<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: password ageing in non-trusted sites: sorry in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008636#M751013</link>
    <description>The /etc/default/security file has a number of possible settings, but the majority are ignored (silently) in non-Trusted systems. Specifically, the password history is kept in a Trusted directory so h=no history is kept in a non-Trusted system.&lt;BR /&gt;&lt;BR /&gt;It is important to retire the use of which and whereis to determine where a command is found. POSIX shells (ksh, HP's sh, bash, etc) all have the right command: type&lt;BR /&gt;&lt;BR /&gt;type passwd&lt;BR /&gt;&lt;BR /&gt;(type is an alias to whence -v) To see how which and whereis are ineffective, try this:&lt;BR /&gt;&lt;BR /&gt;which let&lt;BR /&gt;whereis let&lt;BR /&gt;type let&lt;BR /&gt;&lt;BR /&gt;The let command is indeed a valid task within the shell but which and whereis have no clue. And which is actually a csh script! But it gets worse: which and whereis do NOT follow the $PATH values so the following shows how an unwitting user might run the wrong command:&lt;BR /&gt;&lt;BR /&gt;cat /dev/null &amp;gt; ./su&lt;BR /&gt;export PATH=.:$PATH&lt;BR /&gt;which su&lt;BR /&gt;whereis su&lt;BR /&gt;type su&lt;BR /&gt;&lt;BR /&gt;The last command (type su) shows what is going to happen and it is the only action that counts! The user will run something called su in the current working directory--a very bad situation. So type (or whence -v) should always be used to determine where a command is located.&lt;BR /&gt;&lt;BR /&gt;In the example above, the ordinary user seems to be getting passwd from a non-existant directory: /bin  YES, /bin is NOT a directory and like Solaris and other Unix's that follow the V.4 standard for filesystem layout, /bin disappeared and became /usr/bin. Now for the last 10 years or so, /bin (and /lib) have existed as a transition crutch (actually a symbolic link) but will someday disappear or at least become optional rather than the default. /bin should look like this:&lt;BR /&gt;&lt;BR /&gt;ll /bin&lt;BR /&gt;lr-xr-xr-t   1 root       sys              8 Dec 19  2002 /bin@ -&amp;gt; /usr/bin&lt;BR /&gt;&lt;BR /&gt;If instead you get a list of files, you've been hacked or at least someone with root privileges has messed up a critically important directory link. If the link is OK, then you'll need to find out why /bin/passwd is being located by which rather than /usr/bin. This behavior can be duplicated with:&lt;BR /&gt;&lt;BR /&gt;export PATH=/bin:$PATH&lt;BR /&gt;&lt;BR /&gt;but that is a bad situation since it is a non-standard PATH value. In HP-UX, the PATH variable is set in /etc/profile and /etc/csh.login by reading /etc/PATH, so check /etc/PATH for non-standard locations. /etc/PATH can be a big security risk if it includes directories with world-writable permissions (perhaps /usr/local/bin?).&lt;BR /&gt;&lt;BR /&gt;So to make sure you are really running ANY command, always use a full pathname as in:&lt;BR /&gt;&lt;BR /&gt;/usr/bin/passwd -f&lt;BR /&gt;</description>
    <pubDate>Thu, 26 Jun 2003 22:47:59 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2003-06-26T22:47:59Z</dc:date>
    <item>
      <title>password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008627#M751004</link>
      <description>Hi All&lt;BR /&gt;We have a password changing issue an a non-trusted Unix site running hp-ux11.00, when ageing is set, or forced change is activated. Changing root passowords or user passwords via root has no problems.&lt;BR /&gt;&lt;BR /&gt;However, when users try to change their own passwords they get the message 'sorry':&lt;BR /&gt;----&lt;BR /&gt;HP-UX charter1 B.11.00 U 9000/800 (td)&lt;BR /&gt;&lt;BR /&gt;login: test&lt;BR /&gt;Password:&lt;BR /&gt;Your password has expired. Choose a new one&lt;BR /&gt;You can now choose the new password.&lt;BR /&gt;&lt;BR /&gt;A valid password should be a mix of upper and lower case letters,&lt;BR /&gt;digits and other characters.  You can use a 6 character long&lt;BR /&gt;&lt;BR /&gt;password with characters from at least 3 of these 4 classes.&lt;BR /&gt;Characters that form a common pattern are discarded by the check.&lt;BR /&gt;&lt;BR /&gt;Enter new password:&lt;BR /&gt;Re-type new password:&lt;BR /&gt;Changing password for test&lt;BR /&gt;Sorry.&lt;BR /&gt;login:&lt;BR /&gt;&lt;BR /&gt;-----------&lt;BR /&gt;Any ideas to get around this? PASSWD_HISTORY_DEPTH has been set to 1 for now.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Stephen</description>
