<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identd Daemon Issue in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550816#M733232</link>
    <description>The "Securing Serviceguard" document at   &lt;A href="http://docs.hp.com/en/5874/securingserviceguard_nov2005.pdf" target="_blank"&gt;http://docs.hp.com/en/5874/securingserviceguard_nov2005.pdf&lt;/A&gt;&lt;BR /&gt;states this on page 7:&lt;BR /&gt;&lt;BR /&gt;4.4. Is identd a security threat? &lt;BR /&gt;Security experts sometimes recommend that identd be disabled, because it gives out information about users on that computer.  The information given out is "login name" (as recorded in /etc/passwd, or whatever local technology is replacing /etc/passwd).  If two login names share the same UID, the name reported is usually, but not always the first one in /etc/passwd.  Given the nature of the trust required inside the firewall, the Serviceguard development team sees no compromise to security by enabling identd to identify users who hold TCP connections to other computers.&lt;BR /&gt;&lt;BR /&gt;Serviceguard does not require the external firewall to pass any identd traffic, either incoming or outgoing.  For sites which do not wish to expose to the external internet the limited information which identd provides, we recommend blocking, at the external firewall, all incoming packets destined for auth on any protected node (port 113).&lt;BR /&gt;&lt;BR /&gt;4.5. Stronger alternatives to identd &lt;BR /&gt;Stronger authentication mechanisms than identd exist, based on credentials&lt;BR /&gt;which must be configured and, depending on the level of security required,&lt;BR /&gt;themselves certified by contact with a trusted third party.  Such measures&lt;BR /&gt;require significant administrative load at configuration and maintenance time.&lt;BR /&gt;Serviceguard has selected the use of identd as more appropriate for our&lt;BR /&gt;customers.  Serviceguard is evaluating the future potential to supply an&lt;BR /&gt;option to use stronger security for those customers who seek to use&lt;BR /&gt;Serviceguard in a more hostile context.&lt;BR /&gt;&lt;BR /&gt;--- end quote ---&lt;BR /&gt;&lt;BR /&gt;So, the threat level is related to the safety of the network on which the cluster is placed.  HP does not recommend disabling Serviceguards' dependency on identd.  However the administator has the choice</description>
    <pubDate>Wed, 16 Dec 2009 08:34:37 GMT</pubDate>
    <dc:creator>Johnson Punniyalingam</dc:creator>
    <dc:date>2009-12-16T08:34:37Z</dc:date>
    <item>
      <title>Identd Daemon Issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550813#M733229</link>
      <description>Dear Gents,&lt;BR /&gt;&lt;BR /&gt;Identd daemon needs to be disabled in our environment. &lt;BR /&gt;&lt;BR /&gt;We have metro cluster in our environment. As per my understanding, identd daemon used by service guard.&lt;BR /&gt;&lt;BR /&gt;Is there any alternative solution available instead of using identd daemon?&lt;BR /&gt;&lt;BR /&gt;Thanks in Advance</description>
      <pubDate>Wed, 16 Dec 2009 08:17:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550813#M733229</guid>
      <dc:creator>shameemsoft</dc:creator>
      <dc:date>2009-12-16T08:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Identd Daemon Issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550814#M733230</link>
      <description>Serviceguard requires the identd daemon to be&lt;BR /&gt;running for authentication purposes.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 16 Dec 2009 08:31:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550814#M733230</guid>
      <dc:creator>Johnson Punniyalingam</dc:creator>
      <dc:date>2009-12-16T08:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Identd Daemon Issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550815#M733231</link>
      <description>Thanks Johnson.&lt;BR /&gt;&lt;BR /&gt;Is there any alternate solution available?&lt;BR /&gt;</description>
      <pubDate>Wed, 16 Dec 2009 08:33:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550815#M733231</guid>
      <dc:creator>shameemsoft</dc:creator>
      <dc:date>2009-12-16T08:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Identd Daemon Issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550816#M733232</link>
