PING User Program


The PING program is used to test whether another host is reachable . PING sends an Internet Control Message Protocol (ICMP) echo request message to a host, expecting an ICMP echo reply to be returned. PING measures the round-trip time of the message exchange and monitors any packet loss across network paths.

Caution

PING (Packet Internet Groper). The name of a program used in the Internet to test reachability of destinations by sending them an ICMP echo request and wait-ing for a reply. The term has survived the original program and is now used like a verb as in, " please ping host A to see if it is alive ."

RISK PING is a reporting program only and does not pose any security risks unless a virus or Trojan horse creates a "ping of death" issue.

Securing PING

BP-FILE-PING-01 PING should be secured "UUNU".

BP-OPSYS-LICENSE-01 PING must be LICENSED.

BP-OPSYS-OWNER-01 PING should be owned by SUPER.SUPER.

BP-OPSYS-FILELOC-01 PING must reside in $SYSTEM.SYSnn

Discovery Questions

Look here:

FILE-POLICY

Is PINGing allowed from this system?

Policy

OPSYS-OWNER-01

Who owns the PING object file?

Fileinfo

OPSYS-LICENSE-01

Is the PING object file licensed?

Fileinfo

FILE-PING-01

Is the PING object file secured correctly?

Fileinfo

Related Topics

TCP/IP




HP NonStop Server Security 2004
HP NonStop Server Security 2004
ISBN: 159059035X
EAN: N/A
Year: 2004
Pages: 157

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net