<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encrypted Password Audit in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384564#M349232</link>
    <description>By the way doing a 'man 4 passwd' explains in a bit more detail about the passwd field in the passwd file.&lt;BR /&gt;</description>
    <pubDate>Fri, 20 Mar 2009 17:20:47 GMT</pubDate>
    <dc:creator>Patrick Wallek</dc:creator>
    <dc:date>2009-03-20T17:20:47Z</dc:date>
    <item>
      <title>Encrypted Password Audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384559#M349227</link>
      <description>I am being asked to validate all users have encrypted passwords on a non-trusted (no shadow) 11iV1.  I am having an issue understanding how to do this.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Mike</description>
      <pubDate>Fri, 20 Mar 2009 16:16:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384559#M349227</guid>
      <dc:creator>Simpson</dc:creator>
      <dc:date>2009-03-20T16:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted Password Audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384560#M349228</link>
      <description>&amp;gt; I am being asked to validate all users have encrypted passwords &lt;BR /&gt;&lt;BR /&gt;By whom? You need to go back to them and ask for details.&lt;BR /&gt;&lt;BR /&gt;All passwords are encrypted. If you are being asked to check if there are passwordless accounts, you have to check /etc/passwd. &lt;BR /&gt;&lt;BR /&gt;If you are being asked if all unix logins over the network are encrypted, that's a different story. You need to stop using telnet/rlogin/ftp and start using ssh.</description>
      <pubDate>Fri, 20 Mar 2009 16:26:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384560#M349228</guid>
      <dc:creator>TTr</dc:creator>
      <dc:date>2009-03-20T16:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted Password Audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384561#M349229</link>
      <description>Well, all passwords on a UNIX system are hashed (not really encrypted). If the system is non-trusted and not using shadow password, the hashed password is in /etc/passwd (second colon-separated field).</description>
      <pubDate>Fri, 20 Mar 2009 16:30:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384561#M349229</guid>
      <dc:creator>Jeff_Traigle</dc:creator>
      <dc:date>2009-03-20T16:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted Password Audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384562#M349230</link>
      <description>Hi,&lt;BR /&gt;   You can check it on /etc/passwd file.&lt;BR /&gt;If User1:liJnoo0kgFv2c:107:20:,,,:/bsr/bsr247:/usr/bin/sh&lt;BR /&gt;&lt;BR /&gt;if the second field containing some thing like " liJnoo0kgFv2c" , user having ncrypted passwd.&lt;BR /&gt;&lt;BR /&gt;rgds&lt;BR /&gt;Bijeesh</description>
      <pubDate>Fri, 20 Mar 2009 16:35:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384562#M349230</guid>
      <dc:creator>Bijeesh</dc:creator>
      <dc:date>2009-03-20T16:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted Password Audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384563#M349231</link>
      <description>There are some things you need to understand as part of your audit as well.&lt;BR /&gt;&lt;BR /&gt;There are 3 possibilities for the password field in /etc/password.&lt;BR /&gt;&lt;BR /&gt;1) A **VALID** encrypted/hashed password.  This is a string that is 13 characters long and contains **ONLY** '.', '/', 'A-Z', 'a-z' and '0-9' (not counting the single quotes).  There could be another string, separated by a comma, after the hashed password that denotes password aging.&lt;BR /&gt;&lt;BR /&gt;2) An **INVALID** "password".  This can be a string that is **NOT** 13 characters long, or a 13 character string that contains a character **OTHER THAN** those described above.&lt;BR /&gt;&lt;BR /&gt;An account set up like could be considered to be locked since it would be impossible to log into it.&lt;BR /&gt;&lt;BR /&gt;3) An **EMPTY** passowrd.  This is where the 2nd field in the /etc/passwd file is **BLANK**.  For example: user1::1:2:GECOS:/home/me:/usr/bin/sh&lt;BR /&gt;&lt;BR /&gt;Note that there is nothing in the field after the user name.&lt;BR /&gt;&lt;BR /&gt;All of these should be taken into account when doing your audit.&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Mar 2009 17:03:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384563#M349231</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2009-03-20T17:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypted Password Audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384564#M349232</link>
      <description>By the way doing a 'man 4 passwd' explains in a bit more detail about the passwd field in the passwd file.&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Mar 2009 17:20:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/encrypted-password-audit/m-p/4384564#M349232</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2009-03-20T17:20:47Z</dc:date>
    </item>
  </channel>
</rss>

