<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736865#M66741</link>
    <description>Hi John,&lt;BR /&gt;&lt;BR /&gt;you can take sbin out of PATH for normal users, but this does NOT disable the commands for them! They still can use absolute pathes to get the commands to work:&lt;BR /&gt;&lt;BR /&gt;/usr/sbin/whatever_command&lt;BR /&gt;&lt;BR /&gt;will work....&lt;BR /&gt;&lt;BR /&gt;To prevent all normal users, you have to change permissions on /usr/sbin, using the chmod- command:&lt;BR /&gt;&lt;BR /&gt;chmod -R 550 /usr/sbin&lt;BR /&gt;&lt;BR /&gt;Allways stay on the bright side of life!&lt;BR /&gt;&lt;BR /&gt;Peter</description>
    <pubDate>Tue, 04 Jun 2002 06:25:27 GMT</pubDate>
    <dc:creator>Peter Kloetgen</dc:creator>
    <dc:date>2002-06-04T06:25:27Z</dc:date>
    <item>
      <title>security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736862#M66738</link>
      <description>How can i restrict ordinary users form executing commands in /usr/sbin? I'm running hp-ux 10.20.</description>
      <pubDate>Tue, 04 Jun 2002 05:57:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736862#M66738</guid>
      <dc:creator>John Forbes</dc:creator>
      <dc:date>2002-06-04T05:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736863#M66739</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;There are two ways:&lt;BR /&gt;&lt;BR /&gt;The first and most simplest method is to remove the path from either the 'users' .profile or the systems /etc/profile. The second and a little more drastic method is to change the permissions on the programs in /usr/sbin to be '550'. Doing so may cause one or more of your applications to collapse, but it is worthwhile at least testing.&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Michael</description>
      <pubDate>Tue, 04 Jun 2002 06:07:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736863#M66739</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-06-04T06:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736864#M66740</link>
      <description>Hi,&lt;BR /&gt;There are executables which are already secure&lt;BR /&gt;in /usr/sbin which can be run only as root.&lt;BR /&gt;eg. gated , sendmail&lt;BR /&gt;r-xr-xr-x   1 2          bin         995328 Oct 27  1997 /usr/sbin/gated   &lt;BR /&gt;Still you can use chmod command to set your own&lt;BR /&gt;privileges.&lt;BR /&gt;#man chmod&lt;BR /&gt;regards,&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Jun 2002 06:10:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736864#M66740</guid>
      <dc:creator>U.SivaKumar_2</dc:creator>
      <dc:date>2002-06-04T06:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736865#M66741</link>
      <description>Hi John,&lt;BR /&gt;&lt;BR /&gt;you can take sbin out of PATH for normal users, but this does NOT disable the commands for them! They still can use absolute pathes to get the commands to work:&lt;BR /&gt;&lt;BR /&gt;/usr/sbin/whatever_command&lt;BR /&gt;&lt;BR /&gt;will work....&lt;BR /&gt;&lt;BR /&gt;To prevent all normal users, you have to change permissions on /usr/sbin, using the chmod- command:&lt;BR /&gt;&lt;BR /&gt;chmod -R 550 /usr/sbin&lt;BR /&gt;&lt;BR /&gt;Allways stay on the bright side of life!&lt;BR /&gt;&lt;BR /&gt;Peter</description>
      <pubDate>Tue, 04 Jun 2002 06:25:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736865#M66741</guid>
      <dc:creator>Peter Kloetgen</dc:creator>
      <dc:date>2002-06-04T06:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736866#M66742</link>
      <description>i'm also thinking of the same way, to change the permissions, but kind of hesitant so i posted the question. thanks for your responses.</description>
      <pubDate>Tue, 04 Jun 2002 07:25:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736866#M66742</guid>
      <dc:creator>John Forbes</dc:creator>
      <dc:date>2002-06-04T07:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736867#M66743</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;The best way is to keep users out of shells and into there applications, that way they can't execute squat! Really, the only users who should be allowed into shells, are System Admin's and DBA's - on production machines.&lt;BR /&gt;&lt;BR /&gt;Don't forget that some /usr/sbin commands are links to /sbin and /usr/lbin.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Jun 2002 11:29:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736867#M66743</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-06-04T11:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736868#M66744</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Setting the correct permissions is the cleanest way to go about restricting. &lt;BR /&gt;&lt;BR /&gt;Apart from permissions, some other methods include:&lt;BR /&gt;&lt;BR /&gt;1) setting ACL (access control lists) for the commands in /usr/sbin. You can restrict only superuser and daemons' access to /usr/sbin etc.&lt;BR /&gt;&lt;BR /&gt;man setacl (for JFS) or man chacl (for HFS) for more information.&lt;BR /&gt;&lt;BR /&gt;2) use chroot to create a virtual root which prevents the user in this virtual root directory from accessing the real /usr/sbin.&lt;BR /&gt;&lt;BR /&gt;man chroot for more information.&lt;BR /&gt;&lt;BR /&gt;3) restrict what your users can do via restricted sam. Restricted sam allows you to limit users to specific scripts or commands. It also allows you to specify which users can run what programs with specific user's (can be another user's) privileges.&lt;BR /&gt;&lt;BR /&gt;man sam for more information.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Tue, 04 Jun 2002 12:52:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2736868#M66744</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-06-04T12:52:51Z</dc:date>
    </item>
  </channel>
</rss>