      <description>The "Securing Serviceguard" document at   &lt;A href="http://docs.hp.com/en/5874/securingserviceguard_nov2005.pdf" target="_blank"&gt;http://docs.hp.com/en/5874/securingserviceguard_nov2005.pdf&lt;/A&gt;&lt;BR /&gt;states this on page 7:&lt;BR /&gt;&lt;BR /&gt;4.4. Is identd a security threat? &lt;BR /&gt;Security experts sometimes recommend that identd be disabled, because it gives out information about users on that computer.  The information given out is "login name" (as recorded in /etc/passwd, or whatever local technology is replacing /etc/passwd).  If two login names share the same UID, the name reported is usually, but not always the first one in /etc/passwd.  Given the nature of the trust required inside the firewall, the Serviceguard development team sees no compromise to security by enabling identd to identify users who hold TCP connections to other computers.&lt;BR /&gt;&lt;BR /&gt;Serviceguard does not require the external firewall to pass any identd traffic, either incoming or outgoing.  For sites which do not wish to expose to the external internet the limited information which identd provides, we recommend blocking, at the external firewall, all incoming packets destined for auth on any protected node (port 113).&lt;BR /&gt;&lt;BR /&gt;4.5. Stronger alternatives to identd &lt;BR /&gt;Stronger authentication mechanisms than identd exist, based on credentials&lt;BR /&gt;which must be configured and, depending on the level of security required,&lt;BR /&gt;themselves certified by contact with a trusted third party.  Such measures&lt;BR /&gt;require significant administrative load at configuration and maintenance time.&lt;BR /&gt;Serviceguard has selected the use of identd as more appropriate for our&lt;BR /&gt;customers.  Serviceguard is evaluating the future potential to supply an&lt;BR /&gt;option to use stronger security for those customers who seek to use&lt;BR /&gt;Serviceguard in a more hostile context.&lt;BR /&gt;&lt;BR /&gt;--- end quote ---&lt;BR /&gt;&lt;BR /&gt;So, the threat level is related to the safety of the network on which the cluster is placed.  HP does not recommend disabling Serviceguards' dependency on identd.  However the administator has the choice</description>
      <pubDate>Wed, 16 Dec 2009 08:34:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550816#M733232</guid>
      <dc:creator>Johnson Punniyalingam</dc:creator>
      <dc:date>2009-12-16T08:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Identd Daemon Issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550817#M733233</link>
      <description>Per the guide &lt;A href="http://docs.hp.com/en/B3936-90143/B3936-90143.pdf" target="_blank"&gt;http://docs.hp.com/en/B3936-90143/B3936-90143.pdf&lt;/A&gt; on page 252&lt;BR /&gt;&lt;BR /&gt;Disabling identd :&lt;BR /&gt;Ignore this section unless you have a particular need to disable identd.&lt;BR /&gt;You can configure Serviceguard not to use identd.&lt;BR /&gt;CAUTION: This is not recommended. Disabling identd removes an important security&lt;BR /&gt;layer from Serviceguard. See the white paper Securing Serviceguard at&lt;BR /&gt;&lt;A href="http://docs.hp.com" target="_blank"&gt;http://docs.hp.com&lt;/A&gt; -&amp;gt; High Availability -&amp;gt; Serviceguard -&amp;gt; White&lt;BR /&gt;Papers for more information.&lt;BR /&gt;If you must disable identd, you can do so by adding the -i option to the tcp&lt;BR /&gt;hacl-cfg and hacl-probe commands in /etc/inetd.conf.&lt;BR /&gt;For example:&lt;BR /&gt;1. Change the cmclconfd entry in /etc/inetd.conf to:&lt;BR /&gt;hacl-cfg stream tcp nowait root /usr/lbin/cmclconfd cmclconfd -c -i&lt;BR /&gt;2. Change the cmomd entry in /etc/inetd.conf to (all on one line):&lt;BR /&gt;&lt;BR /&gt;hacl-probe stream tcp nowait root /opt/cmom/lbin/cmomd /opt/cmom/lbin/cmomd -i -f&lt;BR /&gt;/var/opt/cmom/cmomd.log -r /var/opt/cmom&lt;BR /&gt;3. Restart inetd:&lt;BR /&gt;/etc/init.d/inetd restart</description>
      <pubDate>Wed, 16 Dec 2009 08:45:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550817#M733233</guid>
      <dc:creator>Sameer_Nirmal</dc:creator>
      <dc:date>2009-12-16T08:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identd Daemon Issue</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550818#M733234</link>
      <description>Thanks a lot for your response.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 16 Dec 2009 11:44:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/identd-daemon-issue/m-p/4550818#M733234</guid>
      <dc:creator>shameemsoft</dc:creator>
      <dc:date>2009-12-16T11:44:03Z</dc:date>
    </item>
  </channel>
</rss>

