<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password Shadowing in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672116#M51130</link>
    <description>NIS doesn't work with trusted mode, but NIS+ does.  It's kind of a bear to set up though, but works well once configured correctly.&lt;BR /&gt;&lt;BR /&gt;We have several systems running in trusted mode with more converting as we can get down time.&lt;BR /&gt;&lt;BR /&gt;I mourned the loss of 'vi /etc/passwd' though.</description>
    <pubDate>Wed, 27 Feb 2002 01:53:48 GMT</pubDate>
    <dc:creator>Eric Ladner</dc:creator>
    <dc:date>2002-02-27T01:53:48Z</dc:date>
    <item>
      <title>Password Shadowing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672113#M51127</link>
      <description>Very quick question... nevertheless please provide suggestions even if the question is solved. I am very curious as to user experience in this area.&lt;BR /&gt;&lt;BR /&gt;Post security audit it has been recommended that we implement password shadowing asap.&lt;BR /&gt;&lt;BR /&gt;I know it is common, if not standard to have password shadowing in Linux, but a standard install of HP-UX doesn't not come with password shadowing installed as a default. From sysadmin courses at HP, I got the impression that it is uncommon for password shadowing to be enabled - or at least uncommon to have a trusted system.&lt;BR /&gt;&lt;BR /&gt;Q1: What procedure is used to implement password shadowing?&lt;BR /&gt;&lt;BR /&gt;Q2: What are the impacts - the less obvious positive impacts versus the negative impacts?&lt;BR /&gt;&lt;BR /&gt;Q3. What is your personal experience post password shadowing?&lt;BR /&gt;&lt;BR /&gt;Q4. How common do you believe password shadowing to be on HP-UX.&lt;BR /&gt;&lt;BR /&gt;I will generously award points.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;BR /&gt;Glenn</description>
      <pubDate>Wed, 27 Feb 2002 01:03:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672113#M51127</guid>
      <dc:creator>Glenn L. Stewart</dc:creator>
      <dc:date>2002-02-27T01:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Password Shadowing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672114#M51128</link>
      <description>&amp;gt; Q1: What procedure is used to implement password shadowing? &lt;BR /&gt;&lt;BR /&gt;SAM - change your system to a Trusted System, or use the backend command /usr/lbin/tsconvert&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Q2: What are the impacts - the less obvious positive impacts versus the negative impacts? &lt;BR /&gt;&lt;BR /&gt;NIS can no longer be used. But Trusted System (and a shadow password file) implies higher security, while standard NIS is not compatible with those goals.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Q3. What is your personal experience post password shadowing? &lt;BR /&gt;&lt;BR /&gt;Works fine and because HP's Trusted System adds many additional controls on logins (times allowed, min/max password lengths, expiration and disable rules), it is very flexible in cotrolling access and increasing security. HP's Trusted System is a superset of the shadow password concept. &lt;BR /&gt;&lt;BR /&gt;As a downside, running vipw or vi on the passwd file is not going to be a good idea for the admin as the shadow must be maintained in sync. Use SAM to maintain the passwd files.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Q4. How common do you believe password shadowing to be on HP-UX. &lt;BR /&gt;&lt;BR /&gt;Quite common. Most objections have to do with tools that 'know' where the password file is located and do not understand the /tcb directory. Again, one has to question how secure a system will be if tools will exist on the system that aree aware of shadow passwords.</description>
      <pubDate>Wed, 27 Feb 2002 01:27:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672114#M51128</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2002-02-27T01:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Password Shadowing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672115#M51129</link>
