<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: root login in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688391#M54789</link>
    <description>Many Many good answers but so far no points awarded. Raji awarding points is a way to say "Thank you" to those that take the time to answer your questions for you, or lend assistance when needed. It would be beneficial to you to take that into consideration the next time you post a question.&lt;BR /&gt;&lt;BR /&gt;Not to mention my head is cold and I will never get a hat at this rate. (Just kidding)</description>
    <pubDate>Tue, 26 Mar 2002 02:29:52 GMT</pubDate>
    <dc:creator>Jeffrey S. Sims</dc:creator>
    <dc:date>2002-03-26T02:29:52Z</dc:date>
    <item>
      <title>root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688376#M54774</link>
      <description>Hi!&lt;BR /&gt;Can you people give me some good ideas how to secure root login. Currently we have several unix servers and people who have root access logs in from anywhere and we do not know who all became root and did stuff.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 21 Mar 2002 16:43:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688376#M54774</guid>
      <dc:creator>Raji Murthy</dc:creator>
      <dc:date>2002-03-21T16:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688377#M54775</link>
      <description>have a look at:&lt;BR /&gt;&lt;BR /&gt;login from console ONLY:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xb2be79bffde7d4118fef0090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xb2be79bffde7d4118fef0090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Securing HPUX:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x54f3f9beca68d511abcd0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x54f3f9beca68d511abcd0090277a778c,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Check out roots ~/.rhosts&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Later,&lt;BR /&gt;Bill&lt;BR /&gt;</description>
      <pubDate>Thu, 21 Mar 2002 16:46:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688377#M54775</guid>
      <dc:creator>Bill McNAMARA_1</dc:creator>
      <dc:date>2002-03-21T16:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688378#M54776</link>
      <description>Do one thing,&lt;BR /&gt;Use securetty. In this process you have to login as a user and then you have to give su to be root.&lt;BR /&gt;&lt;BR /&gt;You have to create a file securetty under /etc. and under that file just enter root.&lt;BR /&gt;&lt;BR /&gt;It will solve your problem.&lt;BR /&gt;&lt;BR /&gt;Sandip&lt;BR /&gt;</description>
      <pubDate>Thu, 21 Mar 2002 16:46:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688378#M54776</guid>
      <dc:creator>Sandip Ghosh</dc:creator>
      <dc:date>2002-03-21T16:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688379#M54777</link>
      <description>One way is to stop this is to create a file called securetty in /etc directory and put entry 'console' in that.&lt;BR /&gt;&lt;BR /&gt;This way nobody can access directly as root in the system . One hase to login as himslef then do su to gain root access. &lt;BR /&gt;&lt;BR /&gt;syslog will keep this recordings.&lt;BR /&gt;&lt;BR /&gt;Also Who -R  will show you who logged in from where.&lt;BR /&gt;&lt;BR /&gt;Goodluck,&lt;BR /&gt;-USA..</description>
      <pubDate>Thu, 21 Mar 2002 16:49:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688379#M54777</guid>
      <dc:creator>Uday_S_Ankolekar</dc:creator>
      <dc:date>2002-03-21T16:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688380#M54778</link>
      <description>Hi Raji,&lt;BR /&gt;&lt;BR /&gt;i don't like to bring bad news to you, but did you think over the fact, that you have somebody on your systems who is or at least was root?&lt;BR /&gt;&lt;BR /&gt;This opens the possibility to "open doors" even if you secure the root- access afterwards. And are you sure you will find all the holes he opened? &lt;BR /&gt;&lt;BR /&gt;In my opinion the only option you have is to reinstall your systems if anybody stayed on them as root. Sorry.....&lt;BR /&gt;&lt;BR /&gt;Allways stay on the bright side of life!&lt;BR /&gt;&lt;BR /&gt;Peter</description>
      <pubDate>Thu, 21 Mar 2002 17:00:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688380#M54778</guid>
      <dc:creator>Peter Kloetgen</dc:creator>
      <dc:date>2002-03-21T17:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688381#M54779</link>
      <description>Besides using /etc/securetty file to limit login to the console go ahead and change to root password and see who screams.  Then ask why they need the passwd.&lt;BR /&gt;&lt;BR /&gt;You could also install sudo:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.courtesan.com/sudo" target="_blank"&gt;http://www.courtesan.com/sudo&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.2b1/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.2b1/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Once you have installed you can set up specific users so that they have access to specific commands as root, but don't need the root passwd.  Sudo activity will also be logged, to syslog I think.</description>
