<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: protecting the root account in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196697#M324210</link>
    <description>First, remember that users may have set up .rhosts files, so if this is permitted exclude these from your search.&lt;BR /&gt;&lt;BR /&gt;You might try this to locate .rhost files...you may wish to run this when things are quiet, cause find takes up some resources.&lt;BR /&gt;&lt;BR /&gt;find /&lt;DIR path=""&gt; -name .rhosts -print&lt;BR /&gt;&lt;BR /&gt;Rgrds,&lt;BR /&gt;Rita&lt;BR /&gt;&lt;/DIR&gt;</description>
    <pubDate>Tue, 13 May 2008 11:24:19 GMT</pubDate>
    <dc:creator>Rita C Workman</dc:creator>
    <dc:date>2008-05-13T11:24:19Z</dc:date>
    <item>
      <title>protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196691#M324204</link>
      <description>how can i prevent root account to remote connect?</description>
      <pubDate>Tue, 13 May 2008 10:36:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196691#M324204</guid>
      <dc:creator>zenus</dc:creator>
      <dc:date>2008-05-13T10:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196692#M324205</link>
      <description>One thing you can do is to ensure that there are NO .rhosts or hosts.equiv on your systems...&lt;BR /&gt;&lt;BR /&gt;Rgrds,&lt;BR /&gt;Rita</description>
      <pubDate>Tue, 13 May 2008 10:38:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196692#M324205</guid>
      <dc:creator>Rita C Workman</dc:creator>
      <dc:date>2008-05-13T10:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196693#M324206</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;You can if you wish disable remote login and require console only login.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://groups.google.com/group/comp.unix.questions/browse_thread/thread/a9a13d004ff7bf28/1fe6e6401cd58e71" target="_blank"&gt;http://groups.google.com/group/comp.unix.questions/browse_thread/thread/a9a13d004ff7bf28/1fe6e6401cd58e71&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;How far you go in this idea depends on how hard you want it to be for you to fix the system when it requires authorized work.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 13 May 2008 10:45:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196693#M324206</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2008-05-13T10:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196694#M324207</link>
      <description>how and where can i verify that? (.rhosts and hosts.equiv)</description>
      <pubDate>Tue, 13 May 2008 10:45:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196694#M324207</guid>
      <dc:creator>zenus</dc:creator>
      <dc:date>2008-05-13T10:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196695#M324208</link>
      <description>u can see like these&lt;BR /&gt;&lt;BR /&gt;more .rhosts&lt;BR /&gt;more /etc/hosts.equiv&lt;BR /&gt;# more .rhosts&lt;BR /&gt;&lt;BR /&gt;data1           root&lt;BR /&gt;data1.domain    root&lt;BR /&gt;data2           root&lt;BR /&gt;data2.domain    root&lt;BR /&gt;&lt;BR /&gt;data1         oracle&lt;BR /&gt;data2        oracle&lt;BR /&gt;data1# more /etc/hosts.equiv&lt;BR /&gt;&lt;BR /&gt;data2 oracle&lt;BR /&gt;data2 root&lt;BR /&gt;data1 oracle&lt;BR /&gt;data1 root&lt;BR /&gt;u have to check the entries in .rhosts file and hosts.equiv file u have to check it &lt;BR /&gt;in order to part of security&lt;BR /&gt;&lt;BR /&gt;thanks and regards&lt;BR /&gt;&lt;BR /&gt;Sajjad&lt;BR /&gt;</description>
      <pubDate>Tue, 13 May 2008 10:55:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196695#M324208</guid>
      <dc:creator>Sajjad Sahir</dc:creator>
      <dc:date>2008-05-13T10:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196696#M324209</link>
      <description>The most important features have been mentioned:&lt;BR /&gt; &lt;BR /&gt;Create the securetty file like this:&lt;BR /&gt; &lt;BR /&gt;print "console" &amp;gt; /etc/securetty&lt;BR /&gt; &lt;BR /&gt;Now, no one can login as root unless they are using the system console.&lt;BR /&gt; &lt;BR /&gt;Remove any .rhosts file in root's $HOME directory. Remove /etc/hosts.equiv if you are not using the 'r' commands (rlogin, rcp and remsh) or at least remove any root entry in that file.&lt;BR /&gt; &lt;BR /&gt;The best way to remove root access is to change the root password every day to a random value. No one will know the root password and therefore must use two logins to get root access: one as an ordinary user and then use sudo to run single commands as root.&lt;BR /&gt; &lt;BR /&gt;Also, turn off VUE or CDE so remote Xwindow desktop is not available. You can still use Xwindows but without the desktop feature.&lt;BR /&gt; &lt;BR /&gt;Consider using only ssh rather than telnet and if not needed, turn off ftp (use scp instead).</description>
      <pubDate>Tue, 13 May 2008 11:01:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196696#M324209</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2008-05-13T11:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: protecting the root account</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196697#M324210</link>
      <description>First, remember that users may have set up .rhosts files, so if this is permitted exclude these from your search.&lt;BR /&gt;&lt;BR /&gt;You might try this to locate .rhost files...you may wish to run this when things are quiet, cause find takes up some resources.&lt;BR /&gt;&lt;BR /&gt;find /&lt;DIR path=""&gt; -name .rhosts -print&lt;BR /&gt;&lt;BR /&gt;Rgrds,&lt;BR /&gt;Rita&lt;BR /&gt;&lt;/DIR&gt;</description>
      <pubDate>Tue, 13 May 2008 11:24:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-the-root-account/m-p/4196697#M324210</guid>
      <dc:creator>Rita C Workman</dc:creator>
      <dc:date>2008-05-13T11:24:19Z</dc:date>
    </item>
  </channel>
</rss>

