<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: /etc/passwd users in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853254#M755152</link>
    <description>As the others said, don't do it.&lt;BR /&gt;&lt;BR /&gt;On a few of those users, you can probably safely change the shells to /bin/false.  However, it won't really increase the security of the system.  The * in the password field will prevent anyone from logging in.  DO NOT set a password for these users.&lt;BR /&gt;&lt;BR /&gt;If you're interested in securing your system, try HP-UX Bastille.  The tool is supported by HP and explains the tradeoffs of implementing security features.  It's also supposed to be very educational (I hope it is for you.)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;</description>
    <pubDate>Wed, 27 Nov 2002 16:47:33 GMT</pubDate>
    <dc:creator>Keith Buck</dc:creator>
    <dc:date>2002-11-27T16:47:33Z</dc:date>
    <item>
      <title>/etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853250#M755148</link>
      <description>There are some users that seem to be a little non-secured. I want to remove them or to give them a false shell. Is this going to help securing the system? Is it enough to comment the users?&lt;BR /&gt;Can I delete them completely?&lt;BR /&gt;Hi all, I'm a dummy in HP-UX. &lt;BR /&gt;I'm trying to secure my system a little.&lt;BR /&gt;Here are the users:&lt;BR /&gt;daemon:*:1:5::/:/sbin/sh&lt;BR /&gt;bin:*:2:2::/usr/bin:/sbin/sh&lt;BR /&gt;sys:*:3:3::/:/bin/false&lt;BR /&gt;adm:*:4:4::/var/adm:/sbin/sh&lt;BR /&gt;uucp:*:5:3::/var/spool/uucppublic:/usr/lbin/uucp/uucico&lt;BR /&gt;nuucp:*:11:11::/var/spool/uucppublic:/usr/lbin/uucp/uucico&lt;BR /&gt;hpdb:*:27:1:ALLBASE:/:/sbin/sh&lt;BR /&gt;www:*:30:1::/:&lt;BR /&gt;tftp:,.:510:1:Trivial FTP user:/home/tftpdir:/usr/bin/false</description>
      <pubDate>Wed, 27 Nov 2002 12:01:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853250#M755148</guid>
      <dc:creator>Noa Harel_2</dc:creator>
      <dc:date>2002-11-27T12:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853251#M755149</link>
      <description>You really don't want to be messing about with any of these users else you will probably find your system becomes unbootable or at least unstable.&lt;BR /&gt;&lt;BR /&gt;The above users are all system users with standard security settings and should not normally cause any security risks.&lt;BR /&gt;&lt;BR /&gt;I hope this helps,&lt;BR /&gt;&lt;BR /&gt;Robert Thorneycroft</description>
      <pubDate>Wed, 27 Nov 2002 12:12:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853251#M755149</guid>
      <dc:creator>Robert Thorneycroft</dc:creator>
      <dc:date>2002-11-27T12:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853252#M755150</link>
      <description>No!  Don't do it!  &lt;BR /&gt;&lt;BR /&gt;You can't log in as these users anyway and they are critical for various system functions.  Leave then as is.&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Wed, 27 Nov 2002 12:14:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853252#M755150</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2002-11-27T12:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853253#M755151</link>
      <description>Thanks guys.</description>
      <pubDate>Wed, 27 Nov 2002 12:21:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853253#M755151</guid>
      <dc:creator>Noa Harel_2</dc:creator>
      <dc:date>2002-11-27T12:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853254#M755152</link>
      <description>As the others said, don't do it.&lt;BR /&gt;&lt;BR /&gt;On a few of those users, you can probably safely change the shells to /bin/false.  However, it won't really increase the security of the system.  The * in the password field will prevent anyone from logging in.  DO NOT set a password for these users.&lt;BR /&gt;&lt;BR /&gt;If you're interested in securing your system, try HP-UX Bastille.  The tool is supported by HP and explains the tradeoffs of implementing security features.  It's also supposed to be very educational (I hope it is for you.)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA" target="_blank"&gt;http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6849AA&lt;/A&gt;</description>
      <pubDate>Wed, 27 Nov 2002 16:47:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853254#M755152</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2002-11-27T16:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853255#M755153</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you take a look at the CIS HP-UX Level-1 Benchmark 1.03 from &lt;A href="http://www.cisecurity.org" target="_blank"&gt;http://www.cisecurity.org&lt;/A&gt; (a well accredited consortium of renown members in the security arena), you will note that there are certain system accounts which you can actually disable out of the list you provided above. According to CIS, Level-I Benchmark settings/actions are unlikely to cause an interruption of service to the operating system or the applications that run on it.&lt;BR /&gt;&lt;BR /&gt;Extracted here for your convenience:&lt;BR /&gt;=======================================&lt;BR /&gt;9 User Accounts and Environment&lt;BR /&gt;&lt;BR /&gt;9.1 Purge or lock system accounts&lt;BR /&gt;&lt;BR /&gt;Action:&lt;BR /&gt;&lt;BR /&gt;for user in uucp nuucp adm daemon bin lp nobody noaccess hpdb useradm&lt;BR /&gt;do /usr/lbin/modprpw -w "*" "$user"&lt;BR /&gt;/usr/sbin/usermod ???s /bin/false "$user"&lt;BR /&gt;done&lt;BR /&gt;&lt;BR /&gt;Discussion:&lt;BR /&gt;&lt;BR /&gt;Access to the uucp and nuucp accounts is only needed when the deprecated Unix to&lt;BR /&gt;Unix Copy (UUCP) service is in use. The other listed accounts should never require&lt;BR /&gt;direct access. The above action locks the passwords to these accounts (on systems&lt;BR /&gt;converted to Trusted Mode only) and sets the login shell to /bin/false.&lt;BR /&gt;=======================================&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Fri, 29 Nov 2002 06:11:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853255#M755153</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-11-29T06:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/passwd users</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853256#M755154</link>
      <description>There is some value in both locking the account (with "*" in the password field) and setting the shell to an invalid shell (such as /bin/false), since some applications don't need a real shell, and some applications don't authenticate via /etc/passwd.&lt;BR /&gt;&lt;BR /&gt;For example, I've seen systems with /bin/false in /etc/shells (don't ask me why), in which case disabled accounts could use ftp.  And if an attacker could drop a .rhosts file in, say, /var/adm, then they could rlogin as adm with the above /etc/passwd config.&lt;BR /&gt;&lt;BR /&gt;-Tim</description>
      <pubDate>Mon, 02 Dec 2002 14:30:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-passwd-users/m-p/2853256#M755154</guid>
      <dc:creator>Tim Maletic</dc:creator>
      <dc:date>2002-12-02T14:30:39Z</dc:date>
    </item>
  </channel>
</rss>

