<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: changing /dev/console permissions in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417588#M203565</link>
    <description>This kind of /etc/profile code may work:&lt;BR /&gt;&lt;BR /&gt;if [ "$chkname" = "root" ]&lt;BR /&gt;then&lt;BR /&gt;        echo "..........."&lt;BR /&gt;else&lt;BR /&gt;#       echo "making the terminal file secure from hackers."&lt;BR /&gt;  mesg n &amp;gt;/dev/null&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;if [ "$LOGNAME" = "root" ]&lt;BR /&gt;then&lt;BR /&gt;  echo "Native root login. Securing the terminal file."&lt;BR /&gt;  mesg n &amp;gt;/dev/null&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;# just change the device.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Mon, 08 Nov 2004 16:36:16 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2004-11-08T16:36:16Z</dc:date>
    <item>
      <title>changing /dev/console permissions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417587#M203564</link>
      <description>All,&lt;BR /&gt;Due to security requirements, I would like to change the permissions on /dev/console so it is not world writable when someone is logged in on the console (especially root). I've searched here and found a couple of ideas that didn't work.&lt;BR /&gt;&lt;BR /&gt;I've checked two different systems where on one this works and on the other it doesn't and there are no differences on the file permissions when either logged in on the console or not logged in (when logged in they're the same on both, when not logged in they're the same on both).&lt;BR /&gt;&lt;BR /&gt;I've also looked at the idea of changing the group ownership of /dev/console to sys, but on the system where this works, this isn't how it was done either. &lt;BR /&gt;&lt;BR /&gt;Any suggestions? I've been all through the processes and can't find any way of implementing this. I could program it somehow, but would rather not if someone has a better solution.&lt;BR /&gt;&lt;BR /&gt;TIA...&lt;BR /&gt;&lt;BR /&gt;Gonzo&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Nov 2004 16:26:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417587#M203564</guid>
      <dc:creator>Kevin Bushman</dc:creator>
      <dc:date>2004-11-08T16:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: changing /dev/console permissions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417588#M203565</link>
      <description>This kind of /etc/profile code may work:&lt;BR /&gt;&lt;BR /&gt;if [ "$chkname" = "root" ]&lt;BR /&gt;then&lt;BR /&gt;        echo "..........."&lt;BR /&gt;else&lt;BR /&gt;#       echo "making the terminal file secure from hackers."&lt;BR /&gt;  mesg n &amp;gt;/dev/null&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;if [ "$LOGNAME" = "root" ]&lt;BR /&gt;then&lt;BR /&gt;  echo "Native root login. Securing the terminal file."&lt;BR /&gt;  mesg n &amp;gt;/dev/null&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;# just change the device.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 08 Nov 2004 16:36:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417588#M203565</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-11-08T16:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: changing /dev/console permissions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417589#M203566</link>
      <description>The permissions are set to 622 as part of the normal console login. Normally write permission is not considered to be a security risk because even if the root user (logged in at the console) saw "Please enter root password for verification" and were dumb enough to respond unless a process had read access to that port no damage would be done. You should also be aware that some daemons which might not be run as root) might write error messages to the console. One option would be to modify root's .profile and if connected to /dev/console determined by "who am i" then set the port permissions but this is really not a risk.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 08 Nov 2004 16:43:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/changing-dev-console-permissions/m-p/3417589#M203566</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2004-11-08T16:43:03Z</dc:date>
    </item>
  </channel>
</rss>

