<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Where do I look for differences in security setup? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511528#M745186</link>
    <description>I am attempting to setup a Nagios monitoring script that will run on a Linux box and 'remote shell' (/usr/bin/rsh on the Linux box) to my HP-UX servers and execute the 'uptime' command. The output of 'uptime' is returned to Linux where it is parsed and an appropriate status message and code is generated and sent to the Nagios application which then updates its intranet web site with that status, and possibly sends a notification to appropriate parties. Communication to my development HP-UX server (dev) is perfect using this process. But attempts to connect to my production server (prod) all end up failing. It seems the rsh to prod always asks for a password when attempted from the command line. Since the script doesn't understand this (and doesn't know the password) it simply fails. No password is requested by dev. Both prod and dev are supposed to be setup the same with the only difference I know of is that prod has JavaVM installed. &lt;BR /&gt;&lt;BR /&gt;So ..... where do I look for the configuration parameters that say to ask for a password?</description>
    <pubDate>Fri, 25 Mar 2005 16:19:52 GMT</pubDate>
    <dc:creator>Don Spare</dc:creator>
    <dc:date>2005-03-25T16:19:52Z</dc:date>
    <item>
      <title>Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511523#M745181</link>
      <description>I have 2 HP-UX 11.0 servers. I thought they were set up identically but I have just found out that I can remote shell into one as root without specifying a password, but the other prompts for password. Where do I look for these kinds of differences and how do I make it so the password is NOT required for remote shell?  &lt;BR /&gt; &lt;BR /&gt;Also the environment for root seems different than for 'oracle' in that oracle seems to have vi set to context/language sensitive (auto indents and such) but in root that is not the case. Where is that defined?</description>
      <pubDate>Thu, 24 Mar 2005 15:37:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511523#M745181</guid>
      <dc:creator>Don Spare</dc:creator>
      <dc:date>2005-03-24T15:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511524#M745182</link>
      <description>look for a DOT rhosts file (.rhosts) and look at /etc/hosts.equiv.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry d brown jr</description>
      <pubDate>Thu, 24 Mar 2005 15:40:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511524#M745182</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2005-03-24T15:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511525#M745183</link>
      <description>take a look at this product: &lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry d brown jr</description>
      <pubDate>Thu, 24 Mar 2005 15:41:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511525#M745183</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2005-03-24T15:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511526#M745184</link>
      <description>In the / (root home directory) on both systems the .rhosts files are identical. Neither server has /etc/hosts.equiv files.</description>
      <pubDate>Thu, 24 Mar 2005 15:59:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511526#M745184</guid>
      <dc:creator>Don Spare</dc:creator>
      <dc:date>2005-03-24T15:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511527#M745185</link>
      <description>Don Spare wrote:&lt;BR /&gt;&amp;gt;  I have 2 HP-UX 11.0 servers. I thought they were &lt;BR /&gt;&amp;gt; set up identically but I have just found out that I &lt;BR /&gt;&amp;gt; can remote shell into one as root without specifying &lt;BR /&gt;&amp;gt; a password, but the other prompts for password. &lt;BR /&gt;&lt;BR /&gt;As already explained, look at both $HOME/.rhosts &lt;BR /&gt;and /etc/hosts.equiv files. Are you trying to rlogin to &lt;BR /&gt;both servers from the same machine and from the&lt;BR /&gt;same login ID?&lt;BR /&gt;&lt;BR /&gt;You could post both the above files here (don't post &lt;BR /&gt;actual IP addresses, if any,  in a public forum, just &lt;BR /&gt;replace them by IP_ADDR1 or some thing similar).&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;</description>
      <pubDate>Thu, 24 Mar 2005 16:21:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511527#M745185</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-03-24T16:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511528#M745186</link>
      <description>I am attempting to setup a Nagios monitoring script that will run on a Linux box and 'remote shell' (/usr/bin/rsh on the Linux box) to my HP-UX servers and execute the 'uptime' command. The output of 'uptime' is returned to Linux where it is parsed and an appropriate status message and code is generated and sent to the Nagios application which then updates its intranet web site with that status, and possibly sends a notification to appropriate parties. Communication to my development HP-UX server (dev) is perfect using this process. But attempts to connect to my production server (prod) all end up failing. It seems the rsh to prod always asks for a password when attempted from the command line. Since the script doesn't understand this (and doesn't know the password) it simply fails. No password is requested by dev. Both prod and dev are supposed to be setup the same with the only difference I know of is that prod has JavaVM installed. &lt;BR /&gt;&lt;BR /&gt;So ..... where do I look for the configuration parameters that say to ask for a password?</description>
      <pubDate>Fri, 25 Mar 2005 16:19:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511528#M745186</guid>
      <dc:creator>Don Spare</dc:creator>
      <dc:date>2005-03-25T16:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511529#M745187</link>
      <description>As already suggested, could you post the contents&lt;BR /&gt;of ~root/.rhosts and /etc/hosts.equiv files? &lt;BR /&gt;&lt;BR /&gt;I'm assuming that you are logged in as root and &lt;BR /&gt;running remote command execution as root in all the &lt;BR /&gt;machines.&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Mar 2005 16:58:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511529#M745187</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-03-25T16:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511530#M745188</link>
      <description>Don -- are the two machines in question on the same subnet ?&lt;BR /&gt;&lt;BR /&gt;Does one have a firewall that the other doesnt have to try to get through ?&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Mar 2005 20:10:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511530#M745188</guid>
      <dc:creator>Kent Ostby</dc:creator>
      <dc:date>2005-03-25T20:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511531#M745189</link>
      <description>Also, check to see if the source machine can be seen from the two target machines .. perhaps something in /etc/hosts or DNS is preventing the one target machine from recognizing the source machine.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 25 Mar 2005 20:11:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511531#M745189</guid>
      <dc:creator>Kent Ostby</dc:creator>
      <dc:date>2005-03-25T20:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511532#M745190</link>
      <description>If .rhosts exists *and* the permission for .rhosts is 600, then the remshd daemon is asking DNS to validate the client. Your DNS seerver must provide forward and reverse lookup for the incoming client or it will ask for a password. Lack of symmetrical records is a common Windows DNS server misconfig. If the DNS gods aren't responsive, change your HP-UX server to use /etc/hosts first, then DNS (/etc/nsswitch.conf) and put the client(s) into your /etc/hosts file. That will assure forward/reverse validation. Use nslookup to verify.</description>
      <pubDate>Fri, 25 Mar 2005 22:00:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511532#M745190</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-03-25T22:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511533#M745191</link>
      <description>rsh to determine if and report on the uptime status of a server? &lt;BR /&gt;&lt;BR /&gt;one word: BAD&lt;BR /&gt;&lt;BR /&gt;use something like snmp to check uptime!&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry d brown jr</description>
      <pubDate>Sat, 26 Mar 2005 07:12:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511533#M745191</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2005-03-26T07:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Where do I look for differences in security setup?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511534#M745192</link>
      <description>Well, I found the problem. It seems my /etc/hosts file did not contain the location of the Nagios server. It appears that the remote server must know about the local server when attempting these types of connections.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This problem has been resolved.</description>
      <pubDate>Mon, 28 Mar 2005 09:39:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/where-do-i-look-for-differences-in-security-setup/m-p/3511534#M745192</guid>
      <dc:creator>Don Spare</dc:creator>
      <dc:date>2005-03-28T09:39:49Z</dc:date>
    </item>
  </channel>
</rss>