      <pubDate>Thu, 26 Jun 2003 12:00:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008627#M751004</guid>
      <dc:creator>Managed Services</dc:creator>
      <dc:date>2003-06-26T12:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008628#M751005</link>
      <description>Hi,&lt;BR /&gt;It seems that you don't have the standart passwd command, because there is not this kind of messages when password expire. I think you have a passwd software instead of the standart. Try to do "what /usr/bin/passwd".&lt;BR /&gt;&lt;BR /&gt;Cheers.</description>
      <pubDate>Thu, 26 Jun 2003 12:09:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008628#M751005</guid>
      <dc:creator>Bruno Vidal</dc:creator>
      <dc:date>2003-06-26T12:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008629#M751006</link>
      <description>Update&lt;BR /&gt;------&lt;BR /&gt;1. The user is able to change the password when logged in as themselves, however if passwd -f *user* is invoked by root then it gives the above problems when trying to log in.&lt;BR /&gt;2. This is a non-trusted site but there are quite a few stringent password changing procedures being activated e.g. similarity to the previous login and recognised strings (like user), which i would only expect trusted sites to use.</description>
      <pubDate>Thu, 26 Jun 2003 13:21:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008629#M751006</guid>
      <dc:creator>Managed Services</dc:creator>
      <dc:date>2003-06-26T13:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008630#M751007</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Can you post the results of:&lt;BR /&gt;&lt;BR /&gt;which passwd  (from a non-root user)&lt;BR /&gt;what &lt;PATH to="" passwd="" listed="" above=""&gt;/passwd&lt;BR /&gt;ll &lt;PATH to="" passwd="" listed="" above=""&gt;/passwd&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren.&lt;/PATH&gt;&lt;/PATH&gt;</description>
      <pubDate>Thu, 26 Jun 2003 13:33:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008630#M751007</guid>
      <dc:creator>Darren Prior</dc:creator>
      <dc:date>2003-06-26T13:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008631#M751008</link>
      <description>Are you, by any chance, running NIS? This sounds a lot like the messages that yppassdd will issue (and then relax after 3 attempts).&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jun 2003 13:55:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008631#M751008</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2003-06-26T13:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008632#M751009</link>
      <description>As non Root&lt;BR /&gt;-----------&lt;BR /&gt;test (charter1) &amp;gt; whence passwd&lt;BR /&gt;/bin/passwd&lt;BR /&gt;test (charter1) &amp;gt; what /bin/passwd&lt;BR /&gt;/bin/passwd:&lt;BR /&gt;         $Revision: 82.10.1.5 $&lt;BR /&gt;         PATCH_11_00: passwd.o 01/05/23&lt;BR /&gt;test (charter1) &amp;gt; ll /bin/passwd&lt;BR /&gt;-r-sr-xr-x   5 root       bin          49152 May 23  2001 /bin/passwd&lt;BR /&gt;&lt;BR /&gt;As Root&lt;BR /&gt;--------&lt;BR /&gt;# whence passwd&lt;BR /&gt;/usr/bin/passwd&lt;BR /&gt;# what /usr/bin/passwd&lt;BR /&gt;/usr/bin/passwd:&lt;BR /&gt;         $Revision: 82.10.1.5 $&lt;BR /&gt;         PATCH_11_00: passwd.o 01/05/23&lt;BR /&gt;# ll /usr/bin/passwd&lt;BR /&gt;-r-sr-xr-x   5 root       bin          49152 May 23  2001 /usr/bin/passwd&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Same patch, different location. Any ideas??</description>
      <pubDate>Thu, 26 Jun 2003 14:10:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008632#M751009</guid>
      <dc:creator>Managed Services</dc:creator>
      <dc:date>2003-06-26T14:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008633#M751010</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;Have you checked whether there is a minimum time set between password changes. If the user tries to change the password before that time is up they will get a 'sorry' message. &lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Keely</description>
      <pubDate>Thu, 26 Jun 2003 15:45:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008633#M751010</guid>
      <dc:creator>Keely Jackson</dc:creator>
      <dc:date>2003-06-26T15:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008634#M751011</link>
