<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Limit login attempts without trusted system in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196116#M165722</link>
    <description>The only way is trusted. I wasn't around with the dinosaurs, but I do remember reading about these custom logins. &lt;BR /&gt;&lt;BR /&gt;signed T-Rex</description>
    <pubDate>Wed, 18 Feb 2004 18:02:15 GMT</pubDate>
    <dc:creator>Michael Tully</dc:creator>
    <dc:date>2004-02-18T18:02:15Z</dc:date>
    <item>
      <title>Limit login attempts without trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196113#M165719</link>
      <description>Is there a way to limit the number of times a password can fail before the account is automatically locked?  I see /etc/default/security, but no way to handle that particular parameter.&lt;BR /&gt;&lt;BR /&gt;Perhaps a trusted system is the only way?</description>
      <pubDate>Wed, 18 Feb 2004 17:45:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196113#M165719</guid>
      <dc:creator>jmb</dc:creator>
      <dc:date>2004-02-18T17:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Limit login attempts without trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196114#M165720</link>
      <description>Unless you feel up to writing your own custom login program and a database to keep up with login attempts then Trusted is your only option. In the Old Days of UNIX, when dinosaurs roamed the Earth, it was quite common to do your own login.&lt;BR /&gt;</description>
      <pubDate>Wed, 18 Feb 2004 17:57:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196114#M165720</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2004-02-18T17:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Limit login attempts without trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196115#M165721</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I believe you cannot enforce the account lockout on bad login attempts without converting the system to trusted. You can apply quite a few restrictions with /etc/default/security (man security for more information). But this feature is available with trusted systems.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Wed, 18 Feb 2004 18:01:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196115#M165721</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-02-18T18:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: Limit login attempts without trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196116#M165722</link>
      <description>The only way is trusted. I wasn't around with the dinosaurs, but I do remember reading about these custom logins. &lt;BR /&gt;&lt;BR /&gt;signed T-Rex</description>
      <pubDate>Wed, 18 Feb 2004 18:02:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196116#M165722</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2004-02-18T18:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Limit login attempts without trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196117#M165723</link>
      <description>OK, that's what I thought..&lt;BR /&gt;&lt;BR /&gt;And on a related issue, are there any "gotchas" with converting to trusted?  I've read previous threads about losing current passwords, and also keeping a couple of root sessions going until after the conversion.&lt;BR /&gt;&lt;BR /&gt;Can this be convert be done on larger, older (11.0, 11i)) systems with relative ease?  Any reasons to NOT do it?</description>
      <pubDate>Wed, 18 Feb 2004 18:08:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196117#M165723</guid>
      <dc:creator>jmb</dc:creator>
      <dc:date>2004-02-18T18:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Limit login attempts without trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196118#M165724</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;This can be done relatively easy. Make sure the following&lt;BR /&gt;&lt;BR /&gt;1. encrypted password entries from /etc/passwd are not being used by anything on the system.&lt;BR /&gt;2. User accounts will be immediately expired. After converting the system to trusted, immediately un-expire the passwords. You can do it through either by SAM or with the command '/usr/lbin/modprdef -m exptm=0"&lt;BR /&gt;&lt;BR /&gt;You may face issues with the users that have the passwords longer than 8 chars before. Ask them use only the first 8 chars until they change their passwords.&lt;BR /&gt;&lt;BR /&gt;You can use the command 'tsconvert' to convert and 'tsconvert -r' to unconvert.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Wed, 18 Feb 2004 18:17:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/limit-login-attempts-without-trusted-system/m-p/3196118#M165724</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-02-18T18:17:50Z</dc:date>
    </item>
  </channel>
</rss>

