<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deactivated users vs Zee Auditors in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118710#M734033</link>
    <description>Thank you all for your very relevant replies.&lt;BR /&gt;&lt;BR /&gt;I was interpreting the lockout field as a binary value instead of a "bit array", thanks for clearing that up Patrick.&lt;BR /&gt;&lt;BR /&gt;I agree with all comments posted.  Our auditors are not technical people so they are "slaves to the audit tools" if you will but they do listen to us admins.  I will be able to justify the existance of these users and I will also be able to demonstrate that they pose a negligible security risk.  The existance of these accounts will be documented and that should be the end of it.&lt;BR /&gt;&lt;BR /&gt;Thank you everyone !</description>
    <pubDate>Thu, 10 Jul 2008 18:04:30 GMT</pubDate>
    <dc:creator>Francis Noël</dc:creator>
    <dc:date>2008-07-10T18:04:30Z</dc:date>
    <item>
      <title>Deactivated users vs Zee Auditors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118706#M734029</link>
      <description>Hello HP Forums !&lt;BR /&gt;&lt;BR /&gt;In an ongoing effort to please the auditors we are now addressing the issue of policing the deactivated accounts on our HP-UX hosts.&lt;BR /&gt;&lt;BR /&gt;We pretty much have the human accounts under control but the built-in accounts are still triggering the audit tools.&lt;BR /&gt;&lt;BR /&gt;The message we get is that we have deactivated accounts on the systems and we should remove them.  This is not entirely accurate since the accounts pose no threat but we are getting hit by the negative score nonetheless.  Problem is those accounts were never active in the first place...&lt;BR /&gt;&lt;BR /&gt;Here is what a fresh(ish) install of 11.31 looks like under truster mode.&lt;BR /&gt;&lt;BR /&gt;# awk -F: '{print $1}' /etc/passwd | while read list&lt;BR /&gt;&amp;gt; do&lt;BR /&gt;&amp;gt; user=`echo $list`&lt;BR /&gt;&amp;gt; state=`/usr/lbin/getprpw -m lockout $list`&lt;BR /&gt;&amp;gt; echo $user $state&lt;BR /&gt;&amp;gt; done&lt;BR /&gt;root lockout=0000000&lt;BR /&gt;daemon lockout=0000001&lt;BR /&gt;bin lockout=0000001&lt;BR /&gt;sys lockout=0000001&lt;BR /&gt;adm lockout=0000001&lt;BR /&gt;uucp lockout=0000001&lt;BR /&gt;lp lockout=0000001&lt;BR /&gt;nuucp lockout=0000001&lt;BR /&gt;hpdb lockout=0000001&lt;BR /&gt;nobody lockout=0000001&lt;BR /&gt;www lockout=0000001&lt;BR /&gt;smbnull lockout=0000001&lt;BR /&gt;tftp lockout=0000001&lt;BR /&gt;sfmdb lockout=0000001&lt;BR /&gt;sshd lockout=0000001&lt;BR /&gt;iwww lockout=0000001&lt;BR /&gt;owww lockout=0000001&lt;BR /&gt;hpsmh lockout=0000001&lt;BR /&gt;ora10ge lockout=0000000&lt;BR /&gt;&lt;BR /&gt;I understand that any value other than 0 in the lockout field will flag a user account as inactive.  The manpage for getprpw stipulates that a value of "1" means "past password lifetime".&lt;BR /&gt;&lt;BR /&gt;Although the system is in trusted mode the password expiration policies have not been enabled for these users (yet).&lt;BR /&gt;&lt;BR /&gt;My guess is that a password has never been defined for these "built-in" users and that they had a "*" in the password field of /etc/passwd before the system was converted to trusted mode.  Under trusted mode this situation seems to be interpreted as an expired password.&lt;BR /&gt;&lt;BR /&gt;I definitely do NOT want to delete these accounts since I am sure that will result in breakage....&lt;BR /&gt;&lt;BR /&gt;Here are my questions : &lt;BR /&gt;Are my interpretations of the lock field and user states correct ?&lt;BR /&gt;Can I define arbitrary, complex passwords for these built-in "users" in order to get a 0000000 in the lock field and please the auditors without adverse effects on my systems ?&lt;BR /&gt;Do any caveats come to mind ? &lt;BR /&gt;&lt;BR /&gt;Thank you for your time !</description>
      <pubDate>Thu, 10 Jul 2008 13:54:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118706#M734029</guid>
      <dc:creator>Francis Noël</dc:creator>
      <dc:date>2008-07-10T13:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: Deactivated users vs Zee Auditors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118707#M734030</link>