      <description>Hi Stephen,&lt;BR /&gt;&lt;BR /&gt;Just a guess but I have seen similar issues while using a machine on an NIS domain.  If you don't have the nsswitch.conf file configured to the contrary, your system may attempt to change the NIS password before the /etc/passwd file password.  This could lead to the "Sorry." you mentioned.&lt;BR /&gt; &lt;BR /&gt;Make sure you are explicite when selecting the repository in which the user should change their password.&lt;BR /&gt;&lt;BR /&gt;# passwd -r files -f&lt;BR /&gt;&lt;BR /&gt;Where did you set up PASSWD_HISTORY_DEPTH?  &lt;BR /&gt;To my knowledge PASSWD_HISTORY_DEPTH is only currently supported through trusted system.&lt;BR /&gt;&lt;BR /&gt;Tyler</description>
      <pubDate>Thu, 26 Jun 2003 21:37:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008634#M751011</guid>
      <dc:creator>Tyler Easterling</dc:creator>
      <dc:date>2003-06-26T21:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008635#M751012</link>
      <description>Hello!&lt;BR /&gt;&lt;BR /&gt;In trusted mode i use the /usr/bin/passwd command and as i see your root also&lt;BR /&gt;so try to use as non root /usr/bin/passwd&lt;BR /&gt;and see if it will help you.&lt;BR /&gt;&lt;BR /&gt;Caesar</description>
      <pubDate>Thu, 26 Jun 2003 21:43:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008635#M751012</guid>
      <dc:creator>Caesar_3</dc:creator>
      <dc:date>2003-06-26T21:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008636#M751013</link>
      <description>The /etc/default/security file has a number of possible settings, but the majority are ignored (silently) in non-Trusted systems. Specifically, the password history is kept in a Trusted directory so h=no history is kept in a non-Trusted system.&lt;BR /&gt;&lt;BR /&gt;It is important to retire the use of which and whereis to determine where a command is found. POSIX shells (ksh, HP's sh, bash, etc) all have the right command: type&lt;BR /&gt;&lt;BR /&gt;type passwd&lt;BR /&gt;&lt;BR /&gt;(type is an alias to whence -v) To see how which and whereis are ineffective, try this:&lt;BR /&gt;&lt;BR /&gt;which let&lt;BR /&gt;whereis let&lt;BR /&gt;type let&lt;BR /&gt;&lt;BR /&gt;The let command is indeed a valid task within the shell but which and whereis have no clue. And which is actually a csh script! But it gets worse: which and whereis do NOT follow the $PATH values so the following shows how an unwitting user might run the wrong command:&lt;BR /&gt;&lt;BR /&gt;cat /dev/null &amp;gt; ./su&lt;BR /&gt;export PATH=.:$PATH&lt;BR /&gt;which su&lt;BR /&gt;whereis su&lt;BR /&gt;type su&lt;BR /&gt;&lt;BR /&gt;The last command (type su) shows what is going to happen and it is the only action that counts! The user will run something called su in the current working directory--a very bad situation. So type (or whence -v) should always be used to determine where a command is located.&lt;BR /&gt;&lt;BR /&gt;In the example above, the ordinary user seems to be getting passwd from a non-existant directory: /bin  YES, /bin is NOT a directory and like Solaris and other Unix's that follow the V.4 standard for filesystem layout, /bin disappeared and became /usr/bin. Now for the last 10 years or so, /bin (and /lib) have existed as a transition crutch (actually a symbolic link) but will someday disappear or at least become optional rather than the default. /bin should look like this:&lt;BR /&gt;&lt;BR /&gt;ll /bin&lt;BR /&gt;lr-xr-xr-t   1 root       sys              8 Dec 19  2002 /bin@ -&amp;gt; /usr/bin&lt;BR /&gt;&lt;BR /&gt;If instead you get a list of files, you've been hacked or at least someone with root privileges has messed up a critically important directory link. If the link is OK, then you'll need to find out why /bin/passwd is being located by which rather than /usr/bin. This behavior can be duplicated with:&lt;BR /&gt;&lt;BR /&gt;export PATH=/bin:$PATH&lt;BR /&gt;&lt;BR /&gt;but that is a bad situation since it is a non-standard PATH value. In HP-UX, the PATH variable is set in /etc/profile and /etc/csh.login by reading /etc/PATH, so check /etc/PATH for non-standard locations. /etc/PATH can be a big security risk if it includes directories with world-writable permissions (perhaps /usr/local/bin?).&lt;BR /&gt;&lt;BR /&gt;So to make sure you are really running ANY command, always use a full pathname as in:&lt;BR /&gt;&lt;BR /&gt;/usr/bin/passwd -f&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Jun 2003 22:47:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008636#M751013</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2003-06-26T22:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008637#M751014</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The password changing mechanism for aged passwords, or forced change passwords does not use the passwd command at all. It uses a pam.conf entry, so this would be where to look. This is why root changes work, ie you are using the passwd command, whereas pam.conf entries do not.&lt;BR /&gt;&lt;BR /&gt;I had problems with this when implementing eTrust Access Control for password aging, meaning that native aging needed to be switched off, as replacing the passwd executable with sepasswd, (eTrusts passwd program) did not make any difference as the pam library routine was called rather than the program.</description>
