<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Null password warning in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085176#M309635</link>
    <description>trusted is disabled on both system</description>
    <pubDate>Fri, 12 Oct 2007 03:58:58 GMT</pubDate>
    <dc:creator>OM IT Services</dc:creator>
    <dc:date>2007-10-12T03:58:58Z</dc:date>
    <item>
      <title>Null password warning</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085174#M309633</link>
      <description>Why I have this message on 11.23?&lt;BR /&gt;&lt;BR /&gt;HP-UX h3mih268 B.11.23 U ia64 (ta)&lt;BR /&gt;&lt;BR /&gt;login: root&lt;BR /&gt;Password: &lt;BR /&gt;You are not allowed to have a null password.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;On other system 11.23 I put Login:root, Password: "blank"(nothing and press enter) and I have not this message.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;???</description>
      <pubDate>Fri, 12 Oct 2007 03:47:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085174#M309633</guid>
      <dc:creator>OM IT Services</dc:creator>
      <dc:date>2007-10-12T03:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Null password warning</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085175#M309634</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Possible you are using trusted system ?&lt;BR /&gt;&lt;BR /&gt;WK</description>
      <pubDate>Fri, 12 Oct 2007 03:52:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085175#M309634</guid>
      <dc:creator>whiteknight</dc:creator>
      <dc:date>2007-10-12T03:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Null password warning</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085176#M309635</link>
      <description>trusted is disabled on both system</description>
      <pubDate>Fri, 12 Oct 2007 03:58:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085176#M309635</guid>
      <dc:creator>OM IT Services</dc:creator>
      <dc:date>2007-10-12T03:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Null password warning</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085177#M309636</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;Do you have checked the /etc/default/security file? It's possible that the ALLOW_NULL_PASSWORD parameter is disabled.&lt;BR /&gt;&lt;BR /&gt;Regards;&lt;BR /&gt;&lt;BR /&gt;J. Bravo.</description>
      <pubDate>Fri, 12 Oct 2007 06:40:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085177#M309636</guid>
      <dc:creator>J. Bravo</dc:creator>
      <dc:date>2007-10-12T06:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Null password warning</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085178#M309637</link>
      <description>Message or not - IMHO it is a very bad idea to use the root account without a password.&lt;BR /&gt;&lt;BR /&gt;Anyone with access to the system can destroy everything ...</description>
      <pubDate>Fri, 12 Oct 2007 07:00:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085178#M309637</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2007-10-12T07:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Null password warning</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085179#M309638</link>
