<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: telnet and ssh in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775752#M753897</link>
    <description>Leaving the telnet port open is never a good idea, remember that 80% of attacks originate from within your organisation, and IP addresses are very simple to spoof.&lt;BR /&gt;Modify all but your admin accounts so that users login times are limited to normal business hours, then limit any administrative access as much as possible. &lt;BR /&gt;You can use GSP and Secure Web Console as backdoors if the machine goes belly-up, and perhaps put these behind a firewall, or onto a VLAN.&lt;BR /&gt;&lt;BR /&gt;As far as SSH is concerned set it up so that users have to login as themselves then su to privelidged accounts, especially when relying on keys. The main problem with keys is that they are stored on your pc which is less secure than the Unix system, and that there is nothing to force users to protect them with adequate challenge-phrases, or to periodically renew phrases.&lt;BR /&gt;&lt;BR /&gt;I hope this helps.</description>
    <pubDate>Wed, 31 Jul 2002 04:30:51 GMT</pubDate>
    <dc:creator>Andrew Cowan</dc:creator>
    <dc:date>2002-07-31T04:30:51Z</dc:date>
    <item>
      <title>telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775746#M753891</link>
      <description>I have installed ssh 3.4 onto my machine without problems. Generated all my keys and works OK from the clients.&lt;BR /&gt;Does anyone know the best way to tie down rlogin and telnet so that users can only use ssh.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.</description>
      <pubDate>Tue, 30 Jul 2002 15:10:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775746#M753891</guid>
      <dc:creator>Peter Hakesley_2</dc:creator>
      <dc:date>2002-07-30T15:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775747#M753892</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;You can use /var/adm/inet.sec as a starter and put in &lt;BR /&gt;&lt;BR /&gt;telnet deny *&lt;BR /&gt;login deny *&lt;BR /&gt;&lt;BR /&gt;Hope this helps&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Tue, 30 Jul 2002 15:15:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775747#M753892</guid>
      <dc:creator>Christopher McCray_1</dc:creator>
      <dc:date>2002-07-30T15:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775748#M753893</link>
      <description>Hello again,&lt;BR /&gt;&lt;BR /&gt;sorry, omit the * and you'll be fine.&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Tue, 30 Jul 2002 15:16:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775748#M753893</guid>
      <dc:creator>Christopher McCray_1</dc:creator>
      <dc:date>2002-07-30T15:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775749#M753894</link>
      <description>The best way is to remove them from /etc/inetd.conf, and then restart inetd. Then you can make sure they aren't running by doing a netstat -an and making sure port 23 isn't listening.&lt;BR /&gt;&lt;BR /&gt;Otherwise, inetd.sec is a great option if you want to allow yourself (admins) access only.&lt;BR /&gt;&lt;BR /&gt;And if you want things really secure, search these forums for Bastion Host and follow the process there.&lt;BR /&gt;&lt;BR /&gt;Cheers!&lt;BR /&gt;James</description>
      <pubDate>Tue, 30 Jul 2002 15:18:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775749#M753894</guid>
      <dc:creator>James Beamish-White</dc:creator>
      <dc:date>2002-07-30T15:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775750#M753895</link>
      <description>&lt;BR /&gt;Remove the telnet and rlogin binaries and replace them with symbolic links to ssh&lt;BR /&gt;That will stop them!&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Jul 2002 15:21:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775750#M753895</guid>
      <dc:creator>Stefan Farrelly</dc:creator>
      <dc:date>2002-07-30T15:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775751#M753896</link>
      <description>Another thought,&lt;BR /&gt;&lt;BR /&gt;You may want to put in a couple of ip addresses that can use telnet, just as a failsafe in case ssh goes hokey:&lt;BR /&gt;&lt;BR /&gt;telnet allow 1.2.3.4&lt;BR /&gt;&lt;BR /&gt;or&lt;BR /&gt;&lt;BR /&gt;telnet allow 1.2.3.4-6&lt;BR /&gt;&lt;BR /&gt;as an example&lt;BR /&gt;&lt;BR /&gt;You never know!!!!&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Tue, 30 Jul 2002 15:23:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775751#M753896</guid>
      <dc:creator>Christopher McCray_1</dc:creator>
      <dc:date>2002-07-30T15:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775752#M753897</link>
      <description>Leaving the telnet port open is never a good idea, remember that 80% of attacks originate from within your organisation, and IP addresses are very simple to spoof.&lt;BR /&gt;Modify all but your admin accounts so that users login times are limited to normal business hours, then limit any administrative access as much as possible. &lt;BR /&gt;You can use GSP and Secure Web Console as backdoors if the machine goes belly-up, and perhaps put these behind a firewall, or onto a VLAN.&lt;BR /&gt;&lt;BR /&gt;As far as SSH is concerned set it up so that users have to login as themselves then su to privelidged accounts, especially when relying on keys. The main problem with keys is that they are stored on your pc which is less secure than the Unix system, and that there is nothing to force users to protect them with adequate challenge-phrases, or to periodically renew phrases.&lt;BR /&gt;&lt;BR /&gt;I hope this helps.</description>
      <pubDate>Wed, 31 Jul 2002 04:30:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775752#M753897</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2002-07-31T04:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: telnet and ssh</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775753#M753898</link>
      <description>I think the best way to do this would be to stop inetd from starting them.  To do this take the entries from the inetd.conf and then run inetd -c to reconfigure the daemon.  You should also remove them from the services file.&lt;BR /&gt;&lt;BR /&gt;An important task to do after that is to create a process that will check the file to ensure that it is not opened again without your knowledge.  Either a sys admin, malicious user, or an installation of a product may open it up so you should check it on a regular basis.&lt;BR /&gt;&lt;BR /&gt;Another thing to consider is removing ftp and all the other r commands as well.</description>
      <pubDate>Wed, 31 Jul 2002 11:52:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-and-ssh/m-p/2775753#M753898</guid>
      <dc:creator>Daimian Woznick</dc:creator>
      <dc:date>2002-07-31T11:52:37Z</dc:date>
    </item>
  </channel>
</rss>

