<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security concerns with rexec? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072660#M751419</link>
    <description>None of the Berkley port 512 r-protocols are secure.  They pass authentication information in a inscure way.&lt;BR /&gt;&lt;BR /&gt;They are to be avoided, especially on systems that are exposed to the Internet.&lt;BR /&gt;&lt;BR /&gt;Most of the Berkley protocols are replaced by secure shell&lt;BR /&gt;&lt;BR /&gt;I'm more familiar with &lt;BR /&gt;remesh ssh&lt;BR /&gt;rcp    scp&lt;BR /&gt;ftp    sftp&lt;BR /&gt;&lt;BR /&gt;Than rexec.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Tue, 16 Sep 2003 19:49:07 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2003-09-16T19:49:07Z</dc:date>
    <item>
      <title>security concerns with rexec?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072659#M751418</link>
      <description>One of our software packages is coming out with a JAVA based GUI release. They need to use rexec. If I set it up on a different port thna 512, are there any other concerns I should have using it? I have read some postings and I'm not sure of I should be concerned. Thanks.&lt;BR /&gt;Richard</description>
      <pubDate>Tue, 16 Sep 2003 19:43:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072659#M751418</guid>
      <dc:creator>Richard Darling</dc:creator>
      <dc:date>2003-09-16T19:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: security concerns with rexec?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072660#M751419</link>
      <description>None of the Berkley port 512 r-protocols are secure.  They pass authentication information in a inscure way.&lt;BR /&gt;&lt;BR /&gt;They are to be avoided, especially on systems that are exposed to the Internet.&lt;BR /&gt;&lt;BR /&gt;Most of the Berkley protocols are replaced by secure shell&lt;BR /&gt;&lt;BR /&gt;I'm more familiar with &lt;BR /&gt;remesh ssh&lt;BR /&gt;rcp    scp&lt;BR /&gt;ftp    sftp&lt;BR /&gt;&lt;BR /&gt;Than rexec.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 16 Sep 2003 19:49:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072660#M751419</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-09-16T19:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: security concerns with rexec?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072661#M751420</link>
      <description>Hi Richard,&lt;BR /&gt;&lt;BR /&gt;The reason why 'rexec' is treated as a security vulneragbility is that the password flows in cleartext as well it may tempt users to keep their login names and passwords in text files like .netrc.&lt;BR /&gt;&lt;BR /&gt;You will really gain a little by moving them to a different port as both the above issues are still there. &lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Tue, 16 Sep 2003 19:52:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072661#M751420</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2003-09-16T19:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: security concerns with rexec?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072662#M751421</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If the rexec client and rexec server resides on the same vlan (subnet) on a switch, then minimal risk is with cleartext messages being sniffed only either at the client or at the server.&lt;BR /&gt;&lt;BR /&gt;If the rexec client can reside anywhere on the Internet and its traffic is not tunnelled over VPN, SSH or SSL, then you are exposed to a much high risk of your traffic being sniffed anywhere on the Internet along the traffic route. Man-in-the-middle attacks can be performed against your rexec traffic, resulting in loss of both confidentiality and integrity of your information.&lt;BR /&gt;&lt;BR /&gt;Ideally, your Java based GUI should use ssh instead of rexec to execute commands remotely. With public key pairs properly set on both client and server, ssh commands can be executed without any need to login.&lt;BR /&gt;&lt;BR /&gt;If it is legacy or proprietary to use rexec, then tunnel it over SSH (openssh) or SSL (stunnel) or HTTPS (since this is a JAVA-based client). One less elegant workaround would be to run rexec as a wrapper script to ssh and rexecd as a wrapper deamon to sshd.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Wed, 17 Sep 2003 03:02:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-concerns-with-rexec/m-p/3072662#M751421</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2003-09-17T03:02:46Z</dc:date>
    </item>
  </channel>
</rss>

