<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Managing RootPasswords in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343663#M191256</link>
    <description>RB,&lt;BR /&gt;&lt;BR /&gt;  Any large site who are concerned about security will not go for NIS :-). and NIS+ is too cumbersome to maintain even on smaller sites.&lt;BR /&gt;&lt;BR /&gt;  Really visionary shops, spend $$$ and get a centralized user management softwares like KEON BOKS from RSA. BOKS is a wonderful security software with all kind of auditing and customization possible.It also does some encryption. So you dont have to worry about sniffers.&lt;BR /&gt;&lt;BR /&gt;  Some sites use remote services to distribute the account information and some use LDAP.&lt;BR /&gt;&lt;BR /&gt;  I am sure there are sites that use ADS or NTLM authentication for the unix users. This case the unix users dont have to remember two seperate passwords. they can use the same password as they do for logging in to the corporate domain network.&lt;BR /&gt;&lt;BR /&gt;  Given all these restrictions, how about if I suggest you a not-so-elegant way of doing this ? :-)&lt;BR /&gt;&lt;BR /&gt;1) TO generate the password random ,you can use /usr/lbin/modprpw with -x option&lt;BR /&gt;&lt;BR /&gt;   /usr/lbin/modprpw -x username&lt;BR /&gt;&lt;BR /&gt;2) modprpw expires the user account so, he/she will have to change the password upon next successful login. you can avoid this by using -v option of modprpw&lt;BR /&gt;&lt;BR /&gt;   /usr/lbin/modprpw -v username&lt;BR /&gt;&lt;BR /&gt;3) Create a script that prepares the list of files that are updated in the /tcb directory and also the information from /etc/passwd and /etc/group&lt;BR /&gt; &lt;BR /&gt;   The script should ftp these files to all the other system. automate the FTP transfer by manually coding the password in the script or using .netrc.&lt;BR /&gt;&lt;BR /&gt;4) In the clients create a script that runs of the cron and process the files that are FTPed from the server.&lt;BR /&gt;&lt;BR /&gt;  I know this is not going to look elegant and is not easy to implement as it sounds.&lt;BR /&gt;  &lt;BR /&gt;  But this is all I could come up with :-)&lt;BR /&gt;&lt;BR /&gt;-- Sundar.  &lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 29 Jul 2004 18:00:09 GMT</pubDate>
    <dc:creator>Sundar_7</dc:creator>
    <dc:date>2004-07-29T18:00:09Z</dc:date>
    <item>
      <title>Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343658#M191251</link>
      <description>Hello ,&lt;BR /&gt;&lt;BR /&gt; What are the options/tools available for managing root password changes on multiple servers (around 200+ servers , a mix of trusted HPservers  and Sunservers) on a regular basis(thrice a year)?   The password should be preferably randomly generated by the tool/script and not be the same for all the servers.&lt;BR /&gt;&lt;BR /&gt;Doing the change manually by logging on to each server is ruled out. Inefficient and tedious.&lt;BR /&gt;&lt;BR /&gt;Writing a script using remote services (remsh,rexec..) is not an option, since opening up access through .rhosts on all the servers is not allowed.&lt;BR /&gt;&lt;BR /&gt;What are the other options? How is this managed in large sites? &lt;BR /&gt;&lt;BR /&gt;regards&lt;BR /&gt;-RB</description>
      <pubDate>Wed, 28 Jul 2004 13:13:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343658#M191251</guid>
      <dc:creator>Roger Baptiste</dc:creator>
      <dc:date>2004-07-28T13:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343659#M191252</link>
      <description>With restrictions you have,&lt;BR /&gt;&lt;BR /&gt;NIS is the way to go. Trusted systems and NIS is not compatible, so you will have to go with NIS+.&lt;BR /&gt;&lt;BR /&gt;Also with ldap.&lt;BR /&gt;&lt;BR /&gt;Not worked on things like this, but these are the options I seem to fit your requirement.&lt;BR /&gt;&lt;BR /&gt;Anil</description>
      <pubDate>Wed, 28 Jul 2004 13:30:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343659#M191252</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2004-07-28T13:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343660#M191253</link>
      <description>Or install a third party security tool like UnixControl:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.tfstech.com/index.htm" target="_blank"&gt;http://www.tfstech.com/index.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Wed, 28 Jul 2004 14:06:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343660#M191253</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2004-07-28T14:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343661#M191254</link>
      <description>NIS+, NIS, or LDAP should not be used for the root password because you specifically need a means of logging in as root when those services are not available. In fact, you are instructed to always use local authenication for root. You also do not want multiple users with UID 0 as a possible workaround. If this were me, I would much prefer a single strong password for all the servers rather than different passwords -- unless the boxes are administered by different people. Multiple passwords instantly require a list and that is an instant security hole. NIS+ or LDAP is fine for all the regular users and would certainly be my method for 200+ boxes. &lt;BR /&gt;&lt;BR /&gt;There are a number of methods for batch updating root passwords. Probably the most straightforward would be to leverage expect supplied with a list of servers.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jul 2004 14:07:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343661#M191254</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2004-07-28T14:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343662#M191255</link>
