<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: /etc/default/security file on an untrusted system in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803030#M754328</link>
    <description>Hi Michael,&lt;BR /&gt;&lt;BR /&gt;Yes you can use those functions on an untrusted system.  Please note that according to the patch text:&lt;BR /&gt;&lt;BR /&gt;"These parameters have effect only when a password is changed.  On untrusted systems, these parameters do not apply to the root user.  The file /etc/default/security should be owned by root and have 0644 permissions."&lt;BR /&gt;&lt;BR /&gt;Root can still override the rules when changing a user password.&lt;BR /&gt;&lt;BR /&gt;If you attempt to change a password to something that doesn't comply with the rules you'll see a message like:&lt;BR /&gt;&lt;BR /&gt;"The password entered is not valid.  Valid password must contains at least:&lt;BR /&gt;&lt;BR /&gt;2 upper case character(s)&lt;BR /&gt;3 lower case character(s)&lt;BR /&gt;etc.."&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren.</description>
    <pubDate>Tue, 10 Sep 2002 08:46:52 GMT</pubDate>
    <dc:creator>Darren Prior</dc:creator>
    <dc:date>2002-09-10T08:46:52Z</dc:date>
    <item>
      <title>/etc/default/security file on an untrusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803029#M754327</link>
      <description>Folks&lt;BR /&gt;&lt;BR /&gt;Can the following parameters be set in the /etc/default/security file on an untrusted system?&lt;BR /&gt;&lt;BR /&gt;PASSWORD_HISTORY_DEPTH&lt;BR /&gt;PASSWORD_MIN_UPPER_CASE_CHARS &lt;BR /&gt;PASSWORD_MIN_LOWER_CASE_CHARS &lt;BR /&gt;PASSWORD_MIN_DIGIT_CHARS&lt;BR /&gt;PASSWORD_MIN_SPECIAL_CHARS&lt;BR /&gt;&lt;BR /&gt;We don't want to convert to trusted but we have installed the PHCO_26089 patch.&lt;BR /&gt;&lt;BR /&gt;Any help appreciated.&lt;BR /&gt;&lt;BR /&gt;Michael</description>
      <pubDate>Tue, 10 Sep 2002 07:35:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803029#M754327</guid>
      <dc:creator>Michael Campbell</dc:creator>
      <dc:date>2002-09-10T07:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/default/security file on an untrusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803030#M754328</link>
      <description>Hi Michael,&lt;BR /&gt;&lt;BR /&gt;Yes you can use those functions on an untrusted system.  Please note that according to the patch text:&lt;BR /&gt;&lt;BR /&gt;"These parameters have effect only when a password is changed.  On untrusted systems, these parameters do not apply to the root user.  The file /etc/default/security should be owned by root and have 0644 permissions."&lt;BR /&gt;&lt;BR /&gt;Root can still override the rules when changing a user password.&lt;BR /&gt;&lt;BR /&gt;If you attempt to change a password to something that doesn't comply with the rules you'll see a message like:&lt;BR /&gt;&lt;BR /&gt;"The password entered is not valid.  Valid password must contains at least:&lt;BR /&gt;&lt;BR /&gt;2 upper case character(s)&lt;BR /&gt;3 lower case character(s)&lt;BR /&gt;etc.."&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren.</description>
      <pubDate>Tue, 10 Sep 2002 08:46:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803030#M754328</guid>
      <dc:creator>Darren Prior</dc:creator>
      <dc:date>2002-09-10T08:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/default/security file on an untrusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803031#M754329</link>
      <description>Michael,&lt;BR /&gt;&lt;BR /&gt;Absolutely!  We've been using the SU_ROOT_GROUP feature on untrusted systems for quite some time now.&lt;BR /&gt;&lt;BR /&gt;Enjoy,&lt;BR /&gt;Pete</description>
      <pubDate>Tue, 10 Sep 2002 09:17:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803031#M754329</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2002-09-10T09:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/default/security file on an untrusted system</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803032#M754330</link>
      <description>All on your list EXCEPT the PASSWORD_HISTORY_DEPTH should work fine when not in trusted mode.  That one won't work because the password history info is stored under /tcb, which doesn't exist except in trusted mode.</description>
      <pubDate>Wed, 11 Sep 2002 09:08:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-default-security-file-on-an-untrusted-system/m-p/2803032#M754330</guid>
      <dc:creator>doug hosking</dc:creator>
      <dc:date>2002-09-11T09:08:57Z</dc:date>
    </item>
  </channel>
</rss>

