<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting Wrong password retry attempts in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707684#M59669</link>
    <description>HOW TO CHECK IF SYSTEM TRUSTED :&lt;BR /&gt;root:&amp;gt; /usr/lbin/getprpw root &lt;BR /&gt;System is not trusted.&lt;BR /&gt;The above shown when system is not! a different display shown if system has been Trusted.&lt;BR /&gt;The system is not trusted by default, here how to do it from command line:&lt;BR /&gt;# /usr/lbin/tsconvert ???c to convert trust system from command line &lt;BR /&gt;&lt;BR /&gt;# /usr/lbin/tsconvert ???r to unconvert untrust system from command line &lt;BR /&gt;&lt;BR /&gt;.: each user get file created under --&amp;gt; # ll /tcb/files/auth&lt;BR /&gt;......&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 A&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 B&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 C&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 D&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 E&lt;BR /&gt;........&lt;BR /&gt;for a user called jojo it is under &lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 j&lt;BR /&gt;-rw-rw-r--   1 root       root           113 Apr 19 17:44 /tcb/files/auth/j/jojo&lt;BR /&gt;&lt;BR /&gt;Remember PAP (a.k.a Pliz assign Points!)&lt;BR /&gt;</description>
    <pubDate>Sun, 21 Apr 2002 12:15:26 GMT</pubDate>
    <dc:creator>T. M. Louah</dc:creator>
    <dc:date>2002-04-21T12:15:26Z</dc:date>
    <item>
      <title>Restricting Wrong password retry attempts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707681#M59666</link>
      <description>&lt;BR /&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;   I have an HP9000 Server.I need to implement password security policy in such a way that, if a user enters his password wrongly, say 3 times, the account should get locked, which only the root user should be able to unlock.&lt;BR /&gt;Is it possible by converting my system to Trusted system? Is this option coming by default once you convert to Trusted system?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in Adv&lt;BR /&gt;&lt;BR /&gt;Abdul Salam&lt;BR /&gt;</description>
      <pubDate>Sun, 21 Apr 2002 04:16:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707681#M59666</guid>
      <dc:creator>Abdul Salam H S_1</dc:creator>
      <dc:date>2002-04-21T04:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Wrong password retry attempts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707682#M59667</link>
      <description>Yes, you're able to do this in a trusted system.You just need to modify the policy of that user account. Using SAM is the easiest way.&lt;BR /&gt;&lt;BR /&gt;a)In SAM go to "Accounts for Users &amp;amp; Groups"&lt;BR /&gt;b)Choose "Users" and select the user account from the list.&lt;BR /&gt;c)Goto to the "Action" menu and select "Modify Security Policies".&lt;BR /&gt;d)Select "General User Account Policies"&lt;BR /&gt;e)Change to the number of login attempts allowed from "Unsuccessful Login Tries Allowed".You have to choose "Custom" and then specify the number of attempts that you want to assign to that account (in your case it would be 3).</description>
      <pubDate>Sun, 21 Apr 2002 09:56:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707682#M59667</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2002-04-21T09:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Wrong password retry attempts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707683#M59668</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can enable these options by changing the system to a Trusted system.&lt;BR /&gt;&lt;BR /&gt;AR</description>
      <pubDate>Sun, 21 Apr 2002 10:57:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707683#M59668</guid>
      <dc:creator>Amruth</dc:creator>
      <dc:date>2002-04-21T10:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Wrong password retry attempts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707684#M59669</link>
      <description>HOW TO CHECK IF SYSTEM TRUSTED :&lt;BR /&gt;root:&amp;gt; /usr/lbin/getprpw root &lt;BR /&gt;System is not trusted.&lt;BR /&gt;The above shown when system is not! a different display shown if system has been Trusted.&lt;BR /&gt;The system is not trusted by default, here how to do it from command line:&lt;BR /&gt;# /usr/lbin/tsconvert ???c to convert trust system from command line &lt;BR /&gt;&lt;BR /&gt;# /usr/lbin/tsconvert ???r to unconvert untrust system from command line &lt;BR /&gt;&lt;BR /&gt;.: each user get file created under --&amp;gt; # ll /tcb/files/auth&lt;BR /&gt;......&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 A&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 B&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 C&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 D&lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 E&lt;BR /&gt;........&lt;BR /&gt;for a user called jojo it is under &lt;BR /&gt;drwxrwx---   2 root       sys             96 Apr 19 17:44 j&lt;BR /&gt;-rw-rw-r--   1 root       root           113 Apr 19 17:44 /tcb/files/auth/j/jojo&lt;BR /&gt;&lt;BR /&gt;Remember PAP (a.k.a Pliz assign Points!)&lt;BR /&gt;</description>
      <pubDate>Sun, 21 Apr 2002 12:15:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707684#M59669</guid>
      <dc:creator>T. M. Louah</dc:creator>
      <dc:date>2002-04-21T12:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Wrong password retry attempts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707685#M59670</link>
      <description>Here is some tips to make the &lt;BR /&gt;system security a bit better.even theo your system is not a trusted system.&lt;BR /&gt;&lt;BR /&gt;1. Password &lt;BR /&gt;==============================&lt;BR /&gt;&lt;BR /&gt;Put hese entries to /etc/default/login&lt;BR /&gt;ABORT_LOGIN_ON_MISSING_HOMEDIR=1&lt;BR /&gt;MIN_PASSWORD_LENGTH=6&lt;BR /&gt;NOLOGIN=1&lt;BR /&gt;NUMBER_OF_LOGINS_ALLOWED=1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;2.Tighten global privileges&lt;BR /&gt;============================&lt;BR /&gt;&lt;PRE&gt;&lt;BIG&gt;&lt;BIG&gt;By default the CHOWN privilege is a global privilege and applies to all groups: &lt;BR /&gt;$ getprivgrp&lt;BR /&gt;global privileges: CHOWN&lt;BR /&gt;Non-privileged users really don't need to be able to chown files to other users; in Linux for example, only the super-user may change the owner of a file. /sbin/init.d/set_prvgrp is executed by default at system startup and executes the command /usr/sbin/setprivgrp -f /etc/privgroup if /etc/privgroup exists. We can create a configuration file that will delete all privileges for all groups (see setprivgrp(1m)): &lt;BR /&gt;# getprivgrp&lt;BR /&gt;global privileges: CHOWN&lt;BR /&gt;# echo -n &amp;gt;/etc/privgroup&lt;BR /&gt;# chmod 400 /etc/privgroup&lt;BR /&gt;# /sbin/init.d/set_prvgrp start&lt;BR /&gt;# getprivgrp&lt;BR /&gt;global privileges:&lt;BR /&gt;&lt;/BIG&gt;&lt;/BIG&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 22 Apr 2002 02:57:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707685#M59670</guid>
      <dc:creator>Niraj Kumar Verma</dc:creator>
      <dc:date>2002-04-22T02:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting Wrong password retry attempts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707686#M59671</link>
      <description>Salam,&lt;BR /&gt;&lt;BR /&gt;Please refer to the below mentioned link. Its very useful.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.unixadm.net/howto/etc-security.html." target="_blank"&gt;http://www.unixadm.net/howto/etc-security.html.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers !!!,&lt;BR /&gt;Varghese Mathew</description>
      <pubDate>Mon, 22 Apr 2002 04:42:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-wrong-password-retry-attempts/m-p/2707686#M59671</guid>
      <dc:creator>Varghese Mathew</dc:creator>
      <dc:date>2002-04-22T04:42:02Z</dc:date>
    </item>
  </channel>
</rss>