      <pubDate>Thu, 21 Mar 2002 17:02:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688381#M54779</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2002-03-21T17:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688382#M54780</link>
      <description>Hi Raji,&lt;BR /&gt;&lt;BR /&gt;You have to 1.create /etc/securetty file&lt;BR /&gt;2.Enter the entry "console.&lt;BR /&gt;do not specify " ".&lt;BR /&gt;&lt;BR /&gt;You are all set.&lt;BR /&gt;&lt;BR /&gt;Now you can become super user by login with your personal ordinary user id and then by doing "su"....you can become super user.&lt;BR /&gt;&lt;BR /&gt;-pap</description>
      <pubDate>Thu, 21 Mar 2002 18:57:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688382#M54780</guid>
      <dc:creator>pap</dc:creator>
      <dc:date>2002-03-21T18:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688383#M54781</link>
      <description>i aggree with Peter that reloading if your best option if that is an option at all. If not then step by step do everything you can to secure the machine, run scripts to look for backdoors and trojans etc etc. &lt;BR /&gt;&lt;BR /&gt;Anyway, just to add my $0.02 worth to the equation. Another thing that you can do once you use securetty to limit root access to the console only, the users can still su. So to limit the number of users that can su to root, you can:&lt;BR /&gt;&lt;BR /&gt;chmod 4660 /usr/bin/su &lt;BR /&gt;and&lt;BR /&gt;chown root:wheel /usr/bin/su&lt;BR /&gt;&lt;BR /&gt;then add root and whatever other users you want to be able to su to the wheel group and only the users in the wheel group will be able to use the su command.&lt;BR /&gt;&lt;BR /&gt;After you have done what you are going to do and you think that all backdoors are closed and there are no more trojans or sniffers on your comp install tripwire and monitor file changes, additions and removals.&lt;BR /&gt;&lt;BR /&gt;These are a few suggestions to with them what you please.&lt;BR /&gt;&lt;BR /&gt;Hope it helps.</description>
      <pubDate>Thu, 21 Mar 2002 19:10:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688383#M54781</guid>
      <dc:creator>Jeffrey S. Sims</dc:creator>
      <dc:date>2002-03-21T19:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688384#M54782</link>
      <description>Sorry, almost forgot, if you haven't done so already I would disable telnet and use something more secure such as ssh or openssh. Likewise you can disable ftp and use sftp in its place.&lt;BR /&gt;&lt;BR /&gt;Ok now I am done.</description>
      <pubDate>Thu, 21 Mar 2002 19:12:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688384#M54782</guid>
      <dc:creator>Jeffrey S. Sims</dc:creator>
      <dc:date>2002-03-21T19:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688385#M54783</link>
      <description>HI&lt;BR /&gt;"console" in /etc/securetty will allow root login on console only.&lt;BR /&gt;&lt;BR /&gt;On trusted system, the parameter "SU_ROOT_GROUP=administrator" will allow only members of administrator to su to root.&lt;BR /&gt;&lt;BR /&gt;The securetty file did not controle root login using X-emulation software, so modify .profile of root to check it.&lt;BR /&gt;#--&lt;BR /&gt;user=`logname`;&lt;BR /&gt;sulog="/var/adm/sulog"&lt;BR /&gt;TTY="`tty | cut -d/ -f3`"&lt;BR /&gt;&lt;BR /&gt;if [ ${user} = "root" ]&lt;BR /&gt;then&lt;BR /&gt; if [ ${TTY} != "console" ]&lt;BR /&gt;  then&lt;BR /&gt;   echo "&lt;ERR&gt; : root login allowed only through console..."&lt;BR /&gt;   exit&lt;BR /&gt; fi&lt;BR /&gt;fi&lt;BR /&gt;##--&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;Prashant Deshpande.&lt;BR /&gt;&lt;/ERR&gt;</description>
      <pubDate>Thu, 21 Mar 2002 19:19:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688385#M54783</guid>
      <dc:creator>Deshpande Prashant</dc:creator>
      <dc:date>2002-03-21T19:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688386#M54784</link>
      <description>Another thing you could do to secure root on your system is install Sudo.  This is a program that lets certain users run things as root, and even give you a root shell if you belong to certain groups (and run "sudo su").&lt;BR /&gt;Example:&lt;BR /&gt;If a person wanted to run a program like "ls" as root, and didn't know the root password, but needed to see into root-read only directories, he/she'd run "sudo ls &lt;DIRNAME&gt;".  They'd be prompted for THEIR password, then they'd get ls run as root.&lt;BR /&gt;Pitfalls: anything a user can run as root should be carefully inspected to make sure it couldn't be exploited.  For example, NEVER give sudo access to programs wish shell escapes (like vi), or folks can just do a :sh and pop out with a root-prompt.&lt;/DIRNAME&gt;</description>
      <pubDate>Thu, 21 Mar 2002 20:22:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688386#M54784</guid>
      <dc:creator>Jeff Harr</dc:creator>
