<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trusted system vs Non trusted system in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333492#M746702</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Here's a nice write-up on the same topic:&lt;BR /&gt;"1. A trusted system allows system auditing to be turned on.&lt;BR /&gt;   System auditing enables the ability to trace every system call issued by each user on the system.  Non-trusted systems run   with system auditing disabled.&lt;BR /&gt;&lt;BR /&gt;2. Trusted systems have improved password management.&lt;BR /&gt;&lt;BR /&gt;   Below is a list of password management features:&lt;BR /&gt;&lt;BR /&gt;     a. Specification of a grace period and expiration period for passwords.&lt;BR /&gt;&lt;BR /&gt;     b. The ability to specify system-wide password aging.&lt;BR /&gt;&lt;BR /&gt;     c. The ability to specify an absolute account life.&lt;BR /&gt;&lt;BR /&gt;     d. The ability to disable accounts after repeated login failures.&lt;BR /&gt;&lt;BR /&gt;     e. Passwords lengths of up to forty (40) characters.&lt;BR /&gt;&lt;BR /&gt;     f. The ability to access a random password generator.&lt;BR /&gt;&lt;BR /&gt;3. Trusted systems have additional login restrictions, while non-trusted systems do not.  Below are the features of trusted system login restrictions:&lt;BR /&gt;&lt;BR /&gt;     a. In addition to account disabling, the account may also be locked.&lt;BR /&gt;&lt;BR /&gt;     b. Setting accounts to be accessed only at certain times of the day.&lt;BR /&gt;&lt;BR /&gt;     c. The ability to specify account location access.  In other words, account access at specific devices, workstations, and so on.&lt;BR /&gt;&lt;BR /&gt;     d. The ability to specify a single-user boot password.&lt;BR /&gt;&lt;BR /&gt;   Note: These login restrictions are NOT available on NON-TRUSTED systems.&lt;BR /&gt;&lt;BR /&gt;4. A trusted system has shadowed passwords, while a non-trusted system does not have shadowed passwords.  Shadowed passwords   are kept in locations other an /etc/passwd.  This prevents users from viewing /etc/passwd file and determining which accounts do not have passwords.  This also prevents hackers from running "password cracker programs" against passwords in the /etc/passwd file.&lt;BR /&gt;&lt;BR /&gt;For more information, please refer to the following document:&lt;BR /&gt;&lt;BR /&gt;  "Administering Your HP-UX Trusted System"&lt;BR /&gt;&lt;BR /&gt;The document is located at the following web site:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/hpux/onlinedocs/B2355-90121/B2355-90121.html" target="_blank"&gt;http://docs.hp.com/hpux/onlinedocs/B2355-90121/B2355-90121.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Locate the "Description of the HP-UX Trusted System" section in&lt;BR /&gt;the left menu.  The following two pages contain more information:&lt;BR /&gt;&lt;BR /&gt;  o What is a Trusted System?&lt;BR /&gt;&lt;BR /&gt;  o What is C2-Level Trusted Mode?"&lt;BR /&gt;&lt;BR /&gt;Source: &lt;A href="http://www.faqs.org/faqs/hp/hpux-faq/section-68.html" target="_blank"&gt;http://www.faqs.org/faqs/hp/hpux-faq/section-68.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Sri Ram&lt;BR /&gt;</description>
    <pubDate>Fri, 16 Jul 2004 10:54:08 GMT</pubDate>
    <dc:creator>R. Sri Ram Kishore_1</dc:creator>
    <dc:date>2004-07-16T10:54:08Z</dc:date>
    <item>
      <title>Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333486#M746696</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;What is the difference between trusted system &amp;amp; non trusted system? Any reasons to use trusted system? Is there any acticle or documentation about it?&lt;BR /&gt;&lt;BR /&gt;regards</description>
      <pubDate>Fri, 16 Jul 2004 06:49:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333486#M746696</guid>
      <dc:creator>Ngoh Chean Siung</dc:creator>
      <dc:date>2004-07-16T06:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333487#M746697</link>
      <description>Hi,&lt;BR /&gt;See the doc attached about how to set up the Trusted System. You will get know the advantages as well.&lt;BR /&gt;Regards,</description>
      <pubDate>Fri, 16 Jul 2004 06:51:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333487#M746697</guid>
      <dc:creator>Bharat Katkar</dc:creator>
      <dc:date>2004-07-16T06:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333488#M746698</link>
      <description>This online doc also has information on setting up a Trusted System:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/hpux/onlinedocs/5187-2216/5187-2216.html" target="_blank"&gt;http://docs.hp.com/hpux/onlinedocs/5187-2216/5187-2216.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Fri, 16 Jul 2004 07:59:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333488#M746698</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2004-07-16T07:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333489#M746699</link>