      <description>there are no entry in /etc/default/security:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;h3mih268:/#uname -a&lt;BR /&gt;HP-UX h3mih268 B.11.23 U ia64 1157013024 unlimited-user license&lt;BR /&gt;h3mih268:/#grep -i null /etc/default/security &lt;BR /&gt;h3mih268:/#more /etc/default/security &lt;BR /&gt;# Security settings:&lt;BR /&gt;#       See security(4) for supported variables, their&lt;BR /&gt;#       interpretation, applicability restrictions, &lt;BR /&gt;#       and their default values.&lt;BR /&gt;#&lt;BR /&gt;#       NOTE: A short description of each supported variable&lt;BR /&gt;#       is also provided in this template for your convenience.&lt;BR /&gt;#       However, many of this information could change in the&lt;BR /&gt;#       future. For the most up-to-date information, please&lt;BR /&gt;#       refer to the security(4) man page.&lt;BR /&gt;&lt;BR /&gt;# Do not allow logins unless the home directory exists.&lt;BR /&gt;# NOTE:  This parameter only applies to the login(1)&lt;BR /&gt;# command and other services that call it indirectly.&lt;BR /&gt;# ABORT_LOGIN_ON_MISSING_HOMEDIR=1&lt;BR /&gt;&lt;BR /&gt;# Standard and Shadow modes only: Flag to&lt;BR /&gt;# enable/disable authentication when booting&lt;BR /&gt;# into single user mode&lt;BR /&gt;# BOOT_AUTH=0&lt;BR /&gt;&lt;BR /&gt;# Standard and Shadow modes only: When BOOT_AUTH=1,&lt;BR /&gt;# the list of users who are given authorization to&lt;BR /&gt;# boot the system into single user mode &lt;BR /&gt;# BOOT_USERS=root&lt;BR /&gt;&lt;BR /&gt;# Minimum length of NEW passwords.&lt;BR /&gt;# MIN_PASSWORD_LENGTH=8&lt;BR /&gt;&lt;BR /&gt;# Check for /etc/nologin at login time.  NOTE: This&lt;BR /&gt;# parameter only applies to the applications that&lt;BR /&gt;# use session management services provided by&lt;BR /&gt;# pam_hpsec(5) as configured in /etc/pam.conf, or&lt;BR /&gt;# those services that indirectly invoke the&lt;BR /&gt;# login(1) command.&lt;BR /&gt;# NOLOGIN=1&lt;BR /&gt;&lt;BR /&gt;# Maximum number of logins per user.  NOTE: This &lt;BR /&gt;# parameter only applies to the applications that&lt;BR /&gt;# use session management services provided by&lt;BR /&gt;# pam_hpsec(5) as configured in /etc/pam.conf, or&lt;BR /&gt;# those services that indirectly invoke the&lt;BR /&gt;# login(1) command.&lt;BR /&gt;# NUMBER_OF_LOGINS_ALLOWED=0&lt;BR /&gt;&lt;BR /&gt;# Trusted mode only: password history depth&lt;BR /&gt;# PASSWORD_HISTORY_DEPTH=4&lt;BR /&gt;&lt;BR /&gt;# Optional restrictions for new passwords&lt;BR /&gt;# PASSWORD_MIN_UPPER_CASE_CHARS=0&lt;BR /&gt;# PASSWORD_MIN_LOWER_CASE_CHARS=0&lt;BR /&gt;# PASSWORD_MIN_DIGIT_CHARS=1&lt;BR /&gt;# PASSWORD_MIN_SPECIAL_CHARS=2&lt;BR /&gt;&lt;BR /&gt;# Standard and Shadow modes only: number&lt;BR /&gt;# of days that passwords are valid&lt;BR /&gt;# PASSWORD_MAXDAYS=175&lt;BR /&gt;# PASSWORD_MINDAYS=14&lt;BR /&gt;&lt;BR /&gt;# Shadow mode only: number of days prior to&lt;BR /&gt;# password expiration to give a warning&lt;BR /&gt;# PASSWORD_WARNDAYS=14&lt;BR /&gt;&lt;BR /&gt;# New PATH upon su&lt;BR /&gt;# SU_DEFAULT_PATH=/sbin:/usr/sbin:/bin:/usr/bin&lt;BR /&gt;&lt;BR /&gt;# Force su to propagate specified unsafe&lt;BR /&gt;# environment variables.&lt;BR /&gt;# SU_KEEP_ENV_VARS=HOME,SHLIB_PATH&lt;BR /&gt;&lt;BR /&gt;# Users attempting to su to root must be a memeber&lt;BR /&gt;# of this group&lt;BR /&gt;# SU_ROOT_GROUP=wheel&lt;BR /&gt;&lt;BR /&gt;# Default umask value upon login. Note: This&lt;BR /&gt;# parameter controls umask(2) of all sessions&lt;BR /&gt;# initiated via pam_unix(5) and/or pam_hpsec(5).&lt;BR /&gt;# UMASK=022</description>
      <pubDate>Fri, 12 Oct 2007 08:15:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/null-password-warning/m-p/4085179#M309638</guid>
      <dc:creator>OM IT Services</dc:creator>
      <dc:date>2007-10-12T08:15:51Z</dc:date>
    </item>
  </channel>
</rss>