      <description>Thanks for the responses so far.  Can the other experts around throw in their suggestions and the way they are doing this in a large site?&lt;BR /&gt;NIS+ is a no-no,   for the reasons already mentioned.  &lt;BR /&gt;&lt;BR /&gt;The criteria is, it should run from a single server and not use remote services.  No NIS/NIS+/LDAP either, for reasons already mentioned in the responses.&lt;BR /&gt;&lt;BR /&gt;Clay,  Can you please elaborate on the batch methods you mentioned. Also, an randomly generated password is preferred , rather than manual creativeones.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;thanks</description>
      <pubDate>Thu, 29 Jul 2004 17:05:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343662#M191255</guid>
      <dc:creator>Roger Baptiste</dc:creator>
      <dc:date>2004-07-29T17:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343663#M191256</link>
      <description>RB,&lt;BR /&gt;&lt;BR /&gt;  Any large site who are concerned about security will not go for NIS :-). and NIS+ is too cumbersome to maintain even on smaller sites.&lt;BR /&gt;&lt;BR /&gt;  Really visionary shops, spend $$$ and get a centralized user management softwares like KEON BOKS from RSA. BOKS is a wonderful security software with all kind of auditing and customization possible.It also does some encryption. So you dont have to worry about sniffers.&lt;BR /&gt;&lt;BR /&gt;  Some sites use remote services to distribute the account information and some use LDAP.&lt;BR /&gt;&lt;BR /&gt;  I am sure there are sites that use ADS or NTLM authentication for the unix users. This case the unix users dont have to remember two seperate passwords. they can use the same password as they do for logging in to the corporate domain network.&lt;BR /&gt;&lt;BR /&gt;  Given all these restrictions, how about if I suggest you a not-so-elegant way of doing this ? :-)&lt;BR /&gt;&lt;BR /&gt;1) TO generate the password random ,you can use /usr/lbin/modprpw with -x option&lt;BR /&gt;&lt;BR /&gt;   /usr/lbin/modprpw -x username&lt;BR /&gt;&lt;BR /&gt;2) modprpw expires the user account so, he/she will have to change the password upon next successful login. you can avoid this by using -v option of modprpw&lt;BR /&gt;&lt;BR /&gt;   /usr/lbin/modprpw -v username&lt;BR /&gt;&lt;BR /&gt;3) Create a script that prepares the list of files that are updated in the /tcb directory and also the information from /etc/passwd and /etc/group&lt;BR /&gt; &lt;BR /&gt;   The script should ftp these files to all the other system. automate the FTP transfer by manually coding the password in the script or using .netrc.&lt;BR /&gt;&lt;BR /&gt;4) In the clients create a script that runs of the cron and process the files that are FTPed from the server.&lt;BR /&gt;&lt;BR /&gt;  I know this is not going to look elegant and is not easy to implement as it sounds.&lt;BR /&gt;  &lt;BR /&gt;  But this is all I could come up with :-)&lt;BR /&gt;&lt;BR /&gt;-- Sundar.  &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Jul 2004 18:00:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343663#M191256</guid>
      <dc:creator>Sundar_7</dc:creator>
      <dc:date>2004-07-29T18:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Managing RootPasswords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343664#M191257</link>
      <description>RB,&lt;BR /&gt;&lt;BR /&gt;The attached C program may help you to generate random strong passwords and their encrypted strings.&lt;BR /&gt;&lt;BR /&gt;# encrypt&lt;BR /&gt;OKFBrfm:WkBJX5PPU8LzY&lt;BR /&gt;&lt;BR /&gt;The output can be divided into two portions with the delimiter ":", the first portion is the random generated password, and the second part is the encrypted string of the password, you can simply replace the second portion with the password of a particular user in the /etc/passwd (or /etc/shadow for Solaris users), the password is changed silently.&lt;BR /&gt;&lt;BR /&gt;In case you got a "/" in the encryted value, please discard it, as I found that it will cause problem:&lt;BR /&gt;&lt;BR /&gt;# encrypt&lt;BR /&gt;m6kw6NR:lGG/UBe.vDACQ    &amp;lt;- DISCARD!!!&lt;BR /&gt;&lt;BR /&gt;If you want it to encrypt a password you specify, say "1234567" you can:&lt;BR /&gt;&lt;BR /&gt;# encrypt&lt;BR /&gt;1234567:webdcfoCllqDQ&lt;BR /&gt;&lt;BR /&gt;If you have tried that out in small scale and have confidence with it, you can write your own .script to change the password regularly</description>
      <pubDate>Thu, 29 Jul 2004 21:45:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/managing-rootpasswords/m-p/3343664#M191257</guid>
      <dc:creator>Kenneth_19</dc:creator>
      <dc:date>2004-07-29T21:45:03Z</dc:date>
    </item>
  </channel>
</rss>