      <description>The basic difference is:&lt;BR /&gt;&lt;BR /&gt;Non-trusted - encrypted passwords are stored in the /etc/passwd file, which is world-readable.  Potentially anyone could grab that file and run crack or some other password cracking utility against it.&lt;BR /&gt;&lt;BR /&gt;Trusted - encrypted passwords are NOT stored in /etc/passwd.  They are instead stored in files in the /tcb/files/auth/ directory structure which is only readable by root.&lt;BR /&gt;&lt;BR /&gt;Other advantages are that you have more control over when passwords expire, you can disable accounts after X number of bad logins in a row, etc.&lt;BR /&gt;&lt;BR /&gt;I think it is definitely worth it to have the system be trusted.</description>
      <pubDate>Fri, 16 Jul 2004 08:06:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333489#M746699</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2004-07-16T08:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333490#M746700</link>
      <description>Just a quick comment.  HP has released software called Shadow Passords which removes the encrypted passwd and puts it into a root only /etc/shadow.  This is for untrusted systems.</description>
      <pubDate>Fri, 16 Jul 2004 08:20:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333490#M746700</guid>
      <dc:creator>Gary L. Paveza, Jr.</dc:creator>
      <dc:date>2004-07-16T08:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333491#M746701</link>
      <description>Non Trusted systems:&lt;BR /&gt;=====================&lt;BR /&gt;  User informations for the system are stored in the /etc/passwd ( files ) ldap database (ldap) etc. When a user enters into the system,his login and passwd details are verified as identification &amp;amp; authentication method using the encryped passwd in /etc/passwd file.&lt;BR /&gt;&lt;BR /&gt; We can hack the passwd's in the /etc/passwd by removing the passwd for the user in the /etc/passwd file. Are we can use another passwd file for this. or any other respository to store the passwd's as like ldap or nis or nisplus etc.&lt;BR /&gt;&lt;BR /&gt; We can use + or - signs to give access and ignore on NIS type on non-trusted systems.&lt;BR /&gt;&lt;BR /&gt; Users can login without any passwd in non-trusted modes.&lt;BR /&gt;&lt;BR /&gt; Passwd expiration management uses some period of time using min and max. In non-trusted systems,it is rounded to any nearest weeks.&lt;BR /&gt;&lt;BR /&gt; On an untrusted system, only the first eight characters of a password are significant. &lt;BR /&gt;&lt;BR /&gt; passwd changes from old to New passwd can be done with out any restrictions. We can put the same old passwd as new passwd&lt;BR /&gt;&lt;BR /&gt;Trusted systems:&lt;BR /&gt;================ &lt;BR /&gt;&lt;BR /&gt; User passwd informations are stored in the /tcb/files/auth/*/*   (Protected password database used when system is converted to trusted system)&lt;BR /&gt;&lt;BR /&gt; Hacking passwd using the passwd database files are not possible.&lt;BR /&gt;&lt;BR /&gt; we can not use NIS's + or - for giving access to user or ignore them&lt;BR /&gt;&lt;BR /&gt; users cannot use the blank passwd on the trusted mode.&lt;BR /&gt;&lt;BR /&gt; Passwd expiration management uses the corresponding week days for the calculation of min or max periods&lt;BR /&gt;&lt;BR /&gt; we can have passwd upto 40 character length( upto 40 character length is advisable)&lt;BR /&gt;&lt;BR /&gt; passwd changes from old to new is having a restriction as 3 characters must be changed and 1 character for admin users in trusted mode.&lt;BR /&gt;&lt;BR /&gt;Trusted systems are used to secure the systems from passwd database hack and with acl settings.&lt;BR /&gt;&lt;BR /&gt; see the default,passwd man pages to know more.&lt;BR /&gt;&lt;BR /&gt; We can identify the system is trusted or non-trusted using the file /tcb/files/auth/system/default or with iscomsec call.&lt;BR /&gt;&lt;BR /&gt;We can audit the trusted systems log using sam. &lt;BR /&gt;&lt;BR /&gt;Unix basic trusted systems functionality is specified here at,&lt;BR /&gt;&lt;A href="http://osr5doc.ca.sco.com:457/OSAdminG/ssC.trusted_concepts.html" target="_blank"&gt;http://osr5doc.ca.sco.com:457/OSAdminG/ssC.trusted_concepts.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Muthukumar.</description>
      <pubDate>Fri, 16 Jul 2004 08:34:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333491#M746701</guid>
      <dc:creator>Muthukumar_5</dc:creator>
      <dc:date>2004-07-16T08:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333492#M746702</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Here's a nice write-up on the same topic:&lt;BR /&gt;"1. A trusted system allows system auditing to be turned on.&lt;BR /&gt;   System auditing enables the ability to trace every system call issued by each user on the system.  Non-trusted systems run   with system auditing disabled.&lt;BR /&gt;&lt;BR /&gt;2. Trusted systems have improved password management.&lt;BR /&gt;&lt;BR /&gt;   Below is a list of password management features:&lt;BR /&gt;&lt;BR /&gt;     a. Specification of a grace period and expiration period for passwords.&lt;BR /&gt;&lt;BR /&gt;     b. The ability to specify system-wide password aging.&lt;BR /&gt;&lt;BR /&gt;     c. The ability to specify an absolute account life.&lt;BR /&gt;&lt;BR /&gt;     d. The ability to disable accounts after repeated login failures.