<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Locking the Unix root user. in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778092#M262665</link>
    <description>You lock root by executing passwd -f files -l root; however, if you do this you will not be able to su root -- because the account is disabled. Using that approach sudo would be required. In any event, as long as the account exists (even if locked), processes are allowed to run.&lt;BR /&gt;&lt;BR /&gt;What I think they want you to do is create a file, /etc/securetty with a single entry 'console' in it. That will allow root to only login directly as root on the console -- which presumably is in a secure location. Uses can then su - root from anyu terminal.&lt;BR /&gt;</description>
    <pubDate>Wed, 26 Apr 2006 09:23:06 GMT</pubDate>
    <dc:creator>A. Clay Stephenson</dc:creator>
    <dc:date>2006-04-26T09:23:06Z</dc:date>
    <item>
      <title>Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778088#M262661</link>
      <description>In order to increase security on our Unix systems we’ve been asked to lock the root user and create our own logons and then  do an “su – root” whenever we require root access.&lt;BR /&gt;&lt;BR /&gt;My first question is how do we “lock” the root user and also what are the implications/issues of us locking the root user?... eg we use HP’s Data Protector (OmniBack) to do our backups and the filesystem backups are done using the root user, so if we were to lock the root user (some how) would the backups still work?&lt;BR /&gt;&lt;BR /&gt;By the way we are running HP-UX 11, HP-UX 11i &amp;amp; HP-UX 11 v2 operating systems.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Khalil&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2006 09:12:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778088#M262661</guid>
      <dc:creator>Khalil Ahmed</dc:creator>
      <dc:date>2006-04-26T09:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778089#M262662</link>
      <description>Hi,&lt;BR /&gt;by 'locking' do you mean no telnet access direct to root?&lt;BR /&gt;Most of our machines only allow direct access to root on the console by adding to /etc/profile:&lt;BR /&gt;         if [ $LOGNAME = "root" -a "`tty`" != "/dev/console" ]  ; then&lt;BR /&gt;                  echo "Error: root logins are only allowed on the console."&lt;BR /&gt;                  exit 1&lt;BR /&gt;         fi&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2006 09:16:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778089#M262662</guid>
      <dc:creator>Peter Godron</dc:creator>
      <dc:date>2006-04-26T09:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778090#M262663</link>
      <description>Hi Khalil,&lt;BR /&gt;&lt;BR /&gt;To expand on Peter's reply to restrict root access simply create the following file&lt;BR /&gt;/etc/securetty&lt;BR /&gt;and put only the text &lt;BR /&gt;console&lt;BR /&gt;in it.&lt;BR /&gt;Then make sure it's root:sys 400&lt;BR /&gt;&lt;BR /&gt;Then root can *only* login from the console port.&lt;BR /&gt;I would not totally lock root out as sometimes console access is the *only* way to fix something.&lt;BR /&gt;&lt;BR /&gt;My $0.02,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 26 Apr 2006 09:19:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778090#M262663</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2006-04-26T09:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778091#M262664</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;To force users to 'su' to root, create '/etc/securetty' and put the strnig "console" on a line in the file.  This permits root to login at the console, only.&lt;BR /&gt;&lt;BR /&gt;Also, build the '/etc/default/security' file.  You may want to define the users who can 'su' to root with the 'SU_ROOT_GROUP' variable value.&lt;BR /&gt;&lt;BR /&gt;See the manpages for more information:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/B2355-60127/security.4.html" target="_blank"&gt;http://docs.hp.com/en/B2355-60127/security.4.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Wed, 26 Apr 2006 09:21:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778091#M262664</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2006-04-26T09:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778092#M262665</link>
      <description>You lock root by executing passwd -f files -l root; however, if you do this you will not be able to su root -- because the account is disabled. Using that approach sudo would be required. In any event, as long as the account exists (even if locked), processes are allowed to run.&lt;BR /&gt;&lt;BR /&gt;What I think they want you to do is create a file, /etc/securetty with a single entry 'console' in it. That will allow root to only login directly as root on the console -- which presumably is in a secure location. Uses can then su - root from anyu terminal.&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2006 09:23:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778092#M262665</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-04-26T09:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778093#M262666</link>
      <description>I agree with Jeff.  As much as you can secure your environment by implementing sudo and by making sure that root can only log on directly from the console (if you use ssh I would also disable PermitRootLogin in sshd_config).  &lt;BR /&gt;&lt;BR /&gt;You could also implement a special group that can only su to root in /etc/default/security and only SA could have that group. &lt;BR /&gt;&lt;BR /&gt;But I definitely wouldn't put a lock on root per say as it could cause more trouble than help. &lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2006 09:26:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778093#M262666</guid>
