<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HP-UX 11.11 Trusted Mode Audit Files in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419321#M732097</link>
    <description>&lt;P&gt;My guess is that it might be because of thinking like "As the user was not able to enter the password that matched the claimed username, his/her identity could not be confirmed. Therefore, the log should show that the identity of the user was unknown at that point." The audit log is supposed to be comparable to a legal evidence record: if something is not verifiable, it should not be logged the same way as a certain fact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another reason for omitting the usernames in this case would be an intent to protect users' passwords from accidental disclosure: I think there's research showing that typing a password in the username prompt is a common mistake.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, if your job is to read audit logs and you see a failing login attempt by username "S3kR1tP@$$" and a successful login by "joeuser" a few seconds afterwards from the same terminal/remote host, you would have a high confidence that Joe User just made a mistake of typing without looking, and that "S3kR1tP@$$" is in fact his password. As a result, you could now log in to the system pretending to be Joe User... and this is clearly unacceptable. Therefore, blanking out unproven usernames in the logs is a good security practice in addition of preserving the quality of the audit log as legal evidence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Dec 2011 15:43:42 GMT</pubDate>
    <dc:creator>Matti_Kurkela</dc:creator>
    <dc:date>2011-12-15T15:43:42Z</dc:date>
    <item>
      <title>HP-UX 11.11 Trusted Mode Audit Files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5418179#M732094</link>
      <description>&lt;P&gt;After converting my C8000 HP-UX 11.11 over to trusted mode and turning on auditing I tested the login auditing feature. When I failed a login by mistyping a user password the audit log displayed that the login failed but it displayed the user as ??????? (question marks). Why doesn't it display the correct user id? How can I fix this so that the user id is displayed? Also how can I audit when a user logs out?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2011 16:18:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5418179#M732094</guid>
      <dc:creator>MikeCagg</dc:creator>
      <dc:date>2011-12-14T16:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: HP-UX 11.11 Trusted Mode Audit Files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5418707#M732095</link>
      <description>&lt;P&gt;You can also see login/logoff info by using last(1).&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2011 05:05:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5418707#M732095</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2011-12-15T05:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: HP-UX 11.11 Trusted Mode Audit Files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419109#M732096</link>
      <description>&lt;P&gt;Thank you but my IT security dept. requires that the users/actions&amp;nbsp;information is logged to the audit files. Do you know why I'm getting question marks instead of the user id? Is it patch related?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2011 12:11:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419109#M732096</guid>
      <dc:creator>MikeCagg</dc:creator>
      <dc:date>2011-12-15T12:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: HP-UX 11.11 Trusted Mode Audit Files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419321#M732097</link>
      <description>&lt;P&gt;My guess is that it might be because of thinking like "As the user was not able to enter the password that matched the claimed username, his/her identity could not be confirmed. Therefore, the log should show that the identity of the user was unknown at that point." The audit log is supposed to be comparable to a legal evidence record: if something is not verifiable, it should not be logged the same way as a certain fact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another reason for omitting the usernames in this case would be an intent to protect users' passwords from accidental disclosure: I think there's research showing that typing a password in the username prompt is a common mistake.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, if your job is to read audit logs and you see a failing login attempt by username "S3kR1tP@$$" and a successful login by "joeuser" a few seconds afterwards from the same terminal/remote host, you would have a high confidence that Joe User just made a mistake of typing without looking, and that "S3kR1tP@$$" is in fact his password. As a result, you could now log in to the system pretending to be Joe User... and this is clearly unacceptable. Therefore, blanking out unproven usernames in the logs is a good security practice in addition of preserving the quality of the audit log as legal evidence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2011 15:43:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419321#M732097</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-12-15T15:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: HP-UX 11.11 Trusted Mode Audit Files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419373#M732098</link>
      <description>&lt;P&gt;&amp;gt;Another reason for omitting the usernames in this case would be an intent to protect users' passwords from accidental disclosure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why lastb(1) and /var/adm/btmps requires root.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2011 16:25:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-11-11-trusted-mode-audit-files/m-p/5419373#M732098</guid>
      <dc:creator>Dennis Handly</dc:creator>
      <dc:date>2011-12-15T16:25:29Z</dc:date>
    </item>
  </channel>
</rss>