&lt;BR /&gt;&lt;BR /&gt;     e. Passwords lengths of up to forty (40) characters.&lt;BR /&gt;&lt;BR /&gt;     f. The ability to access a random password generator.&lt;BR /&gt;&lt;BR /&gt;3. Trusted systems have additional login restrictions, while non-trusted systems do not.  Below are the features of trusted system login restrictions:&lt;BR /&gt;&lt;BR /&gt;     a. In addition to account disabling, the account may also be locked.&lt;BR /&gt;&lt;BR /&gt;     b. Setting accounts to be accessed only at certain times of the day.&lt;BR /&gt;&lt;BR /&gt;     c. The ability to specify account location access.  In other words, account access at specific devices, workstations, and so on.&lt;BR /&gt;&lt;BR /&gt;     d. The ability to specify a single-user boot password.&lt;BR /&gt;&lt;BR /&gt;   Note: These login restrictions are NOT available on NON-TRUSTED systems.&lt;BR /&gt;&lt;BR /&gt;4. A trusted system has shadowed passwords, while a non-trusted system does not have shadowed passwords.  Shadowed passwords   are kept in locations other an /etc/passwd.  This prevents users from viewing /etc/passwd file and determining which accounts do not have passwords.  This also prevents hackers from running "password cracker programs" against passwords in the /etc/passwd file.&lt;BR /&gt;&lt;BR /&gt;For more information, please refer to the following document:&lt;BR /&gt;&lt;BR /&gt;  "Administering Your HP-UX Trusted System"&lt;BR /&gt;&lt;BR /&gt;The document is located at the following web site:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/hpux/onlinedocs/B2355-90121/B2355-90121.html" target="_blank"&gt;http://docs.hp.com/hpux/onlinedocs/B2355-90121/B2355-90121.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Locate the "Description of the HP-UX Trusted System" section in&lt;BR /&gt;the left menu.  The following two pages contain more information:&lt;BR /&gt;&lt;BR /&gt;  o What is a Trusted System?&lt;BR /&gt;&lt;BR /&gt;  o What is C2-Level Trusted Mode?"&lt;BR /&gt;&lt;BR /&gt;Source: &lt;A href="http://www.faqs.org/faqs/hp/hpux-faq/section-68.html" target="_blank"&gt;http://www.faqs.org/faqs/hp/hpux-faq/section-68.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Sri Ram&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Jul 2004 10:54:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333492#M746702</guid>
      <dc:creator>R. Sri Ram Kishore_1</dc:creator>
      <dc:date>2004-07-16T10:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333493#M746703</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You might also be interested in these docs:&lt;BR /&gt;a) &lt;A href="http://www.giac.org/practical/GSEC/Stephen_Radford_GSEC.pdf" target="_blank"&gt;www.giac.org/practical/GSEC/Stephen_Radford_GSEC.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;b) wwws.sun.com/software/whitepapers/wp-ts8/ts8-wp.pdf&lt;BR /&gt;&lt;BR /&gt;HTH.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Sri Ram</description>
      <pubDate>Fri, 16 Jul 2004 11:00:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333493#M746703</guid>
      <dc:creator>R. Sri Ram Kishore_1</dc:creator>
      <dc:date>2004-07-16T11:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Trusted system vs Non trusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333494#M746704</link>
      <description>Don't use it unless you have to AND you have tested it thoroughly.&lt;BR /&gt;&lt;BR /&gt;C2 (Trusted) will break most client-server application authentication as the method used to get password information changes. Instead of using getpwent, the call changes to getprpwent. If the client software does not cater for this then it will stop working. &lt;BR /&gt;&lt;BR /&gt;Also you need to be aware that enabling C2 also enables all sorts of auditing controls. We had a weird problem with cron after enabling C2!&lt;BR /&gt;&lt;BR /&gt;Other issues we saw were to do with things like passwords (though this may have since been addressed). IF the password was not C2 compliant BEFORE the system was converted to C2, the it was not possible to change the password at all. Nor was it possible to log in. Luckily that time round I still had an active root session....&lt;BR /&gt;&lt;BR /&gt;Finally, yes, the shadow password capability is now available as a separate software depot. However, certainly when I last looked at this it did NOT support a number of the name services (NIS and LDAP certainly).&lt;BR /&gt;&lt;BR /&gt;The answer is to test, test, test, then test some more before committing to running your applications on a trusted system.&lt;BR /&gt;&lt;BR /&gt;If you have a development environment, then I'd start there - if your developers are forced to work and develop on a C2 system, then the code they develop will more likely work in a C2 production envieonment.&lt;BR /&gt;&lt;BR /&gt;Col.</description>
      <pubDate>Sat, 17 Jul 2004 10:44:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/trusted-system-vs-non-trusted-system/m-p/3333494#M746704</guid>
      <dc:creator>Colin Topliss</dc:creator>
      <dc:date>2004-07-17T10:44:04Z</dc:date>
    </item>
  </channel>
</rss>