      <dc:creator>Marco Santerre</dc:creator>
      <dc:date>2006-04-26T09:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778094#M262667</link>
      <description>Guys, this recommendation has come from external auditors, who are a royal pain in the neck! The auditors would like direct root logon (telnet or console) blocked period.&lt;BR /&gt;&lt;BR /&gt;There are only two of us administaring the systems, and personally neither of us would be particularly keen on locking the root user. So, what we'd really also like is to have a number of reasons (ie the downsides) against locking the root user, to counter this recommendation.&lt;BR /&gt;&lt;BR /&gt;Cheers</description>
      <pubDate>Wed, 26 Apr 2006 09:45:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778094#M262667</guid>
      <dc:creator>Khalil Ahmed</dc:creator>
      <dc:date>2006-04-26T09:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778095#M262668</link>
      <description>Simply - supportability &amp;amp; uptime&lt;BR /&gt;If for any reason root has to login to fix something you're out of luck.&lt;BR /&gt;You'd have to power down the system.&lt;BR /&gt;I've never seen this type of request even in SOX audits. I think it's *way* to draconian.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 26 Apr 2006 09:49:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778095#M262668</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2006-04-26T09:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778096#M262669</link>
      <description>...sorry forgot to mention, what about our filesystem backups via Data Protector, which use root access, will they still work?&lt;BR /&gt;&lt;BR /&gt;Khalil</description>
      <pubDate>Wed, 26 Apr 2006 09:50:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778096#M262669</guid>
      <dc:creator>Khalil Ahmed</dc:creator>
      <dc:date>2006-04-26T09:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778097#M262670</link>
      <description>If you must lock root then DP will still run. As I mentioned earlier, in this case, you will need to install sudo and use it in lieu of su - root because you will always be prompted for root's passwd when you su as a regular user -- and because root is locked the password will always fail. Sudo will require you to know your regular password. In this case, I don't see that using sudo is any more secure than restricting direct root login only on the console. It's also a bad use of sudo because good sudo practice involves extremely restrictive commands. In this case, you will simply be spawning a shell with UID 0 -- a very wide-open environment.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Plan B. Create another UID 0 account and su as that (unlocked) user. It's state-of-the-art stupid and a worse choice than restricting root to only the console but it does meet the strict requirements set by your auditors.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2006 10:57:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778097#M262670</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2006-04-26T10:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778098#M262671</link>
      <description>We have similar audit standards here.  We use the 'console' line in the /etc/securetty file to keep people form telnet-ing as root.&lt;BR /&gt;&lt;BR /&gt;I have never heard of any audit reason that would require you to lock the root account from console logins as well.  You definitely want to be able to use root from the console.  Otherwise problems could definetely occur where you'd be forced to shut down the machine and boot to single-user to gain access.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2006 12:39:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778098#M262671</guid>
      <dc:creator>Jason Ray</dc:creator>
      <dc:date>2006-04-26T12:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778099#M262672</link>
      <description>I have another meeting with the D&amp;amp;T auditor today and I will find out what he means by locking root, as it's clear that this is definitely not practical. However, restricting to root console access only may be the way to go and should keep the auditors (plus management!) happy.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Apr 2006 04:15:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778099#M262672</guid>
      <dc:creator>Khalil Ahmed</dc:creator>
      <dc:date>2006-04-27T04:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778100#M262673</link>
      <description>Hi,&lt;BR /&gt;have you had any luck with the auditors?&lt;BR /&gt;Are the solutions provided ok?</description>
      <pubDate>Tue, 02 May 2006 10:11:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778100#M262673</guid>
      <dc:creator>Peter Godron</dc:creator>
      <dc:date>2006-05-02T10:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: Locking the Unix root user.</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778101#M262674</link>
      <description>some points would be appreciated.</description>
      <pubDate>Tue, 02 May 2006 12:16:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-the-unix-root-user/m-p/3778101#M262674</guid>
      <dc:creator>Nick D'Angelo</dc:creator>
      <dc:date>2006-05-02T12:16:12Z</dc:date>
    </item>
  </channel>
</rss>

