<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Root user password causing security hole... in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496918#M20205</link>
    <description>Yes, I believe we are.</description>
    <pubDate>Wed, 21 Feb 2001 22:37:07 GMT</pubDate>
    <dc:creator>Daniel Yap</dc:creator>
    <dc:date>2001-02-21T22:37:07Z</dc:date>
    <item>
      <title>Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496916#M20203</link>
      <description>If anyone has seen this, please help...&lt;BR /&gt;I stumbled across a problem where the root password is set, yet when ANY user 'su' and enter a blank password they are granted entry as 'root'.  The password set for root is not blank, yet somehow the blank entry is also accepted.  Any clues on where to start looking?&lt;BR /&gt;Thanks in advance.  This even happens upon login, rlogin, and telnet as 'root'.</description>
      <pubDate>Wed, 21 Feb 2001 22:16:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496916#M20203</guid>
      <dc:creator>Daniel Yap</dc:creator>
      <dc:date>2001-02-21T22:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496917#M20204</link>
      <description>Are you using NIS? and if so, is it setup correctly.</description>
      <pubDate>Wed, 21 Feb 2001 22:19:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496917#M20204</guid>
      <dc:creator>Andy Monks</dc:creator>
      <dc:date>2001-02-21T22:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496918#M20205</link>
      <description>Yes, I believe we are.</description>
      <pubDate>Wed, 21 Feb 2001 22:37:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496918#M20205</guid>
      <dc:creator>Daniel Yap</dc:creator>
      <dc:date>2001-02-21T22:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496919#M20206</link>
      <description>if 'ypbind' is running you are!&lt;BR /&gt;&lt;BR /&gt;So, if so check your local /etc/passwd file. It will have a line that begins with a "+". It should be after the 'local only users'. So, after all the system users is a minimum.</description>
      <pubDate>Wed, 21 Feb 2001 22:45:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496919#M20206</guid>
      <dc:creator>Andy Monks</dc:creator>
      <dc:date>2001-02-21T22:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496920#M20207</link>
      <description>Andy, &lt;BR /&gt;  'ypbind' is not running, and there is no '+' entry in the /etc/passwd file.  I guess we are NOT running NIS.  Sorry.  Any other ideas?</description>
      <pubDate>Wed, 21 Feb 2001 23:01:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496920#M20207</guid>
      <dc:creator>Daniel Yap</dc:creator>
      <dc:date>2001-02-21T23:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496921#M20208</link>
      <description>What command are you using to set the root password?&lt;BR /&gt;&lt;BR /&gt;What does the /etc/passwd entry for root look like?&lt;BR /&gt;&lt;BR /&gt;-sam</description>
      <pubDate>Wed, 21 Feb 2001 23:07:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496921#M20208</guid>
      <dc:creator>Sam Nicholls</dc:creator>
      <dc:date>2001-02-21T23:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496922#M20209</link>
      <description>Hi Daniel,&lt;BR /&gt;&lt;BR /&gt;If you're NOT using NIS, remove the line starting with 'passwd:' in the file /etc/nsswitch.conf&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Dan&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2001 06:09:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496922#M20209</guid>
      <dc:creator>Dan Hetzel</dc:creator>
      <dc:date>2001-02-22T06:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496923#M20210</link>
      <description>The entry for 'root' in the /etc/passwd file is as follows:&lt;BR /&gt;  root:vIoK1y0bdoV5E:0:3::/:/sbin/sh&lt;BR /&gt;&lt;BR /&gt;There is no 'nsswitch.conf' in /etc.  There are only example files which could be copied to /etc/nsswitch.conf.&lt;BR /&gt;&lt;BR /&gt;Am I simply overlooking something?</description>
      <pubDate>Thu, 22 Feb 2001 14:37:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496923#M20210</guid>
      <dc:creator>Daniel Yap</dc:creator>
      <dc:date>2001-02-22T14:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496924#M20211</link>
      <description>You may be missing something.&lt;BR /&gt;Q:  Is this on ALL clients that people can su with no passwd?&lt;BR /&gt;Q:  If you are using NIS, where is the "+::0:0:::" in /etc/passwd?  It should be the LAST line!&lt;BR /&gt;&lt;BR /&gt;Q:  Do any of the local or NIS users have a UID of 0?  This is the most critical!  I have seen many backdoors made by people assigning a UID of 0 to an ID.  This UID means the user is really root already, so a su is only beneficial for the accounting system.&lt;BR /&gt;&lt;BR /&gt;Make sure that No user is assigned UID=0, GID=0!.  Make sure permissions on /etc/passwd and /etc/group are 444.  Make permissions on "/" 555, chown root "/" chgrp root "/".&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Thu, 22 Feb 2001 14:46:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496924#M20211</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2001-02-22T14:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496925#M20212</link>
      <description>Daniel,&lt;BR /&gt;&lt;BR /&gt;a few things that may be worth checking :-&lt;BR /&gt;&lt;BR /&gt;1. the 'root' user is the first entry in the passwd file.&lt;BR /&gt;2. the 'root' user is only in the passwd file once.&lt;BR /&gt;3. no other user had a uid of '0'.&lt;BR /&gt;  awk -F: '{ print $3 " " $1 }' /etc/passwd | sort -n | more&lt;BR /&gt;&lt;BR /&gt;Andy</description>
      <pubDate>Thu, 22 Feb 2001 17:20:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496925#M20212</guid>
      <dc:creator>Andy Monks</dc:creator>