      <pubDate>Fri, 27 Jun 2003 08:28:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008637#M751014</guid>
      <dc:creator>Scott Cheadle</dc:creator>
      <dc:date>2003-06-27T08:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008638#M751015</link>
      <description>After detailed investigation this has been tracked down to pam.conf policies. These had been changed - and probably not tested sufficiently - by the previous system admins. Although the syntax is correct the pam libraries are producing spurious outputs.&lt;BR /&gt;The password management section of pam.conf is:&lt;BR /&gt;#&lt;BR /&gt;# Password management&lt;BR /&gt;#&lt;BR /&gt;login session required  /usr/lib/security/libpam_updbe.1&lt;BR /&gt;login    password required  /usr/lib/security/pam_passwdqc.so ask_oldauthtok&lt;BR /&gt;=update check_oldauthtok min=disabled,6,6,6,6 max=8 passphrase=0 enforce=users r&lt;BR /&gt;etry=3 random=0 match=3&lt;BR /&gt;login   password required  /usr/lib/security/libpam_unix.1&lt;BR /&gt;passwd   session required  /usr/lib/security/libpam_updbe.1&lt;BR /&gt;passwd   password required  /usr/lib/security/pam_passwdqc.so ask_oldauthtok&lt;BR /&gt;=update check_oldauthtok min=disabled,6,6,6,6 max=8 passphrase=0 enforce=users r&lt;BR /&gt;etry=3 random=0 match=3&lt;BR /&gt;passwd   password required  /usr/lib/security/libpam_unix.1 use_first_pass&lt;BR /&gt;&lt;BR /&gt;The use_first_password argument is causing the premature abort and 'sorry' message, and the pam_passwdqc.so is very restrictive yet does not change the password!&lt;BR /&gt;&lt;BR /&gt;I've turned them off... :) Anyone any ideas why they don't? work. Curious.&lt;BR /&gt;Stephen</description>
      <pubDate>Mon, 18 Aug 2003 12:59:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008638#M751015</guid>
      <dc:creator>Managed Services</dc:creator>
      <dc:date>2003-08-18T12:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008639#M751016</link>
      <description>Things to think about:&lt;BR /&gt;&lt;BR /&gt;I won't be able to follow up.&lt;BR /&gt;&lt;BR /&gt;Was this system ever trusted? Maybe the downgrade failed.&lt;BR /&gt;&lt;BR /&gt;pwck&lt;BR /&gt;&lt;BR /&gt;grpck&lt;BR /&gt;&lt;BR /&gt;These two commands look for inconsistencies in the /etc/passwd file.&lt;BR /&gt;&lt;BR /&gt;Check the permissions of the passwd command.  It must have root suid priveledges or regular users won't be able to change their passwords, they'll get the sorry command.&lt;BR /&gt;&lt;BR /&gt;Here are the correct permissions.&lt;BR /&gt;-r-sr-xr-x   5 root       bin          45056 Nov 14  2000 /usr/bin/passwd&lt;BR /&gt;&lt;BR /&gt;Whereever password history is being kept: Who owns the file, and what are the permissions.&lt;BR /&gt;&lt;BR /&gt;Getting a common theme?&lt;BR /&gt;&lt;BR /&gt;Good Luck,&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;The Sundance Wyoming Sysadmin&lt;BR /&gt;Any 9000 Servers in these hills?</description>
      <pubDate>Mon, 18 Aug 2003 13:43:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008639#M751016</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-18T13:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: password ageing in non-trusted sites: sorry</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008640#M751017</link>
      <description>not ever a trusted site - as far as I'm aware.&lt;BR /&gt;&lt;BR /&gt;passwd permissions ok&lt;BR /&gt;&lt;BR /&gt;pwck .. produced a couple of errors for invalif homes directories. not bad for 500+users&lt;BR /&gt;grpck... clear&lt;BR /&gt;&lt;BR /&gt;The issue it appears is pam.comf and the login entries.&lt;BR /&gt;&lt;BR /&gt;I'm submitting a new thread for this.&lt;BR /&gt;Stephen</description>
      <pubDate>Tue, 19 Aug 2003 11:04:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-ageing-in-non-trusted-sites-sorry/m-p/3008640#M751017</guid>
      <dc:creator>Managed Services</dc:creator>
      <dc:date>2003-08-19T11:04:27Z</dc:date>
    </item>
  </channel>
</rss>

