<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricted Shell and /etc/default/security file in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873636#M751897</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;My article points out that unless your system is correctly patched, the correct behavior for rsh, as pointed out in one of the above links: &lt;BR /&gt;&lt;BR /&gt;the following is disable by using a restricted shell: &lt;BR /&gt;- Changing directory (cd) &lt;BR /&gt;- Setting the value of SHELL, ENV, or PATH &lt;BR /&gt;- Specifying path or command names containing / &lt;BR /&gt;- Redirecting output (&amp;gt;, &amp;gt;|, &amp;lt;&amp;gt;, and &amp;gt;&amp;gt;) &lt;BR /&gt;&lt;BR /&gt;does not work correctly. Also, if you go to a new site and saw the setting of "RSH_SECURITY=0" yikes!&lt;BR /&gt;&lt;BR /&gt;It is important to continually check the behavior of security settings as they may change. This may be a mistake on HP's part, but a security admin shouldn't assume a default behavior, even though you would think it is OK.  For example, At one point, it was "fixed" so that only a user from a hpterm could send commands to a session opened by root that was writeable.  When I was teaching a security class several months ago, it was determined that this worked from anywhere (11i), not just the hpterm. Perhaps it was a patch issue, but the point being that the system wasn't working as you would expect. (Yes, yes, yes, root shouldn't have a writeable session).&lt;BR /&gt;&lt;BR /&gt;As far as using "vi" with the rsh, I haven't played with that, but would be very cautious.  You wouldn't want them to be able to write files into their home directory or bin, and I suppose there would be an issue with the /tmp directory.&lt;BR /&gt;&lt;BR /&gt;- Chris</description>
    <pubDate>Fri, 03 Jan 2003 18:36:56 GMT</pubDate>
    <dc:creator>Chris Wong</dc:creator>
    <dc:date>2003-01-03T18:36:56Z</dc:date>
    <item>
      <title>Restricted Shell and /etc/default/security file</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873634#M751895</link>
      <description>Happy New Year to everyone.&lt;BR /&gt;I've added an article on the /etc/default/security settings that can be used for restricted shell users.  You can find it here:&lt;BR /&gt;&lt;A href="http://newfdawg.com/SHP-RestShell" target="_blank"&gt;http://newfdawg.com/SHP-RestShell&lt;/A&gt;&lt;BR /&gt;Please understand that the old (bad) default behavior only exists if you have not applied specific patches (not necessarily the patches I mention). &lt;BR /&gt;&lt;BR /&gt;(BTW, SearchHP.com shutdown a few weeks ago, so you won't be getting anything from this site anymore if you were subscribed).  I had already written the article before they shutdown.&lt;BR /&gt;&lt;BR /&gt;- Chris</description>
      <pubDate>Thu, 02 Jan 2003 23:29:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873634#M751895</guid>
      <dc:creator>Chris Wong</dc:creator>
      <dc:date>2003-01-02T23:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Shell and /etc/default/security file</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873635#M751896</link>
      <description>Is your procedure vi(1)-safe?&lt;BR /&gt;&lt;BR /&gt;While you do not say that vi(1) is an acceptable command (in the user's bin directory), you also do not specifically exclude it.&lt;BR /&gt;&lt;BR /&gt;Note: I have not tried with a /etc/default/security file, but normally rsh(1) can not be made secure without a chroot-ed environment, i.e. using the 'Subsystem' login facility of login(1) ("*" in the command name field of the /etc/passwd entry).&lt;BR /&gt;&lt;BR /&gt;See for example the following threads:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x77cf7680e012d71190050090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x77cf7680e012d71190050090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x31298f960573d611abdb0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x31298f960573d611abdb0090277a778c,00.html&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 03 Jan 2003 09:52:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873635#M751896</guid>
      <dc:creator>Frank Slootweg</dc:creator>
      <dc:date>2003-01-03T09:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Shell and /etc/default/security file</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873636#M751897</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;My article points out that unless your system is correctly patched, the correct behavior for rsh, as pointed out in one of the above links: &lt;BR /&gt;&lt;BR /&gt;the following is disable by using a restricted shell: &lt;BR /&gt;- Changing directory (cd) &lt;BR /&gt;- Setting the value of SHELL, ENV, or PATH &lt;BR /&gt;- Specifying path or command names containing / &lt;BR /&gt;- Redirecting output (&amp;gt;, &amp;gt;|, &amp;lt;&amp;gt;, and &amp;gt;&amp;gt;) &lt;BR /&gt;&lt;BR /&gt;does not work correctly. Also, if you go to a new site and saw the setting of "RSH_SECURITY=0" yikes!&lt;BR /&gt;&lt;BR /&gt;It is important to continually check the behavior of security settings as they may change. This may be a mistake on HP's part, but a security admin shouldn't assume a default behavior, even though you would think it is OK.  For example, At one point, it was "fixed" so that only a user from a hpterm could send commands to a session opened by root that was writeable.  When I was teaching a security class several months ago, it was determined that this worked from anywhere (11i), not just the hpterm. Perhaps it was a patch issue, but the point being that the system wasn't working as you would expect. (Yes, yes, yes, root shouldn't have a writeable session).&lt;BR /&gt;&lt;BR /&gt;As far as using "vi" with the rsh, I haven't played with that, but would be very cautious.  You wouldn't want them to be able to write files into their home directory or bin, and I suppose there would be an issue with the /tmp directory.&lt;BR /&gt;&lt;BR /&gt;- Chris</description>
      <pubDate>Fri, 03 Jan 2003 18:36:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873636#M751897</guid>
      <dc:creator>Chris Wong</dc:creator>
      <dc:date>2003-01-03T18:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Shell and /etc/default/security file</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873637#M751898</link>
      <description>&amp;gt; As far as using "vi" with the rsh, I haven't played with that, but would be very cautious.&lt;BR /&gt;&amp;gt; You wouldn't want them to be able to write files into their home directory or bin, and I suppose there would be&lt;BR /&gt;&amp;gt; an issue with the /tmp directory.&lt;BR /&gt;&lt;BR /&gt;Well, I don't really believe in 'security by obscurity', so I might as well be more specific:&lt;BR /&gt;&lt;BR /&gt;I was implicitly referring to setting the shell with ":set shell=...." and then executing that shell. Also, if you can execute chsh(1), you can get rid of the restricted shell altogether. &lt;BR /&gt;</description>
      <pubDate>Mon, 06 Jan 2003 09:20:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-shell-and-etc-default-security-file/m-p/2873637#M751898</guid>
      <dc:creator>Frank Slootweg</dc:creator>
      <dc:date>2003-01-06T09:20:34Z</dc:date>
    </item>
  </channel>
</rss>

