<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Attack on root password in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925179#M752373</link>
    <description>I have a prod. server with HP Trusted System and with n number of retries before root is locked. I also have disable remote telnet for root account. Specific User group are use to to "su" to root to gain access. If I disable the retries on root, I am subjected to Brute Force attack. &lt;BR /&gt;&lt;BR /&gt;I would like to enquire what if an attack on root password by making several unsuccessfull login to root just to disable it. &lt;BR /&gt;&lt;BR /&gt;And also another point I note for the number of retries on password could prompt hacker to keep a list of known password that doesn't work. Over time he may be able to make intelligent guess on the root password that works.&lt;BR /&gt;&lt;BR /&gt;How does HP Trusted System address such attack?&lt;BR /&gt;&lt;BR /&gt;Our process to recover/restore root passwd after the account is disable is very complex.&lt;BR /&gt;&lt;BR /&gt;I heard about "Password Evading" mechanism in VMS system where the a/c is not lock but evading mechanism activated after n tries. During this evading period, even with correct password it still can't login. It have to wait either the evading period expired or sysAdmin have to deactivate the mechanism.&lt;BR /&gt;&lt;BR /&gt;Does HP Trusted System have such similar capabilities??</description>
    <pubDate>Wed, 12 Mar 2003 14:27:27 GMT</pubDate>
    <dc:creator>YLTan</dc:creator>
    <dc:date>2003-03-12T14:27:27Z</dc:date>
    <item>
      <title>Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925179#M752373</link>
      <description>I have a prod. server with HP Trusted System and with n number of retries before root is locked. I also have disable remote telnet for root account. Specific User group are use to to "su" to root to gain access. If I disable the retries on root, I am subjected to Brute Force attack. &lt;BR /&gt;&lt;BR /&gt;I would like to enquire what if an attack on root password by making several unsuccessfull login to root just to disable it. &lt;BR /&gt;&lt;BR /&gt;And also another point I note for the number of retries on password could prompt hacker to keep a list of known password that doesn't work. Over time he may be able to make intelligent guess on the root password that works.&lt;BR /&gt;&lt;BR /&gt;How does HP Trusted System address such attack?&lt;BR /&gt;&lt;BR /&gt;Our process to recover/restore root passwd after the account is disable is very complex.&lt;BR /&gt;&lt;BR /&gt;I heard about "Password Evading" mechanism in VMS system where the a/c is not lock but evading mechanism activated after n tries. During this evading period, even with correct password it still can't login. It have to wait either the evading period expired or sysAdmin have to deactivate the mechanism.&lt;BR /&gt;&lt;BR /&gt;Does HP Trusted System have such similar capabilities??</description>
      <pubDate>Wed, 12 Mar 2003 14:27:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925179#M752373</guid>
      <dc:creator>YLTan</dc:creator>
      <dc:date>2003-03-12T14:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925180#M752374</link>
      <description>No, HP-UX does not have any "password evading" mechanism, though that is an interesting concept.&lt;BR /&gt;&lt;BR /&gt;The basic principle that HP-UX uses, you already know.  After XX number of incorrect login attempts, the account will be disabled.  &lt;BR /&gt;&lt;BR /&gt;If the root account gets disabled, it is not difficult to reactivate it.  Even if the account is disabled you can ALWAYS log in to the console and then do a modprpw to reactivate root.</description>
      <pubDate>Wed, 12 Mar 2003 14:35:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925180#M752374</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2003-03-12T14:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925181#M752375</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If your root account is disabled you can always login as root on the console and re-enable the account.&lt;BR /&gt;&lt;BR /&gt;If a password is mixed alphanumric and reasonably long it is hard to crack and advice is to change regularly.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Another simple one is to add a check to /etc/profile something like&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;if [ `who am i | awk '{ print $1 }'` = root -a `tty` != "/dev/console" ]&lt;BR /&gt;then&lt;BR /&gt;         echo "Error: root logins are only allowed on the console. "&lt;BR /&gt;         exit 1&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Then any root login not on the console will log back out.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;              steve Steel</description>
      <pubDate>Wed, 12 Mar 2003 14:39:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925181#M752375</guid>
      <dc:creator>Steve Steel</dc:creator>
      <dc:date>2003-03-12T14:39:29Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925182#M752376</link>
      <description>In my humble opinion, the best thing to do is to change the root password periodically, never longer than every 60 days. Don't reuse passwords, and don't give the password to anyone that you wouldn't let date your daughter. Keep the passwords a combination of upper and lower case letters, numbers and punctuation. Don't use an @ sign in the password, it messes up the console.</description>
      <pubDate>Wed, 12 Mar 2003 14:45:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925182#M752376</guid>
      <dc:creator>John Dvorchak</dc:creator>
      <dc:date>2003-03-12T14:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925183#M752377</link>
      <description>we use root and another security user as root&lt;BR /&gt;&lt;BR /&gt;passwords have to be at least 7 chars and one char has to be alpha, one numeric, and one special char&lt;BR /&gt;&lt;BR /&gt;they are aged at 30 days, which we have griped about, make it 32 so it at least is on a monthly cycle&lt;BR /&gt;&lt;BR /&gt;if root gets disabled, the security user can reenable it</description>
      <pubDate>Wed, 12 Mar 2003 14:56:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925183#M752377</guid>
