<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: password protecting boot sequence in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099948#M146701</link>
    <description>I believe that it exists on 700 series workstations.&lt;BR /&gt;&lt;BR /&gt;I wouldnt recommend it for several reasons below. Just make your Datacenter more secure and restrict the root password.&lt;BR /&gt;&lt;BR /&gt;However, if you ever have a kernel hang upon reboot, you will be in a recovery mode.&lt;BR /&gt; &lt;BR /&gt;IF you ever have patching go wrong and hang upon reboot, you will be in a recovery mode.&lt;BR /&gt; &lt;BR /&gt;IF you ever have 3rd party software hang upon reboot, you will be in recovery mode.&lt;BR /&gt; &lt;BR /&gt;If you ever have a root disk fail and dont have "no quorum" set, you will be in a H/W replacement mode before you can boot your box.</description>
    <pubDate>Wed, 22 Oct 2003 13:20:35 GMT</pubDate>
    <dc:creator>Todd McDaniel_1</dc:creator>
    <dc:date>2003-10-22T13:20:35Z</dc:date>
    <item>
      <title>password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099944#M146697</link>
      <description>Is it possible to password protect the boot sequence, so that you can't break out to the boot menu?  Or if you can breakout to it, that all commands are password protected?  Thanks!</description>
      <pubDate>Wed, 22 Oct 2003 13:02:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099944#M146697</guid>
      <dc:creator>Mark Stewart</dc:creator>
      <dc:date>2003-10-22T13:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099945#M146698</link>
      <description>No I do not think so. Why are you trying to make some guy's life miserable.&lt;BR /&gt;&lt;BR /&gt;Regds&lt;BR /&gt;Sanjay</description>
      <pubDate>Wed, 22 Oct 2003 13:04:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099945#M146698</guid>
      <dc:creator>Sanjay_6</dc:creator>
      <dc:date>2003-10-22T13:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099946#M146699</link>
      <description>Mark,&lt;BR /&gt;&lt;BR /&gt;The ability to break out of the boot sequence is both a feature and a safe-guard.  Should an rc script get mis-configured, the only way to  fix the offending script is to break out, login, edit the script and reboot.  I don't think this is something you really want to do.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Oct 2003 13:06:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099946#M146699</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-10-22T13:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099947#M146700</link>
      <description>Ha!  More like security requirements making MY life difficult.&lt;BR /&gt;&lt;BR /&gt;I was 99% sure you couldn't, but just thought I'd toss this out there before I started arguing.  Thanks!</description>
      <pubDate>Wed, 22 Oct 2003 13:07:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099947#M146700</guid>
      <dc:creator>Mark Stewart</dc:creator>
      <dc:date>2003-10-22T13:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099948#M146701</link>
      <description>I believe that it exists on 700 series workstations.&lt;BR /&gt;&lt;BR /&gt;I wouldnt recommend it for several reasons below. Just make your Datacenter more secure and restrict the root password.&lt;BR /&gt;&lt;BR /&gt;However, if you ever have a kernel hang upon reboot, you will be in a recovery mode.&lt;BR /&gt; &lt;BR /&gt;IF you ever have patching go wrong and hang upon reboot, you will be in a recovery mode.&lt;BR /&gt; &lt;BR /&gt;IF you ever have 3rd party software hang upon reboot, you will be in recovery mode.&lt;BR /&gt; &lt;BR /&gt;If you ever have a root disk fail and dont have "no quorum" set, you will be in a H/W replacement mode before you can boot your box.</description>
      <pubDate>Wed, 22 Oct 2003 13:20:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099948#M146701</guid>
      <dc:creator>Todd McDaniel_1</dc:creator>
      <dc:date>2003-10-22T13:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099949#M146702</link>
      <description>You can make it so that you can't boot to single user without the root password, but I've never seen anything that will lock you out of the boot menu on a 9000 series.  They do make console lock devices, and other physical security devices.  If they are worried about this, they have much larger problems.&lt;BR /&gt;&lt;BR /&gt;-Brian.</description>
      <pubDate>Thu, 23 Oct 2003 02:10:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099949#M146702</guid>
      <dc:creator>Brian Markus</dc:creator>
      <dc:date>2003-10-23T02:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: password protecting boot sequence</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099950#M146703</link>
      <description>You mentioned breaking out to the boot menu.&lt;BR /&gt;Do you mean breaking in at the point:&lt;BR /&gt;Processor is booting from the first available device.&lt;BR /&gt;To discontinue, press any key within 10 second.&lt;BR /&gt;&lt;BR /&gt;If so, then the ability to interrupt can, I believe, be locked out by setting secure mode in the frimware - break in at the prompt to get the boot menu, enter CO to get the configuration menu, then enter SEC to display the secure mode flag.&lt;BR /&gt;I've never set secure mode (i.e. I've so far successfully resisted pressure to do so) and although I believe it operates a bit like a PC BIOS password (i.e. you don't need the password to boot, only to change boot parameters such as the boot device or to choose a boot option such as single user mode or ODE) I'd want to do a lot more research before enabling it.&lt;BR /&gt;&lt;BR /&gt;You can also - as others have said - set single user mode authentication, where the user can still interact with the firmware to choose single user mode or LVM maintenance mode, but need to enter a user name and password to interact with the machine. That user needs to be authorised to boot to single user mode (suggestion - as well as root, enable some other user with a shell set to false, then put their login details in an envelope in a safe on site - that way, if single user mode is needed and the password has to be disclosed, the password isn't much use for anything else).  I think this is only available in trusted mode.  One thing I've noticed about this is that, though it works for user-selected entry to these modes, it doesn't stop the person sat at the console being given a root privilege prompt in bcheckrc if there's a serious file system corruption which the automatic fsck cannot fix.&lt;BR /&gt;I don't know if you can do much about Ctrl-Backslash once the system has started running through its rc scripts, but I think you still need to enter a username and password if you break in in this way.&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Oct 2003 03:24:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-protecting-boot-sequence/m-p/3099950#M146703</guid>
      <dc:creator>Alan Turner</dc:creator>
      <dc:date>2003-10-23T03:24:46Z</dc:date>
    </item>
  </channel>
</rss>