      <dc:date>2001-02-22T17:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496926#M20213</link>
      <description>Sorry it took me a while to get back with you.  I verified all that you guys have suggested and we are not using NIS and 'root' is the first entry in /etc/passwd and is the only user w/ UID 0 and no other user is in the 'root' group.  I am at a loss as to where else to look.  Any other help or suggestions would be greatly appreciated.  Thanks again guys.</description>
      <pubDate>Fri, 23 Feb 2001 15:08:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496926#M20213</guid>
      <dc:creator>Daniel Yap</dc:creator>
      <dc:date>2001-02-23T15:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496927#M20214</link>
      <description>Hmmm, this is strange.&lt;BR /&gt;&lt;BR /&gt;I do have something to try, but don't do it with users on the system.&lt;BR /&gt;&lt;BR /&gt;Firstly, take a copy of the existing /etc/passwd file and put it somewhere safe.&lt;BR /&gt;&lt;BR /&gt;The copy the passwd file in /usr/newconfig/etc to /etc (over-writing the existing one).&lt;BR /&gt;&lt;BR /&gt;Then add a new user (using sam or useradd) and also assign root a new password. Then try your test again.&lt;BR /&gt;&lt;BR /&gt;This should at least prove if it's the passwd file or something else.&lt;BR /&gt;&lt;BR /&gt;After you've finished the test, copy the old passwd file back.&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Feb 2001 16:54:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496927#M20214</guid>
      <dc:creator>Andy Monks</dc:creator>
      <dc:date>2001-02-23T16:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496928#M20215</link>
      <description>...from an audit/security background: either your system has been significantly compromised (hacked) or you are familiar with the concepts of "social engineering"</description>
      <pubDate>Fri, 23 Feb 2001 20:53:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496928#M20215</guid>
      <dc:creator>dw_3</dc:creator>
      <dc:date>2001-02-23T20:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496929#M20216</link>
      <description>Andy, I tried your test with replacing the /etc/passwd file.  It still allowed me to enter without a password for root.  I have placed a call into HP Support, but if you still have any other ideas, let me know.  Thanks for all your help.</description>
      <pubDate>Mon, 26 Feb 2001 20:21:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496929#M20216</guid>
      <dc:creator>Daniel Yap</dc:creator>
      <dc:date>2001-02-26T20:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496930#M20217</link>
      <description>Check what version of su you are using.  There could be a problem there.&lt;BR /&gt;&lt;BR /&gt;Here is su on my 10.20 system:&lt;BR /&gt;&lt;BR /&gt;# ll /usr/bin/su&lt;BR /&gt;-r-sr-xr-x   1 root       bin          20480 Feb 20  1998 /usr/bin/su&lt;BR /&gt;[scrooge:root] 1241 /&lt;BR /&gt;# file /usr/bin/su&lt;BR /&gt;/usr/bin/su:    s800 shared executable dynamically linked&lt;BR /&gt;[scrooge:root] 1242 /&lt;BR /&gt;# what /usr/bin/su&lt;BR /&gt;/usr/bin/su:&lt;BR /&gt;         $Revision: 80.1.1.1 $&lt;BR /&gt;         PATCH_10_20: su.o 98/02/20&lt;BR /&gt;&lt;BR /&gt;Here is su on my 11.0 system:&lt;BR /&gt;&lt;BR /&gt;[uran:root] 223 /tmp/pww&lt;BR /&gt;# ll /usr/bin/su&lt;BR /&gt;-r-sr-xr-x   1 root       bin          24576 Aug  6  1998 /usr/bin/su&lt;BR /&gt;[uran:root] 224 /tmp/pww&lt;BR /&gt;# file /usr/bin/su&lt;BR /&gt;/usr/bin/su:    PA-RISC1.1 shared executable dynamically linked&lt;BR /&gt;[uran:root] 225 /tmp/pww&lt;BR /&gt;# what /usr/bin/su&lt;BR /&gt;/usr/bin/su:&lt;BR /&gt;         $Revision: 82.15.1.1 $&lt;BR /&gt;         PATCH_11_00: su.o 98/08/06&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Feb 2001 20:37:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496930#M20217</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2001-02-26T20:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496931#M20218</link>
      <description>You might also search your system for other versions of su.  There could be a rogue version out there that is getting used instead of the su in /usr/bin.  You could do a 'which su' to see which one you are using by default.</description>
      <pubDate>Mon, 26 Feb 2001 20:39:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496931#M20218</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2001-02-26T20:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496932#M20219</link>
      <description>which su is not going to catch aliases or functions.  The preferred method to determine where a command originates is:&lt;BR /&gt;&lt;BR /&gt;whence -v su&lt;BR /&gt;&lt;BR /&gt;Because sysadmins so commonly type su, hackers will hide a false su in your $PATH, aliases or function libraries.  which will not find these aliases.  Try this:&lt;BR /&gt;&lt;BR /&gt;alias su=aBADcommand&lt;BR /&gt;which su&lt;BR /&gt;whence -v su&lt;BR /&gt;&lt;BR /&gt;which will not tell what the shell is going to do with su.</description>
      <pubDate>Tue, 27 Feb 2001 02:55:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496932#M20219</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2001-02-27T02:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Root user password causing security hole...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496933#M20220</link>
      <description>As a followup to Bill's response, try running /usr/bin/su and see what happens.</description>
      <pubDate>Tue, 27 Feb 2001 20:48:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-password-causing-security-hole/m-p/2496933#M20220</guid>
      <dc:creator>Andy Monks</dc:creator>
      <dc:date>2001-02-27T20:48:57Z</dc:date>
    </item>
  </channel>
</rss>