      <dc:creator>John Bolene</dc:creator>
      <dc:date>2003-03-12T14:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925184#M752378</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;There's certainly some interesting points in your posting.&lt;BR /&gt;&lt;BR /&gt;With regard to the concept of a hacker keeping a password list and attempting to retry; on a trusted system you should keep the number of retries on this account low.  You should also choose your passwords wisely (perhaps using some of the restriction methods - ie number of alpha chars, number of numerics, etc) and change them regularly.  This should reduce the chance of an attack where someone is recording passwords and retrying.&lt;BR /&gt;&lt;BR /&gt;If you increase the number of retries, it is less likely than someone will get the account disabled through excessive retries, but they're more likely to be able to find the password - this is where the complexity of the password will help.&lt;BR /&gt;&lt;BR /&gt;It is a matter of balancing the requirements of password ageing and retries with the likelyhood of someone attempting to hack the system.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren</description>
      <pubDate>Wed, 12 Mar 2003 16:04:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925184#M752378</guid>
      <dc:creator>Darren Prior</dc:creator>
      <dc:date>2003-03-12T16:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925185#M752379</link>
      <description>You've taken some good steps already.&lt;BR /&gt;&lt;BR /&gt;I personally would think about a firewall even the HP firewall to protect your system.&lt;BR /&gt;&lt;BR /&gt;You should be able to figure out what the source IP address of the hacker is and set up /var/adm/inetd.sec to block that IP address from any access to your machine.&lt;BR /&gt;&lt;BR /&gt;Further, I recommend the steps below:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;security_patch_check: Checks your system and makes sure its up to date with security patches from HP&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Required Perl install&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Bastille: Security Hardening Tool&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;TCP Wrappers&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Secure Shell: a replacement for rcp ftp and telnet that encrypts passwords&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;IDS/9000 Intrusion Detection System which can track security breaches and attempted security breaches.&lt;BR /&gt;&lt;BR /&gt;Attached is Chris Vale's paper on how to set up passwordless services by exchanging public keys.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Mar 2003 16:18:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925185#M752379</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-12T16:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925186#M752380</link>
      <description>You've taken some good steps already.&lt;BR /&gt;&lt;BR /&gt;I personally would think about a firewall even the HP firewall to protect your system.&lt;BR /&gt;&lt;BR /&gt;You should be able to figure out what the source IP address of the hacker is and set up /var/adm/inetd.sec to block that IP address from any access to your machine.&lt;BR /&gt;&lt;BR /&gt;Further, I recommend the steps below:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;security_patch_check: Checks your system and makes sure its up to date with security patches from HP&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Required Perl install&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Bastille: Security Hardening Tool&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;TCP Wrappers&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=TCPWRAP&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Secure Shell: a replacement for rcp ftp and telnet that encrypts passwords&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;IDS/9000 Intrusion Detection System which can track security breaches and attempted security breaches.&lt;BR /&gt;&lt;BR /&gt;Attached is Chris Vale's paper on how to set up passwordless services by exchanging public keys.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Mar 2003 16:18:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925186#M752380</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-12T16:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Attack on root password</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925187#M752381</link>
      <description>You can limit direct root logins to the console, with /etc/securetty.  This is what we've done here.  Attached is the document we use here to harden HPUX 11.0 systems.&lt;BR /&gt;&lt;BR /&gt;Like the others mention, you can set the number of tries before disabling the root account.  However, be careful with this.&lt;BR /&gt;&lt;BR /&gt;Our root password had an @ in it.  Our facilities people insisted that we use a Dell LCD rack-mountable keyboard/screen as the main console to the service processors for our 2 V-class machines.  The V-class doesn't have a console: they have these processors (a B180L workstation) connected with thin-net, of all things.  The Dell keyboard doesn't send the @ symbol for some reason.  So we locked out the root account last weekend when we were scheduling maintenance on the system.  Without a console, the only thing we could do was to reboot to single user mode.  Fortunately, we had taken Oracle down by going in with secure shell, and also detached the system logically from the SAN.  So the only complaint was from HPUX itself.  But we changed the password instantly.  &lt;BR /&gt;&lt;BR /&gt;Following the hardening document will make your system a lot more secure.  If you want total security, lock your CPU in a bank vault and unplug it.  Anything short of that, and you'll have to have some compromises in your security plan.  However, the compromises mentioned here are not too bad.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Wed, 12 Mar 2003 17:19:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/attack-on-root-password/m-p/2925187#M752381</guid>
      <dc:creator>Chris Vail</dc:creator>
      <dc:date>2003-03-12T17:19:26Z</dc:date>
    </item>
  </channel>
</rss>

