S 5.35 Use of the security mechanisms of UUCP

Initiation responsibility: Administrator, IT Security Officer

Implementation responsibility: Administrator

The UUCP (Unix-to-Unix Copy) program package included in the standard scope of Unix systems and also available for other operating systems allows the exchange of data between IT systems and execution of commands on remote IT systems. The only prerequisite is the compatibility of the uucico programs on both systems involved. UUCP is widespread even if its importance has declined, e.g. due to the option of connecting computers using ISDN with the help of TCP/IP.

UUCP is normally used in order to exchange emails and news between computers (uucp). It also enables logging in (cu) and execution of programs (uux) on third party computers.

There are different UUCP variants: Along with the implementation developed by Peter Honeyman, David Nowitz, and Brian E. Redman in1983 (HoneyDanBer UUCP), the initial UUCP system of AT&T UNIX version 7, the second version of which is up to date (this UUCP implementation is therefore also called version 2 UUCP), or the Tahoe-UUCP (delivered together with BSD 4.3) are also frequently used.

The UUCP variant used can be recognised when looking at the files in the /usr/lib/uucp directory (/etc/uucp on some systems): In version 2 UUCP, the L.sys file can be found here; for HoneyDanBer UUCP, the Systems file.

Version 2 UUCP is characterised by severe security problems (error in uucico, risk of misconfiguration due to the complex form of the security-relevant administration files). Therefore, it should not be used and the HoneyDanBer UUCP should be used instead.

In general, the following security questions should be considered when using UUCP:

Different configuration files must be created in order to use UUCP. All settings must be documented and deviations from the settings mentioned below must include a short justification so that the purpose of this change can be comprehended later.

The following files must be administered with particular care, because they contain security-critical information. They are located in the directory /usr/lib/uucp and/or /etc/uucp). Only the uucp user must be provided write access to these directories.

When using UUCP, different log files are created automatically. For the HoneyDanBer UUCP, these can be found in the subdirectories of /usr/spool. Here, successful and rejected connection attempts, the sent and received amounts of data, error messages, and data transfer statistics are documented. These log files must be evaluated regularly (see also S 4.25 Use of logging in Unix systems).

Review questions: