<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: avoid lost password in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094119#M310757</link>
    <description>thx reply ,&lt;BR /&gt;&lt;BR /&gt;"go into single user mode" need reboot the system , I think it is the worst case , so I would like to find a good method in advance I make that mistake .&lt;BR /&gt;&lt;BR /&gt;thx.</description>
    <pubDate>Tue, 30 Oct 2007 03:17:51 GMT</pubDate>
    <dc:creator>ust3</dc:creator>
    <dc:date>2007-10-30T03:17:51Z</dc:date>
    <item>
      <title>avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094117#M310755</link>
      <description>I have this exprience , when I want to change the user password by "passwd userid " but I miss to input the userid , then it change the root password , so I can't login root user again , I hv to do something to resume the root password , therefore , I would like to ask is there any good method to prevent this mistake in advance , so that I still can login as root when the password is lost ? thx</description>
      <pubDate>Tue, 30 Oct 2007 02:41:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094117#M310755</guid>
      <dc:creator>ust3</dc:creator>
      <dc:date>2007-10-30T02:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094118#M310756</link>
      <description>Make sure you use "/usr/bin/passwd" if you don't want to destroy the root password.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;so that I still can login as root when the password is lost&lt;BR /&gt;&lt;BR /&gt;You can always go into single user mode and reset the password.</description>
      <pubDate>Tue, 30 Oct 2007 02:45:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094118#M310756</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2007-10-30T02:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094119#M310757</link>
      <description>thx reply ,&lt;BR /&gt;&lt;BR /&gt;"go into single user mode" need reboot the system , I think it is the worst case , so I would like to find a good method in advance I make that mistake .&lt;BR /&gt;&lt;BR /&gt;thx.</description>
      <pubDate>Tue, 30 Oct 2007 03:17:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094119#M310757</guid>
      <dc:creator>ust3</dc:creator>
      <dc:date>2007-10-30T03:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094120#M310758</link>
      <description>There are some pros and cons, but consider to create another superuser for case of emergency and store the password on a safe place.&lt;BR /&gt;&lt;BR /&gt;see&lt;BR /&gt;man passwd&lt;BR /&gt;&lt;BR /&gt;"Multiple superusers are allowed, but are strongly discouraged.  That is because the system often stores user ID rather than user name. Having unique IDs for all users will guarantee a consistent mapping between user name and user ID."&lt;BR /&gt;&lt;BR /&gt;Caution: Never delete this account with SAM!</description>
      <pubDate>Tue, 30 Oct 2007 03:21:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094120#M310758</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2007-10-30T03:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094121#M310759</link>
      <description>&amp;gt;I think it is the worst case, so I would like to find a good method in advance I make that mistake.&lt;BR /&gt;&lt;BR /&gt;Well, I'm not sure this is any better security wise but you always add another superuser.&lt;BR /&gt;You can just copy root's line to another with a different name.&lt;BR /&gt;&lt;BR /&gt;(Of course the best way is to learn from your mistakes.  ;-)</description>
      <pubDate>Tue, 30 Oct 2007 03:24:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094121#M310759</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2007-10-30T03:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094122#M310760</link>
      <description>Another way would be to use a "special" user (your personal account?) in conjunction with SUDO. see&lt;BR /&gt;&lt;A href="http://hpux.asknet.de/hppd/hpux/Sysadmin/sudo-1.6.8p12/" target="_blank"&gt;http://hpux.asknet.de/hppd/hpux/Sysadmin/sudo-1.6.8p12/&lt;/A&gt;</description>
      <pubDate>Tue, 30 Oct 2007 03:25:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094122#M310760</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2007-10-30T03:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094123#M310761</link>
      <description>Just wondering, why can't you login with root anymore after this mistake ?&lt;BR /&gt;All you need to do is use the new password which you had just provided when you typed passwd without the userid.&lt;BR /&gt;&lt;BR /&gt;Best way to 'avoid' this issue is to start realising using root is a potential danger and think twice or even more before you press enter after typing a command.&lt;BR /&gt;Changing the password is not such a big deal but eg a typo with rm can be a total disaster.&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Nov 2007 04:09:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094123#M310761</guid>
      <dc:creator>Marcel Burggraeve</dc:creator>
      <dc:date>2007-11-01T04:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094124#M310762</link>
      <description>ust3,&lt;BR /&gt;&lt;BR /&gt; You may consider setup root equivalent as a standby in case you root password lost.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;WK&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Nov 2007 04:30:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094124#M310762</guid>
      <dc:creator>whiteknight</dc:creator>
      <dc:date>2007-11-01T04:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094125#M310763</link>
      <description>I don't really have much sympathy for this kind of mistake --- there is feedback in the loop so don't do it again. Generally this kind of dumb mistake occurs when an administrator routinely logs in as root rather than logging in as a regular user and only su's to root when needed and then immediately reverts to a normal user.&lt;BR /&gt;&lt;BR /&gt;Haviing multiple UID 0 accounts is considered very poor practice so I wouldn't go that route. You might consider setting up a sudo'ed command that will let you as a regular user run the passwd command as root.</description>
      <pubDate>Thu, 01 Nov 2007 09:14:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094125#M310763</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2007-11-01T09:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094126#M310764</link>
      <description>I don't really have much sympathy for this kind of mistake --- there is feedback in the loop so don't do it again. Generally this kind of dumb mistake occurs when an administrator routinely logs in as root rather than logging in as a regular user and only su's to root when needed and then immediately reverts to a normal user.&lt;BR /&gt;&lt;BR /&gt;Having multiple UID 0 accounts is considered very poor practice so I wouldn't go that route. You might consider setting up a sudo'ed command that will let you as a regular user run the passwd command as root.</description>
      <pubDate>Thu, 01 Nov 2007 09:14:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094126#M310764</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2007-11-01T09:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094127#M310765</link>
      <description>I have to agree with A. Clay!  The way to avoid it is to not make the mistake in the first place.&lt;BR /&gt;&lt;BR /&gt;This should be VERY easy to avoid.  If you are changing passwords for a user, when logged in as root, and forget to put the user-id on the command line, well that is your own fault and no fault of the systems.&lt;BR /&gt;&lt;BR /&gt;Doing 'passwd &lt;USERNAME&gt;' should not be that hard to remember.&lt;BR /&gt;&lt;BR /&gt;Now, that being said, I have sudo set up on ALL my machines (HP-UX and Linux) and ALWAYS use 'sudo su -' to log in as root.  I don't even know the root password to my machines.  It changes automatically daily.  So far I have had no problems with using sudo to login as root.&lt;BR /&gt;&lt;BR /&gt;I also agree that having multiple UID 0 accounts is a very BAD idea.  It is considered a high security risk in any system audit.&lt;/USERNAME&gt;</description>
      <pubDate>Thu, 01 Nov 2007 09:23:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094127#M310765</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2007-11-01T09:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094128#M310766</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;There is no reason to use root to reset user IDs. &lt;BR /&gt;&lt;BR /&gt;The root user account is supposed to be used to administer the system not operate it.&lt;BR /&gt;&lt;BR /&gt;You can use the sam restricted shell and grant password reset power to an operator user and let them use sam to reset the password.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 01 Nov 2007 09:25:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094128#M310766</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-11-01T09:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094129#M310767</link>
      <description>&amp;gt;&amp;gt;&amp;gt;There is no reason to use root to reset user IDs.&lt;BR /&gt;&lt;BR /&gt;root is the only id that can reset other users passwords.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;The root user account is supposed to be used to administer the system not operate it.&lt;BR /&gt;&lt;BR /&gt;Passwords are part of sys admin, at least in my mind.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;You can use the sam restricted shell and grant password reset power to an operator user and let them use sam to reset the password.&lt;BR /&gt;&lt;BR /&gt;This is just doing what it needs to do as root in the background.</description>
      <pubDate>Thu, 01 Nov 2007 09:36:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094129#M310767</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2007-11-01T09:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: avoid lost password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094130#M310768</link>
      <description>Just to take up Torsten's suggestion,&lt;BR /&gt;sudo is really making this easy by avoiding the mess more than one super user accounts are prone to cause, and with the added benefit of logging.&lt;BR /&gt;&lt;BR /&gt;Grab ixSudo from HP's Internet Express&lt;BR /&gt;because it is easiest to install.&lt;BR /&gt;&lt;BR /&gt;In the provided sudoers file, which you must edit only via visudo,&lt;BR /&gt;there's already rules for a group called wheel&lt;BR /&gt;(I think they have adopted this naming from FreeBSD)&lt;BR /&gt;If it doesn't already exist create it with groupadd wheel.&lt;BR /&gt;Then add any user who occasionally requires root privileges to group wheel (usermod -G wheel &lt;USER&gt;),&lt;BR /&gt;and uncomment any of these two (depending if you want your users to authorize by their password or not (for the latter the NOPASSWD stanza would apply)).&lt;BR /&gt;Of course you are free to do this with any other group name if you don't fancy wheel.&lt;BR /&gt;&lt;BR /&gt;# grep wheel /opt/iexpress/sudo/etc/sudoers&lt;BR /&gt;# Uncomment to allow people in group wheel to run all commands&lt;BR /&gt;# %wheel        ALL=(ALL)       ALL&lt;BR /&gt;# %wheel        ALL=(ALL)       NOPASSWD: ALL&lt;BR /&gt;&lt;/USER&gt;</description>
      <pubDate>Thu, 01 Nov 2007 09:54:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/avoid-lost-password/m-p/4094130#M310768</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2007-11-01T09:54:32Z</dc:date>
    </item>
  </channel>
</rss>

