<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restrict getting to Shell in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094014#M738765</link>
    <description>Okay here's one I haven't seen before.  &lt;BR /&gt;&lt;BR /&gt;I'm dealing with an Application on our 11.23 (IA-64) system, that when a developer/user gets to a prompt within the Application to do things with code and such, all they have to do is type in a "!" and it exits them out to a shell.  We want to prevent this if at all possible.  They are a non-privliged user when they get out to a shell on the OS, but just the same, we want to restrict this if we can.&lt;BR /&gt;&lt;BR /&gt;Is there anyway to prevent them from doing this that anyone could think of?  We have tried a limiting this in sudo with the option of !SHELL, but it is not working.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance for any ideas anyone can provide!&lt;BR /&gt;&lt;BR /&gt;KPS</description>
    <pubDate>Fri, 22 Feb 2008 16:02:47 GMT</pubDate>
    <dc:creator>KPS</dc:creator>
    <dc:date>2008-02-22T16:02:47Z</dc:date>
    <item>
      <title>Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094014#M738765</link>
      <description>Okay here's one I haven't seen before.  &lt;BR /&gt;&lt;BR /&gt;I'm dealing with an Application on our 11.23 (IA-64) system, that when a developer/user gets to a prompt within the Application to do things with code and such, all they have to do is type in a "!" and it exits them out to a shell.  We want to prevent this if at all possible.  They are a non-privliged user when they get out to a shell on the OS, but just the same, we want to restrict this if we can.&lt;BR /&gt;&lt;BR /&gt;Is there anyway to prevent them from doing this that anyone could think of?  We have tried a limiting this in sudo with the option of !SHELL, but it is not working.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance for any ideas anyone can provide!&lt;BR /&gt;&lt;BR /&gt;KPS</description>
      <pubDate>Fri, 22 Feb 2008 16:02:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094014#M738765</guid>
      <dc:creator>KPS</dc:creator>
      <dc:date>2008-02-22T16:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094015#M738766</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;Define the application (code file) as the program-to-use-as-the-shell (i.e. the last field) in '/etc/passwd'.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Fri, 22 Feb 2008 16:15:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094015#M738766</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2008-02-22T16:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094016#M738767</link>
      <description>We just tried this and that's not working for us.   &lt;BR /&gt;&lt;BR /&gt;The developer/user authenticates and gets put right into a wrapper program that we have that allows them to select an instance of the App.  &lt;BR /&gt;&lt;BR /&gt;With making that change to the /etc/passwd file login doesn't even give them our wrapper script anymore.&lt;BR /&gt;&lt;BR /&gt;/KPS</description>
      <pubDate>Fri, 22 Feb 2008 16:36:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094016#M738767</guid>
      <dc:creator>KPS</dc:creator>
      <dc:date>2008-02-22T16:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094017#M738768</link>
      <description>We just tried this and that's not working for us.   &lt;BR /&gt;&lt;BR /&gt;The developer/user authenticates and gets put right into a wrapper program that we have that allows them to select an instance of the App.  &lt;BR /&gt;&lt;BR /&gt;With making that change to /etc/passwd it doesn't give them our wrapper script anymore to choose an instance of their preference within the Application.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;/KPS</description>
      <pubDate>Fri, 22 Feb 2008 16:40:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094017#M738768</guid>
      <dc:creator>KPS</dc:creator>
      <dc:date>2008-02-22T16:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094018#M738769</link>
      <description>If the application is allowing access to a shell simply by typing a "!" (similar to what can be done in, say, vi via ":!sh"), then the only answer is to work with the application developers to disable this functionality.&lt;BR /&gt;&lt;BR /&gt;If the *APPLICATION* is allowing access to a shell, then the *APPLICATION* needs to be changed to not do so.</description>
      <pubDate>Fri, 22 Feb 2008 18:33:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094018#M738769</guid>
      <dc:creator>Michael Mike Reaser</dc:creator>
      <dc:date>2008-02-22T18:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094019#M738770</link>
      <description>Try the following.&lt;BR /&gt;&lt;BR /&gt;Create a shell wrapper that these application users would have as their shell in /etc/passwd. Lets say it is called app-sh. In it you put the following two lines&lt;BR /&gt;&lt;BR /&gt;export SHELL=/usr/bin/false&lt;BR /&gt;&lt;EXECUTE the="" app=""&gt;&lt;BR /&gt;&lt;BR /&gt;test it and tweak as needed. You can also combine it with sudo if necessary. It works with vi, if you set the SHELL variable to /usr/bin/false and then run vi, you can not escape to the shell.&lt;/EXECUTE&gt;</description>
      <pubDate>Fri, 22 Feb 2008 18:53:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094019#M738770</guid>
      <dc:creator>TTr</dc:creator>
      <dc:date>2008-02-22T18:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094020#M738771</link>
      <description>Let us know if it works. If your application uses the SHELL variable to determine which shell to use, it will work. Otherwise you have to find out if it is possible within the app to point it to /usr/bin/false.</description>
      <pubDate>Fri, 22 Feb 2008 22:47:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094020#M738771</guid>
      <dc:creator>TTr</dc:creator>
      <dc:date>2008-02-22T22:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict getting to Shell</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094021#M738772</link>
      <description>We tried setting the shell to /home/&lt;USER&gt;/&amp;lt;scriptname&amp;gt; again and that seems to be working for us to restrict Shell Access..  The user is not able to get out to a Shell any longer.&lt;BR /&gt;&lt;BR /&gt;Many thanks to all of you for your suggestions.&lt;BR /&gt;&lt;BR /&gt;/KPS&lt;/USER&gt;</description>
      <pubDate>Mon, 25 Feb 2008 15:50:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restrict-getting-to-shell/m-p/5094021#M738772</guid>
      <dc:creator>KPS</dc:creator>
      <dc:date>2008-02-25T15:50:20Z</dc:date>
    </item>
  </channel>
</rss>

