<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: root user profile corrupted in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920909#M482844</link>
    <description>&lt;P&gt;smh can be used to call the sam user tool, or usermod can be used to modify a user account.&amp;nbsp; However, both of these should refuse to work on the root account. I would guess that somebody edited the passwd file.&amp;nbsp; Make sure the file is owned root:sys and is set to 444 permissions.&amp;nbsp; Check the shell history for root. Make sure only trained authorized administrators have access to the root password. Better yet, force the use of RBAC or sudo to perform administrative tasks.&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jan 2013 14:21:58 GMT</pubDate>
    <dc:creator>Ken Grabowski</dc:creator>
    <dc:date>2013-01-03T14:21:58Z</dc:date>
    <item>
      <title>root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920869#M482843</link>
      <description>&lt;P&gt;Experts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ grep root /etc/passwd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root:XXXXXXXX:0:3::u:/sbin/sh&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root:XXXXXXXX:0:3::/:/sbin/sh&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Home Directory was /&amp;nbsp; ,instead of /&amp;nbsp; It modified as &amp;nbsp;u .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My doubt is any command will overrude this&amp;nbsp; or somebody edit the passwd file ?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 13:45:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920869#M482843</guid>
      <dc:creator>Ajin_1</dc:creator>
      <dc:date>2013-01-03T13:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920909#M482844</link>
      <description>&lt;P&gt;smh can be used to call the sam user tool, or usermod can be used to modify a user account.&amp;nbsp; However, both of these should refuse to work on the root account. I would guess that somebody edited the passwd file.&amp;nbsp; Make sure the file is owned root:sys and is set to 444 permissions.&amp;nbsp; Check the shell history for root. Make sure only trained authorized administrators have access to the root password. Better yet, force the use of RBAC or sudo to perform administrative tasks.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 14:21:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920909#M482844</guid>
      <dc:creator>Ken Grabowski</dc:creator>
      <dc:date>2013-01-03T14:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920969#M482846</link>
      <description>&lt;P&gt;Hi ken&lt;/P&gt;&lt;P&gt;Thanks for mail&lt;/P&gt;&lt;P&gt;How can I Check the shell history for root.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 15:14:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5920969#M482846</guid>
      <dc:creator>Ajin_1</dc:creator>
      <dc:date>2013-01-03T15:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921003#M482847</link>
      <description>&lt;P&gt;Normally it would be in the root home directory /.sh_history, if it was configured.&amp;nbsp; If it wasn't configured, then you may not have one.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 15:42:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921003#M482847</guid>
      <dc:creator>Ken Grabowski</dc:creator>
      <dc:date>2013-01-03T15:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921005#M482848</link>
      <description>&lt;P&gt;Check in roots home directory, / in this case, for a file like .sh_history or .history. &amp;nbsp;The file can be viewed via 'cat' or 'more'. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2013 15:43:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921005#M482848</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2013-01-03T15:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921941#M482868</link>
      <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked the history file .I thing it was not configured .&lt;/P&gt;&lt;P&gt;I understood someone edit the password file .But root only do this .I didnt find any oneone do su at that time Period .Is any other way to find this whom do vi like vi logs or the logs captured other than syslog wtmp and su log&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2013 13:00:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921941#M482868</guid>
      <dc:creator>Ajin_1</dc:creator>
      <dc:date>2013-01-04T13:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: root user profile corrupted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921961#M482869</link>
      <description>&lt;P&gt;Did you verify that /etc/passwd was owned root:sys and set to 444 mode? If permissions are not restricted, then others might be able to edit.&amp;nbsp; There should be tight control of the root account. In some shops I've worked, only the security team had the password and even HP-UX Engineers had to use RBAC or sudo to do administrative tasks.&amp;nbsp; At a minimum only one or two experienced administrators should have it and you should configure the shell history.&amp;nbsp; The vi editor does not have a history or log function.&amp;nbsp; I doubt that you can determine the offender at this time. Even with shell history and system auditing enabled, you might have a hard time determining who did it.&amp;nbsp; If you force administrators to use RBAC and sudo to gain root privilege and add the base UID to the root .sh_history.$UID file, you might be able to see who had vi'ed the passwd file in the future.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2013 13:21:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-user-profile-corrupted/m-p/5921961#M482869</guid>
      <dc:creator>Ken Grabowski</dc:creator>
      <dc:date>2013-01-04T13:21:32Z</dc:date>
    </item>
  </channel>
</rss>