      <description>Hi Glenn,&lt;BR /&gt;&lt;BR /&gt;I'll answer your question pertaining to my site. Implementation of password shadowing or 'trusting your server' as it known, is quite common and can depend on what applications are running as whether&lt;BR /&gt;it can be implemented. &lt;BR /&gt;&lt;BR /&gt;1. You can easily implement it using 'sam' or &lt;BR /&gt;'tsconvert' from the command line.&lt;BR /&gt;# /usr/lbin/tsconvert&lt;BR /&gt;&lt;BR /&gt;2. A directory called /tcb is created and all &lt;BR /&gt;password imformation, expiry, encryption is &lt;BR /&gt;held here. One downside is that all passwords &lt;BR /&gt;expire immediately upon implementation.&lt;BR /&gt;&lt;BR /&gt;3. Passwords expiring immediately can cause&lt;BR /&gt;a mutiny.&lt;BR /&gt;&lt;BR /&gt;4. I can only say from the sights I've worked &lt;BR /&gt;at during the last five years since I've been &lt;BR /&gt;using it, and greater than 50% of the servers&lt;BR /&gt;I've been looking after have this facility. &lt;BR /&gt;I can also say sometimes that management need&lt;BR /&gt;to take security more seriously than they do&lt;BR /&gt;except until after systems have been audited,&lt;BR /&gt;like a 'I told you so' approach!&lt;BR /&gt;&lt;BR /&gt;Here is a couple of links that I've used in&lt;BR /&gt;the past.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x67f9c6af36b7d5118ff10090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x67f9c6af36b7d5118ff10090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion11.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion11.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Chapter 8&lt;BR /&gt;&lt;A href="http://www.docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html" target="_blank"&gt;http://www.docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also from the Teck knowledge base&lt;BR /&gt;&lt;BR /&gt;PROBLEM&lt;BR /&gt;Where to find information regarding trusted systems (C2 security).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;RESOLUTION&lt;BR /&gt;&lt;BR /&gt;For trusted system information, refer to the following manuals at&lt;BR /&gt;&lt;A href="http://www.docs.hp.com/." target="_blank"&gt;http://www.docs.hp.com/.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;  HP-UX System Administration Tasks        (HP-UX 10.X Operating System)&lt;BR /&gt;  Managing Systems and Workgroups          (HP-UX 11.X Operating System)&lt;BR /&gt;  Administering Your HP-UX Trusted System  (Internet &amp;amp; Security Solutions)&lt;BR /&gt;&lt;BR /&gt;SAM provides the convert and unconvert capabilities at 10.X and&lt;BR /&gt;11.X.  The SAM help facility provides additional information on&lt;BR /&gt;specific capabilities of a trusted system.&lt;BR /&gt;&lt;BR /&gt;Make a backup copy of /etc/passwd and /etc/group prior to&lt;BR /&gt;converting, and install any trusted system related patches prior&lt;BR /&gt;to converting to a trusted system through SAM.&lt;BR /&gt;&lt;BR /&gt;Several other sources for additional information are below.&lt;BR /&gt;&lt;BR /&gt; man pages&lt;BR /&gt;&lt;BR /&gt; authck(1M)   - check internal consistency of Authentication database&lt;BR /&gt; authcap(4)   - security databases for trusted systems&lt;BR /&gt; default(4)   - system default database file for a trusted system&lt;BR /&gt; devassign(4) - device assignment database file for a trusted system&lt;BR /&gt; iscomsec(2)  - check if the system has been converted to a trusted system.&lt;BR /&gt; prpwd(4)     - protected password authentication database files&lt;BR /&gt; ttys(4)      - terminal control database file , for trusted systems&lt;BR /&gt;&lt;BR /&gt; The Release Notes under /usr/share/doc&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Feb 2002 01:39:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672115#M51129</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-02-27T01:39:23Z</dc:date>
    </item>
    <item>
      <title>Re: Password Shadowing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672116#M51130</link>
      <description>NIS doesn't work with trusted mode, but NIS+ does.  It's kind of a bear to set up though, but works well once configured correctly.&lt;BR /&gt;&lt;BR /&gt;We have several systems running in trusted mode with more converting as we can get down time.&lt;BR /&gt;&lt;BR /&gt;I mourned the loss of 'vi /etc/passwd' though.</description>
      <pubDate>Wed, 27 Feb 2002 01:53:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-shadowing/m-p/2672116#M51130</guid>
      <dc:creator>Eric Ladner</dc:creator>
      <dc:date>2002-02-27T01:53:48Z</dc:date>
    </item>
  </channel>
</rss>

