<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: rlogin entries in inetd.conf - Vulnerability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765061#M729448</link>
    <description>&lt;P&gt;How about this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Rlogin" target="_blank"&gt;https://en.wikipedia.org/wiki/Rlogin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are concerned about security, disabling rlogin is a miniscule step towards reducing system vulnerabilities.&lt;/P&gt;&lt;P&gt;Why are you using rlogin rather than telnet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But more important, why are you not using ssh?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jul 2015 11:27:11 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2015-07-15T11:27:11Z</dc:date>
    <item>
      <title>rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6764765#M729442</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My security team has raised a concern reagring the rlogin entry in the inetd.conf and asked me to hash stop the service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont have any rhosts or hosts.equiv files on my server .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My Question is :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. I have rlogin entry in inetd.conf file but dont have&amp;nbsp;&lt;SPAN&gt; rhosts or hosts.equiv will rlogin still work or could it be still considered as rlogin as vulnerable.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks In advance&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 15:43:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6764765#M729442</guid>
      <dc:creator>sapoguheman</dc:creator>
      <dc:date>2015-07-14T15:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6764828#M729443</link>
      <description>&lt;P&gt;&amp;gt;&amp;gt; &lt;SPAN&gt;will rlogin still work or could it be still considered as rlogin as vulnerable.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Absolutely yes, 100% of the so-called &lt;STRONG&gt;'r'&lt;/STRONG&gt; commands (&lt;STRONG&gt;rlogin&lt;/STRONG&gt;, &lt;STRONG&gt;remsh, rexec&lt;/STRONG&gt; and &lt;STRONG&gt;rcp&lt;/STRONG&gt;) are NOT secure since the passwords are sent without encryption. The lack of &lt;STRONG&gt;.rhosts&lt;/STRONG&gt; and &lt;STRONG&gt;hosts.equiv&lt;/STRONG&gt; means that &lt;STRONG&gt;rlogin&lt;/STRONG&gt; will ask you for the password first, then log you in but the&lt;STRONG&gt; 'r'&lt;/STRONG&gt; commands still work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However the passwords will be transmitted in plain text so any network trace can see them. For this reason, all Unix systems should disable &lt;STRONG&gt;telnet, ftp&lt;/STRONG&gt; and the &lt;STRONG&gt;'r'&lt;/STRONG&gt; commands, and use nothing but &lt;STRONG&gt;ssh&lt;/STRONG&gt; and &lt;STRONG&gt;scp&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;In inetd.conf, these lines should be commented:&lt;/P&gt;&lt;PRE&gt;#  login        stream tcp6 nowait root /usr/lbin/rlogind  rlogind
#  shell        stream tcp6 nowait root /usr/lbin/remshd   remshd
#  exec         stream tcp6 nowait root /usr/lbin/rexecd   rexecd&lt;/PRE&gt;</description>
      <pubDate>Tue, 14 Jul 2015 18:14:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6764828#M729443</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2015-07-14T18:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6764919#M729444</link>
      <description>&lt;P&gt;You can also make sure the r* commands remain blocked with the inetd.sec(4) file. For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;$ cat /var/adm/inetd.sec&lt;BR /&gt;login   deny
exec    deny
shell   deny&lt;/PRE&gt;&lt;P&gt;and so forth...&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 22:19:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6764919#M729444</guid>
      <dc:creator>RJHall</dc:creator>
      <dc:date>2015-07-14T22:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765043#M729445</link>
      <description>&lt;P&gt;Hi Bill,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can i get any supporting documents for the same .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 09:40:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765043#M729445</guid>
      <dc:creator>sapoguheman</dc:creator>
      <dc:date>2015-07-15T09:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765052#M729446</link>
      <description>&lt;P&gt;&amp;gt;&amp;gt; Can i get any supporting documents for the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am very unclear about your question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you need documents about how edit the inetd.conf file?&lt;/P&gt;&lt;P&gt;Or how to signal the changes in inetd.conf?&lt;/P&gt;&lt;P&gt;Or how rlogin/rexec/remsh work?&lt;/P&gt;&lt;P&gt;Or somethng stating that the 'r' commands transmit unexncrypted passwords?&lt;/P&gt;&lt;P&gt;Or that telnet and ftp have the same vulnerability?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 10:40:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765052#M729446</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2015-07-15T10:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765056#M729447</link>
      <description>&lt;P&gt;I need some supporting documents which mentions even keeping rlogin entry in inetd.conf is vulnerable even though it doesnt have ant rhosts / hosts.equiv files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried on few servers where&amp;nbsp;&lt;SPAN&gt;rhosts / hosts.equiv files are not present but still am able to login from root to root with passord for fews server and on some servers it doesnt works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 11:23:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765056#M729447</guid>
      <dc:creator>sapoguheman</dc:creator>
      <dc:date>2015-07-15T11:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765061#M729448</link>
      <description>&lt;P&gt;How about this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/Rlogin" target="_blank"&gt;https://en.wikipedia.org/wiki/Rlogin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are concerned about security, disabling rlogin is a miniscule step towards reducing system vulnerabilities.&lt;/P&gt;&lt;P&gt;Why are you using rlogin rather than telnet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But more important, why are you not using ssh?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 11:27:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765061#M729448</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2015-07-15T11:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765064#M729449</link>
      <description>&lt;P&gt;&amp;gt;&amp;gt; I tried on few servers where&amp;nbsp;&lt;SPAN&gt;rhosts / hosts.equiv files are not present but still am able to login from root to root with passord for fews server and on some servers it doesnt works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...doesn't work...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is not helpful to determine the problem. "Some servers don't work" could mean that the servers are dead, or that rlogind is not enabled. The .rhosts and hosts.equiv files simply allow login without having to type a password. The password that you type using rlogin is visible to anyone looking at your network traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 11:38:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765064#M729449</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2015-07-15T11:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765069#M729450</link>
      <description>&lt;P&gt;I am using ssh.&lt;/P&gt;&lt;P&gt;I wanted to justify few teams that even keeping rlogin entry in inetd.conf is vulnerable .&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 11:49:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765069#M729450</guid>
      <dc:creator>sapoguheman</dc:creator>
      <dc:date>2015-07-15T11:49:42Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin entries in inetd.conf - Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765090#M729451</link>
      <description>&lt;P&gt;&amp;gt;&amp;gt; I wanted to justify few teams that even keeping rlogin entry in inetd.conf is vulnerable .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keeping rlogin in inetd.conf isn't the issue. Using rlogin is the problem. You stop users from running rlogin (and rcp and remsh and rexec and telneet and ftp) by turning off the daemons in inetd.conf. Most data centers forbid the use of these services. And good Unix auditors will write findings when these services are discovered.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 12:11:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin-entries-in-inetd-conf-vulnerability/m-p/6765090#M729451</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2015-07-15T12:11:20Z</dc:date>
    </item>
  </channel>
</rss>

