<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: su set to public executable in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265246#M177632</link>
    <description>I want to leave it alone however, according to auditors its a security breech. Here are the auditors comments.&lt;BR /&gt;&lt;BR /&gt;" The su command was set to public executable, with the result that account hacking by any users using this command would not be subject to intruder lockout."&lt;BR /&gt;&lt;BR /&gt;I was thinking chmod 4550 may do the trick ?&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;oz</description>
    <pubDate>Sun, 02 May 2004 21:23:21 GMT</pubDate>
    <dc:creator>OzTEXS</dc:creator>
    <dc:date>2004-05-02T21:23:21Z</dc:date>
    <item>
      <title>su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265244#M177630</link>
      <description>hi all,&lt;BR /&gt;&lt;BR /&gt;just looking through our audit report and it seems our "su" command is set to public executable, which is a audit breech.&lt;BR /&gt;&lt;BR /&gt;my question is, if the attributes of su are &lt;BR /&gt;"-r-sr-xr-x" how can I change this so its no longer public executable.&lt;BR /&gt;&lt;BR /&gt;We are running HP-UX v11.0 ?&lt;BR /&gt;&lt;BR /&gt;Kind Regards,&lt;BR /&gt;oz</description>
      <pubDate>Sun, 02 May 2004 19:37:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265244#M177630</guid>
      <dc:creator>OzTEXS</dc:creator>
      <dc:date>2004-05-02T19:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265245#M177631</link>
      <description>My first thought is that you don't want to change the execute permissions.  If you remove execute permissions for all you won't be able to su to root from a normal user login.  That could cause problems in future.  I'd leave it alone.&lt;BR /&gt;&lt;BR /&gt;Steven</description>
      <pubDate>Sun, 02 May 2004 20:57:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265245#M177631</guid>
      <dc:creator>Procnus</dc:creator>
      <dc:date>2004-05-02T20:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265246#M177632</link>
      <description>I want to leave it alone however, according to auditors its a security breech. Here are the auditors comments.&lt;BR /&gt;&lt;BR /&gt;" The su command was set to public executable, with the result that account hacking by any users using this command would not be subject to intruder lockout."&lt;BR /&gt;&lt;BR /&gt;I was thinking chmod 4550 may do the trick ?&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;oz</description>
      <pubDate>Sun, 02 May 2004 21:23:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265246#M177632</guid>
      <dc:creator>OzTEXS</dc:creator>
      <dc:date>2004-05-02T21:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265247#M177633</link>
      <description>I'd recommend you leave it alone. The 'su' binary is used by a number of items, especially scripts and many applications. I've never seen any auditing requirement in 20 years of IT that has stipulations like this. I would be getting these auditors to sign off on doing this making it there responsibility. I would never remove this access without questioning it quite strongly and even then if your system falls apart by not been able to administer it properly make sure your managment know who are the guilty party. Each use of 'su' is logged into the /var/adm/sulog in any case for auditing successful and unsuccessful. The best way of typing up passwords is to change them frequently using either (man4 password) or by setting your system to trusted. You could also implement 'sudo' particularly for sys admins.</description>
      <pubDate>Sun, 02 May 2004 21:39:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265247#M177633</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2004-05-02T21:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265248#M177634</link>
      <description>I've read the comments from your auditors ....&lt;BR /&gt;&lt;BR /&gt;The safeguard in the 'su' program is that any account other than root, requires a password to continue. Changing it can render your system useless. I would rather have the 'su' command open for use with the ability to make sure that a password is entered, rather than be able to log in as root directly. Changing it to 4550 is no good either. Is your system going to get hacked internally in your own company?? If you have the system in a DMZ for example (out in internet land) there are far better ways to secure your system.</description>
      <pubDate>Sun, 02 May 2004 21:48:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265248#M177634</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2004-05-02T21:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265249#M177635</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Su command has to be world executable. There is no beating around the bush with that. Do your auditors know what they are auditing and the impact in demanding things like this. Looks like this is their first experience with this kind of auditing.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;Regds&lt;BR /&gt;</description>
      <pubDate>Sun, 02 May 2004 21:51:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265249#M177635</guid>
      <dc:creator>Sanjay_6</dc:creator>
      <dc:date>2004-05-02T21:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265250#M177636</link>
      <description>The purpose of su is to allow an ordinary user to gain access to another account (including root). To disable public execution rights essentially disables the command for all but root. This could seriously disable your applications if they use su (like Oracle scripts).&lt;BR /&gt; &lt;BR /&gt;However, the implication that users could launch attacks without a lockout is not correct for patched versions of HP-UX. Repeated su attempts will lockout any target account, just like telnet attacks. su will not provide the attacker with any feedback that the account was disabled. su uses PAM for authentication just like login/passwd.</description>
      <pubDate>Sun, 02 May 2004 21:55:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265250#M177636</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2004-05-02T21:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: su set to public executable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265251#M177637</link>
      <description>Thanks all,&lt;BR /&gt;&lt;BR /&gt;i have sent an email to our head office admins to ask what they have their su command set at. this will give me an indication on how they have there system setup. &lt;BR /&gt;&lt;BR /&gt;Awaiting reply ....</description>
      <pubDate>Sun, 02 May 2004 21:57:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-set-to-public-executable/m-p/3265251#M177637</guid>
      <dc:creator>OzTEXS</dc:creator>
      <dc:date>2004-05-02T21:57:37Z</dc:date>
    </item>
  </channel>
</rss>

