UUCP security mechanisms

S 5.35 Use of UUCP security mechanisms

Initiation responsibility: IT Security Management, Administrators

Implementation responsibility: Administrators

The UUCP (Unix-to-Unix Copy) programme package is present as a standard feature in Unix systems and is also available for other operating systems allowing the exchange of data between IT systems as well as the invocation of commands on remote IT systems. The only prerequisite for this is the compatibility of the uucio programmes on the two systems involved. UUCP is extremely widespread, although it has decreased in significance, e.g. due to the capability to connect computer via ISDN by means of TCP/IP.

As a rule, UUCP is used to exchange Email and news between computers. It also allows log-in (cu) and execution of programmes (uux) on remote computers.

Different UUCP versions exist: In addition to the implementation by Peter Honeyman, David Nowitz and Brian E. Redman from 1983 (HoneyDanBer UUCP), frequent use is made of the original UUCP system from the AT&T Unix Version 7, whose second variant is currently available (and called Version 2 UUCP) or the Tahoe UUCP (delivered with BSD 4.3).

The UUCP variant being employed can be identified through the files in the /usr/lib/uucp directory (/etc/uucp on some systems): Version 2 UUCP contains the file L.sys, HoneyDanBer contains the file Systems.

Version 2 UUCP poses major security problems (errors in uucico, risk of incorrect configuration due to the complexity of the security-related administration files). For this reason, the HoneyDanBer UUCP should be used instead.

The following security aspects should generally be considered when UUCP is used:

Various configuration files must be set up to allow the use of UUCP. All settings must be documented, and deviations from the settings recommended in the following must be explained to allow an understanding of these modifications at a later stage.

The following files must be administered very carefully as they contain critical information for security. The files are located in the /usr/lib/uucp and /etc/uucp directories. Only the uucp user must have write access to these directories.

When UUCP is used, various protocol files are created. In the case of HoneyDanBer UUCP, these files are located in subdirectories of/usr/spool. Successful and invalid requests for connection, transmitted and received quantities of data, error messages and data transfer statistics are listed here. These protocol files must be evaluated regularly (cf. S 4.25 Use of logging in the Unix system).

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home