<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cron - security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939291#M113333</link>
    <description>Hi Tom,&lt;BR /&gt;if the system administrator is not solely responsible for the running of all cron jobs, he/she is not able to detect which jobs look  supicious - thus allowing more room for hackers, e.g. via anonymous ftp downloads.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;John K.&lt;BR /&gt;</description>
    <pubDate>Mon, 31 Mar 2003 13:19:33 GMT</pubDate>
    <dc:creator>john korterman</dc:creator>
    <dc:date>2003-03-31T13:19:33Z</dc:date>
    <item>
      <title>cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939287#M113329</link>
      <description>All,&lt;BR /&gt;&lt;BR /&gt;I've noticed that in the AusCERT "UNIX Security Checklist v2.0", they recommend that I "CONSIDER disallowing cron for regular users".&lt;BR /&gt;&lt;BR /&gt;I'm inclined to do this for scheduling/performance reasons.  But can somebody explain to me what the security risks might be of allowing cron access to regular users?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Tom&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Mar 2003 12:46:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939287#M113329</guid>
      <dc:creator>Tom Dawson</dc:creator>
      <dc:date>2003-03-31T12:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939288#M113330</link>
      <description>I guess I would ask: Why do regular users need to use cron? If it's something that they need, then maybe they need to place it into a production process that should be monitored.&lt;BR /&gt;&lt;BR /&gt;my $.02&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Mon, 31 Mar 2003 12:49:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939288#M113330</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2003-03-31T12:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939289#M113331</link>
      <description>Because you lose central control of the scheduling process, which can lead in performance problems and workload issues.&lt;BR /&gt;&lt;BR /&gt;Share and Enjoy! Ian</description>
      <pubDate>Mon, 31 Mar 2003 12:55:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939289#M113331</guid>
      <dc:creator>Ian Dennison_1</dc:creator>
      <dc:date>2003-03-31T12:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939290#M113332</link>
      <description>Tom,&lt;BR /&gt;&lt;BR /&gt;As a general rule, I want the developers to come to me and explaing exactly what their process does and exactly why they have to have it regularly scheduled before I'll allow it on MY system.  I'm the one that's responsible for the system's performance, so I want to know what's scheduled and when.  It's more of a control issue than a security issue to me.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Mon, 31 Mar 2003 13:06:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939290#M113332</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-31T13:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939291#M113333</link>
      <description>Hi Tom,&lt;BR /&gt;if the system administrator is not solely responsible for the running of all cron jobs, he/she is not able to detect which jobs look  supicious - thus allowing more room for hackers, e.g. via anonymous ftp downloads.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;John K.&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Mar 2003 13:19:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939291#M113333</guid>
      <dc:creator>john korterman</dc:creator>
      <dc:date>2003-03-31T13:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939292#M113334</link>
      <description>Hi Tom,&lt;BR /&gt;&lt;BR /&gt;In other words, try to minimize the use of cron for regular users. It can affect your system heavily. So if they need the use of cron, explain them their responsibilities.&lt;BR /&gt;&lt;BR /&gt;Sorry, but I don't believe in "it's my system" anymore, that was 20 years ago. Now it has become the bussiness system and we only recommend.&lt;BR /&gt;&lt;BR /&gt;Although, when they start fingerpointing, make sure you have explained the risks, so you can point back :)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regs David</description>
      <pubDate>Mon, 31 Mar 2003 13:20:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939292#M113334</guid>
      <dc:creator>David_246</dc:creator>
      <dc:date>2003-03-31T13:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939293#M113335</link>
      <description>Our policy allows cron for the following users:&lt;BR /&gt;&lt;BR /&gt;root&lt;BR /&gt;oracle&lt;BR /&gt;sag&lt;BR /&gt;&lt;BR /&gt;The last two users own large database applications that require a complex schedule of events to stay running in an optimized fashion.&lt;BR /&gt;&lt;BR /&gt;Regular users have no need for cron and its a security and performance hazard.  Its not like windows where everyone gets a schedule and most don't use it.  We don't let our Windows users see or change that schedule either.&lt;BR /&gt;&lt;BR /&gt;Don't consider disallowing cron for regular users, do it.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 31 Mar 2003 13:34:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939293#M113335</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-31T13:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939294#M113336</link>
      <description>David,&lt;BR /&gt;&lt;BR /&gt;How about "Its MY job to save you from yourself?" In my experience, if you do not assert your responsibility for the OS as the resident expert in that area, any non-SysAdmin armed with a couple of buzzwords can make your life merry hell!&lt;BR /&gt;&lt;BR /&gt;I dislike the "Us vs Them" situation too, but it's "Them" that usually need to adjust their perception.&lt;BR /&gt;&lt;BR /&gt;Share and Enjoy! Ian</description>
      <pubDate>Mon, 31 Mar 2003 14:15:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939294#M113336</guid>
      <dc:creator>Ian Dennison_1</dc:creator>
      <dc:date>2003-03-31T14:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939295#M113337</link>
      <description>And "Them" aren't usually there to help when the system crashes, unless it's to ask "Us" why it's taking so long to get "Their" system back up.&lt;BR /&gt;&lt;BR /&gt;;^)</description>
      <pubDate>Mon, 31 Mar 2003 14:28:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939295#M113337</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-31T14:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939296#M113338</link>
      <description>Hee, What would do you like more to do ??&lt;BR /&gt;&lt;BR /&gt;Adding a cron user, or bringing a system back online due to a user failure ?&lt;BR /&gt;&lt;BR /&gt;I'dd prefer the more challenging one :)&lt;BR /&gt;&lt;BR /&gt;If you have things covered well enough these are the moments you can get your advantages out of!&lt;BR /&gt;&lt;BR /&gt;Maybe, I like it too much to play, Pete :)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Best Regs David</description>
      <pubDate>Mon, 31 Mar 2003 14:49:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939296#M113338</guid>
      <dc:creator>David_246</dc:creator>
      <dc:date>2003-03-31T14:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: cron - security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939297#M113339</link>
      <description>All,&lt;BR /&gt;&lt;BR /&gt;Thanks for the replies.  You've all pointed out most of the same reasons why I'm disinclined to give out cron access.  In our shop, the dispute is over whether to allow it for the oracle user.  I'm leaning strongly towards not allowing it so that I can maintain better control over scheduling, and indirectly, system performance.&lt;BR /&gt;&lt;BR /&gt;Thanks again,&lt;BR /&gt;Tom&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Mar 2003 16:16:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cron-security/m-p/2939297#M113339</guid>
      <dc:creator>Tom Dawson</dc:creator>
      <dc:date>2003-03-31T16:16:50Z</dc:date>
    </item>
  </channel>
</rss>

