<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Locking Out Users After Failed Logins--Not A Trusted System in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041113#M432890</link>
    <description>In order to do this you would have to write custom login programs. That is the way it was done before the days of shadowsed passwd and/or trusted systems.</description>
    <pubDate>Wed, 18 Apr 2007 13:25:12 GMT</pubDate>
    <dc:creator>A. Clay Stephenson</dc:creator>
    <dc:date>2007-04-18T13:25:12Z</dc:date>
    <item>
      <title>Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041111#M432888</link>
      <description>Is there a way to lock out users after x number of failed login attempts?  We do not have a trusted system and don't want to convert because of some potential application problems.  I've looked through threads and responses, but can't find the answer I really need (for the *@#$%! auditor).</description>
      <pubDate>Wed, 18 Apr 2007 12:58:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041111#M432888</guid>
      <dc:creator>Dave Thompson_7</dc:creator>
      <dc:date>2007-04-18T12:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041112#M432889</link>
      <description>Not possible without converting to a trusted system, as far as I know.</description>
      <pubDate>Wed, 18 Apr 2007 13:07:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041112#M432889</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2007-04-18T13:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041113#M432890</link>
      <description>In order to do this you would have to write custom login programs. That is the way it was done before the days of shadowsed passwd and/or trusted systems.</description>
      <pubDate>Wed, 18 Apr 2007 13:25:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041113#M432890</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2007-04-18T13:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041114#M432891</link>
      <description>Actually the only way to achieve that is by using the command "tsconvert" and convert your system in "trusted" , the normal env, using the /etc/passwd, or using shadow passwords (/etc/shadow) has not way to control that kind of things, with Trusted system you can control all those things.&lt;BR /&gt;&lt;BR /&gt;Admin guide at. :&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/B2355-90121/B2355-90121.pdf" target="_blank"&gt;http://docs.hp.com/en/B2355-90121/B2355-90121.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Wed, 18 Apr 2007 13:28:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041114#M432891</guid>
      <dc:creator>Marco A.</dc:creator>
      <dc:date>2007-04-18T13:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041115#M432892</link>
      <description>You mean you can't find the answer you really want.  &lt;BR /&gt;&lt;BR /&gt;If you are on HP-UX 11.11 you could take a look at Shadow passwords:&lt;BR /&gt;&lt;A href="http://h20293.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=ShadowPassword" target="_blank"&gt;http://h20293.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=ShadowPassword&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;But if your app won't support trusted, then the chances are probably slim that it will support shadow.&lt;BR /&gt;&lt;BR /&gt;You must face the fact that the base authentication does not support locking out users after X invalid logins.</description>
      <pubDate>Wed, 18 Apr 2007 13:29:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041115#M432892</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2007-04-18T13:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041116#M432893</link>
      <description>Have you actually tried a trusted system? The trusted mechhanism has been around so long on HP-UX that it is a very rare application that has problems. The  login/user/group functions that any application should be using make this invisible to the application itself.&lt;BR /&gt;&lt;BR /&gt;Even if you do create custom login programs which can lockout an account, you still have an almost unsurmountable obstacle to overcome in that the password hashes are visible and thus vulnerable to a guessing attack.</description>
      <pubDate>Wed, 18 Apr 2007 13:35:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041116#M432893</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2007-04-18T13:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041117#M432894</link>
      <description>Thanks for all the infomation.&lt;BR /&gt;&lt;BR /&gt;Just so you'll know, our application software has been ported from TI-990, TI-1500, &amp;amp; HP-9000 to the Itanium.  I don't know what problems may be encountered with some of our ftp scripts and file permissions.  And, yes, the shadow password file has been implemented with no problems (so far).&lt;BR /&gt;&lt;BR /&gt;I have contacted our software vendor to see if there are any hidden problems that I haven't thought of (or imagined).&lt;BR /&gt;&lt;BR /&gt;Thanks again.</description>
      <pubDate>Wed, 18 Apr 2007 13:41:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041117#M432894</guid>
      <dc:creator>Dave Thompson_7</dc:creator>
      <dc:date>2007-04-18T13:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041118#M432895</link>
      <description>Any ftp client software should be complete insulated from the underlying user verification functions -- so those should not be a cause for concern. The same holds true for file permissions.</description>
      <pubDate>Wed, 18 Apr 2007 13:50:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041118#M432895</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2007-04-18T13:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041119#M432896</link>
      <description>Thanks for all the good info.  After consulting with our software vendor, it looks like we should be able to go to a trusted system.&lt;BR /&gt;&lt;BR /&gt;But, after some more research, it seems like we could use SMSE to do this.  I know it's a stupid question, but can we really use SMSE running B.11.23 &amp;amp; is there a down side?&lt;BR /&gt;&lt;BR /&gt;Thanks.</description>
      <pubDate>Thu, 19 Apr 2007 07:16:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041119#M432896</guid>
      <dc:creator>Dave Thompson_7</dc:creator>
      <dc:date>2007-04-19T07:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041120#M432897</link>
      <description>&amp;gt;  But, after some more research, it seems like we could use SMSE to do this. I know it's a stupid question, but can we really use SMSE running B.11.23 &amp;amp; is there a down side? &lt;BR /&gt; &lt;BR /&gt;Not a stupid question at all. Standard Mode Security Extensions (SMSE) is brand new with 11.23:&lt;BR /&gt; &lt;BR /&gt;docs.hp.com/en/5991-8678/ch06s01.html &lt;BR /&gt; &lt;BR /&gt;And you'll want to look at this:&lt;BR /&gt; &lt;BR /&gt;docs.hp.com/en/5991-1125/ch01s03.html&lt;BR /&gt; &lt;BR /&gt;Since SMSE is relatively new (and many poorly written programs still can't handle a Trusted system even after 10 years...), the only way to know about problems is to try it -- and at the same time, ask the vendor. If the vendor never heard about SMSE, I would be suspicious about success.&lt;BR /&gt; &lt;BR /&gt;SMSE was created to bridge the gap between barebones unTrusted systems and a full TCB (Trusted Computing Base) by providing the elements of a Shadow Password system, yet (by using PAM and a more compatible security database) providing a much more secure environment.</description>
      <pubDate>Tue, 24 Apr 2007 08:30:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041120#M432897</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2007-04-24T08:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: Locking Out Users After Failed Logins--Not A Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041121#M432898</link>
      <description>Looks like SMSE will do exactly what I need to have done.  Thanks to everyone.</description>
      <pubDate>Tue, 24 Apr 2007 12:32:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/locking-out-users-after-failed-logins-not-a-trusted-system/m-p/5041121#M432898</guid>
      <dc:creator>Dave Thompson_7</dc:creator>
      <dc:date>2007-04-24T12:32:50Z</dc:date>
    </item>
  </channel>
</rss>

