<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security in .sh_history in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482568#M744576</link>
    <description>Hi Daniel,&lt;BR /&gt;&lt;BR /&gt;Think we are looking for the same: Command Auditting &lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=805145" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=805145&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;apearantly there is a possibility to recompile bash (don't know yet how) to log all interactive commands into a sepparate file. But then you have the support issue and of course as Andrew stated: legislation</description>
    <pubDate>Thu, 10 Feb 2005 02:57:24 GMT</pubDate>
    <dc:creator>TEC-HP</dc:creator>
    <dc:date>2005-02-10T02:57:24Z</dc:date>
    <item>
      <title>security in .sh_history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482563#M744566</link>
      <description>the question is that the user doesn't see what you/he/she/it register in the .sh_history, and that single [root] could see this.</description>
      <pubDate>Wed, 09 Feb 2005 17:26:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482563#M744566</guid>
      <dc:creator>Daniel Piedras_1</dc:creator>
      <dc:date>2005-02-09T17:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: security in .sh_history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482564#M744568</link>
      <description>Kind of a cryptic post. No question mark either.&lt;BR /&gt;&lt;BR /&gt;root can see any file the person logged on as root wants. Thats a fact that does not change. &lt;BR /&gt;&lt;BR /&gt;The umask parmeter controls default permissions when a new file is created. If you set that in /etc/profile when new users are created, permissions will be the way you want on .sh_history&lt;BR /&gt;&lt;BR /&gt;chmod 700 .sh_history so long as the user owns it.&lt;BR /&gt;&lt;BR /&gt;If root owns it, permissions need to be more flexible.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 09 Feb 2005 17:46:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482564#M744568</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-02-09T17:46:09Z</dc:date>
    </item>
    <item>
      <title>Re: security in .sh_history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482565#M744570</link>
      <description>set it &lt;BR /&gt;-w------  user:staff .sh_history&lt;BR /&gt;&lt;BR /&gt;but - this won't get You anywhere. The history works only as long as it is *readable*!&lt;BR /&gt;&lt;BR /&gt;but You can have a single history for every user - I think this is the way You should go.&lt;BR /&gt;&lt;BR /&gt;the variable is $HISTFILE and You could use /etc/profile to set it by e.g.&lt;BR /&gt;&lt;BR /&gt;WHO=`whoami`&lt;BR /&gt;HISTFILE="~$WHO/.sh_history"&lt;BR /&gt;HISTSIZE=2048&lt;BR /&gt;&lt;BR /&gt;touch and chown it for every user to come.</description>
      <pubDate>Wed, 09 Feb 2005 17:49:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482565#M744570</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-02-09T17:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: security in .sh_history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482566#M744572</link>
      <description>Thanks&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Wed, 09 Feb 2005 19:33:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482566#M744572</guid>
      <dc:creator>Daniel Piedras_1</dc:creator>
      <dc:date>2005-02-09T19:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: security in .sh_history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482567#M744574</link>
      <description>Do you mean that you want a new ".sh_history" file everytime that someone logs-in/su's to root? If this is the case simply add a few lines to your ".profile" to change the name of the ".sh_history" to do something like append the date and time, or the IP-Address or username of the user.&lt;BR /&gt;You also add a "trap" to call a file such as ".kshexit" that moves or renames the file so it can be stored for auditing purposes.&lt;BR /&gt;&lt;BR /&gt;There are a lot of projects knocking around that are trying to create a kind of flight-recorder for root's actions, however there can be serious privacy issues surrounding this aproach, so make sure that it complies with your local legislation.</description>
      <pubDate>Thu, 10 Feb 2005 02:27:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482567#M744574</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-02-10T02:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: security in .sh_history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482568#M744576</link>
      <description>Hi Daniel,&lt;BR /&gt;&lt;BR /&gt;Think we are looking for the same: Command Auditting &lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=805145" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=805145&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;apearantly there is a possibility to recompile bash (don't know yet how) to log all interactive commands into a sepparate file. But then you have the support issue and of course as Andrew stated: legislation</description>
      <pubDate>Thu, 10 Feb 2005 02:57:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-sh-history/m-p/3482568#M744576</guid>
      <dc:creator>TEC-HP</dc:creator>
      <dc:date>2005-02-10T02:57:24Z</dc:date>
    </item>
  </channel>
</rss>