      <dc:date>2002-03-21T20:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688387#M54785</link>
      <description>Hi Raji,&lt;BR /&gt;Secure your system as mentioned above and then afterward if you need many "root" users to have restricted access This is Free!&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.courtesan.com/sudo/intro.html" target="_blank"&gt;http://www.courtesan.com/sudo/intro.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. &lt;BR /&gt;&lt;BR /&gt;It has the ability to restrict what commands a user may run on a per-host basis. &lt;BR /&gt;&lt;BR /&gt;Sudo does copious logging of each command, providing a clear audit trail of who did what.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 22 Mar 2002 00:38:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688387#M54785</guid>
      <dc:creator>Rose Lariviere</dc:creator>
      <dc:date>2002-03-22T00:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688388#M54786</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;1)They may be getting root previlege by using the command "su" (offcourse they should know the password) If you want to block this, then you may have to block the usage of "su" itself by doing "chmod" on su file.&lt;BR /&gt;&lt;BR /&gt;2)They may be getting root previlege by entering into the system through "rlogin,telnet,rsh" If you want to block this you may have to deny these services to  those clients by specifying "deny &lt;SERVICE&gt; &lt;IP of="" client="" machine=""&gt; in /var/adm/inetd.sec file. And by specifying the enry "console" in "/etc/securetty" file.&lt;BR /&gt;&lt;BR /&gt;3)But the "/etc/securetty" file has no control on XDMCP clients getting your CDE login screen from their workstation or PC (having exceed). In that case specify to whom all you want to allow CDE login screen by editing the file "/etc/dt/config/Xaccess"&lt;BR /&gt;and "/usr/dt/config/Xaccess".&lt;BR /&gt;&lt;BR /&gt;4)Do not allow others to login to your system using root account by specifying the entry "root" in /etc/ftpusers file. &lt;BR /&gt;&lt;BR /&gt;5)check the file "/etc/passwd" for the duplication of User ID or Group ID. If any other user has user ID 0 other than root, disable it or do the needful to change it. Only root is supposed to have groud id "0".&lt;BR /&gt;&lt;BR /&gt;6)check the "/etc/hossts.equiv" and "rhosts" file in your systm and ensure that it is not granting any root previlege to remote systems.&lt;BR /&gt;&lt;BR /&gt;7)If any user is having his application to start directly instead of getting into $ prompt and start his application, ensure that his application or startup script does not allow him to break it and get into the system with root previlege.&lt;BR /&gt;&lt;BR /&gt;Sorry for the lengthy draft.&lt;BR /&gt;&lt;BR /&gt;-Vija&lt;/IP&gt;&lt;/SERVICE&gt;</description>
      <pubDate>Fri, 22 Mar 2002 08:08:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688388#M54786</guid>
      <dc:creator>K.Vijayaragavan.</dc:creator>
      <dc:date>2002-03-22T08:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688389#M54787</link>
      <description>Hi Raji,&lt;BR /&gt;&lt;BR /&gt;First thing to do would be to change the current root passwords, to prevent people logging in as root.&lt;BR /&gt;&lt;BR /&gt;Also check the /.rhosts and /etc/hosts.equiv files.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;&lt;BR /&gt;John</description>
      <pubDate>Fri, 22 Mar 2002 08:35:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688389#M54787</guid>
      <dc:creator>John Strang</dc:creator>
      <dc:date>2002-03-22T08:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688390#M54788</link>
      <description>Apart from what already have been mentioned:&lt;BR /&gt;1. check sulog to see if all users that have su'ed should.&lt;BR /&gt;2. Check the system for "odd" files owned by root and with the suid bit set. A suid shell will give users root access.&lt;BR /&gt;3. Check roots .rhosts&lt;BR /&gt;4. Change the root password.&lt;BR /&gt;4b. Use a password cracker program to check that the password can't be cracked.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Trond</description>
      <pubDate>Fri, 22 Mar 2002 08:38:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688390#M54788</guid>
      <dc:creator>Trond Haugen</dc:creator>
      <dc:date>2002-03-22T08:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688391#M54789</link>
      <description>Many Many good answers but so far no points awarded. Raji awarding points is a way to say "Thank you" to those that take the time to answer your questions for you, or lend assistance when needed. It would be beneficial to you to take that into consideration the next time you post a question.&lt;BR /&gt;&lt;BR /&gt;Not to mention my head is cold and I will never get a hat at this rate. (Just kidding)</description>
      <pubDate>Tue, 26 Mar 2002 02:29:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/root-login/m-p/2688391#M54789</guid>
      <dc:creator>Jeffrey S. Sims</dc:creator>
      <dc:date>2002-03-26T02:29:52Z</dc:date>
    </item>
  </channel>
</rss>