      <description>Actually the position of the '1' on the accounts above indicates that they have a '*' as a password.&lt;BR /&gt;&lt;BR /&gt;See the 'getprpw' man page for the position dependent meaning of the output you see.&lt;BR /&gt;&lt;BR /&gt;Here's an excerpt:&lt;BR /&gt;&lt;BR /&gt;lockout&lt;BR /&gt;returns the reason for a lockout in a "bit" valued string, where 0 = condition not present, 1 ispresent.  The position, left to right represents:&lt;BR /&gt;&lt;BR /&gt;1 past password lifetime&lt;BR /&gt;2 past last login time (inactive account)&lt;BR /&gt;3 past absolute account lifetime&lt;BR /&gt;4 exceeded unsuccessful login attempts&lt;BR /&gt;5 password required and a null password&lt;BR /&gt;6 admin lock&lt;BR /&gt;7 password is a *&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you wanted, you could potentially write a script to periodically change the password on these users and run a 'modprpw' to make the lockout string all 0's.  However, this would be slightly LESS secure in my opinion.&lt;BR /&gt;&lt;BR /&gt;If there is a password, then there is a chance, however small, that it could be cracked.  With a '*' as the password there is absolutely NO CHANCE of anyone logging in as those users.  The only way to become one of those users is to 'su - &lt;USER&gt;' as root.&lt;BR /&gt;&lt;BR /&gt;The auditors need to better understand Unix security and not ding you here.  But then that is the inherent problem I see with all auditors, they don't understand the stuff they are auditing.&lt;/USER&gt;</description>
      <pubDate>Thu, 10 Jul 2008 15:48:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118707#M734030</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2008-07-10T15:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: Deactivated users vs Zee Auditors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118708#M734031</link>
      <description>IMHO.. A locked account is more secure than one with a password.&lt;BR /&gt;&lt;BR /&gt;Tip:  When running reports for auditors, skip the mutually agreed upon system accounts.  i.e. awk -F: '$3 &amp;gt; 99' /etc/passwd&lt;BR /&gt;&lt;BR /&gt;They will then stop asking the same questions about these locked out system accounts that are required to run the OS.&lt;BR /&gt;&lt;BR /&gt;Someday system auditors might be trained with knowledge on the systems they are auditing (doubt it).&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 10 Jul 2008 16:07:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118708#M734031</guid>
      <dc:creator>Tim Nelson</dc:creator>
      <dc:date>2008-07-10T16:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Deactivated users vs Zee Auditors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118709#M734032</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;sshd is a secure account out of the box. You can't log in with it. Messing with these accounts as an example in any way risks breakage.&lt;BR /&gt;&lt;BR /&gt;If your auditors are concentrating on this, they are either incompetent, trying to justify their fees in a very secure shop or some other silliness.&lt;BR /&gt;&lt;BR /&gt;Don't touch the files, do a little googling and provide the auditors documentation of two things:&lt;BR /&gt;1) These built in accounts are delivered secure.&lt;BR /&gt;2) Messing with them could cost you a lot of money with broken and down systems and any auditor recommending messing with this is risking a lot.&lt;BR /&gt;&lt;BR /&gt;That being said, if you are forced to play, I'm a lock advocate.&lt;BR /&gt;&lt;BR /&gt;I work at a company that provides security products for cable tv. We get audited every year. This issue has never come up on the audits of any of our 500 server class boxes.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 10 Jul 2008 16:51:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118709#M734032</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2008-07-10T16:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: Deactivated users vs Zee Auditors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118710#M734033</link>
      <description>Thank you all for your very relevant replies.&lt;BR /&gt;&lt;BR /&gt;I was interpreting the lockout field as a binary value instead of a "bit array", thanks for clearing that up Patrick.&lt;BR /&gt;&lt;BR /&gt;I agree with all comments posted.  Our auditors are not technical people so they are "slaves to the audit tools" if you will but they do listen to us admins.  I will be able to justify the existance of these users and I will also be able to demonstrate that they pose a negligible security risk.  The existance of these accounts will be documented and that should be the end of it.&lt;BR /&gt;&lt;BR /&gt;Thank you everyone !</description>
      <pubDate>Thu, 10 Jul 2008 18:04:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/deactivated-users-vs-zee-auditors/m-p/5118710#M734033</guid>
      <dc:creator>Francis Noël</dc:creator>
      <dc:date>2008-07-10T18:04:30Z</dc:date>
    </item>
  </channel>
</rss>

