<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: rexecd in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622107#M756003</link>
    <description>Comment out login,shell and exec from /etc/inetd.conf and restart inetd.&lt;BR /&gt;&lt;BR /&gt;If you want to restrict them for specific hosts and network, try implementing /var/adm/inetd.sec restrictions.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
    <pubDate>Thu, 29 Nov 2001 14:42:08 GMT</pubDate>
    <dc:creator>Sridhar Bhaskarla</dc:creator>
    <dc:date>2001-11-29T14:42:08Z</dc:date>
    <item>
      <title>rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622106#M756002</link>
      <description>I am using /etc/securetty to restrict root to "su" only access.  Unfortunalty this does not restrict rexec access.  At the moement I can not simply turn off rexecd, (as I have done for the other "r" services)... we have applications using rexec.&lt;BR /&gt;&lt;BR /&gt;Does anyone have a suggestion to prevent root from using rexec, but allow other users access.&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;Eric</description>
      <pubDate>Thu, 29 Nov 2001 14:22:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622106#M756002</guid>
      <dc:creator>Eric Porter</dc:creator>
      <dc:date>2001-11-29T14:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622107#M756003</link>
      <description>Comment out login,shell and exec from /etc/inetd.conf and restart inetd.&lt;BR /&gt;&lt;BR /&gt;If you want to restrict them for specific hosts and network, try implementing /var/adm/inetd.sec restrictions.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Thu, 29 Nov 2001 14:42:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622107#M756003</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-11-29T14:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622108#M756004</link>
      <description>Moderate&lt;BR /&gt;If you don't want root to run rexec, it probably means that you don't want to allow root access between the boxen.  Don't build an .rhosts equivalent for root on the other hosts-thus root can run rexec, but root won't get in.&lt;BR /&gt;&lt;BR /&gt;Moderate&lt;BR /&gt;If you're using ACLs (you can't on older JFS) You could use an ACL to take access away from root, but (I believe) root can always change the ACL back to grant access.&lt;BR /&gt;&lt;BR /&gt;Complicated&lt;BR /&gt;I suppose you could write a wrapper around rexec that checks for uid 0 and denies access for uid 0.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Nov 2001 14:42:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622108#M756004</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2001-11-29T14:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622109#M756005</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you want to allow only few then make use of /var/adm/inetd.sec file &lt;BR /&gt;&lt;BR /&gt;-USA..</description>
      <pubDate>Thu, 29 Nov 2001 14:45:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622109#M756005</guid>
      <dc:creator>Uday_S_Ankolekar</dc:creator>
      <dc:date>2001-11-29T14:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622110#M756006</link>
      <description>Ooops.. Didn't read your message properly.. Pls ignore it. I need a coffee...&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Thu, 29 Nov 2001 14:47:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622110#M756006</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-11-29T14:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622111#M756007</link>
      <description>Let me clarify my issue...&lt;BR /&gt;&lt;BR /&gt;We are trying to block "rexec" for root (only).  Rexec does not use ".rhosts", or host.equiv, it prompts for a user name and password.&lt;BR /&gt;&lt;BR /&gt;We have already blocked, the use of rlogin, and remsh.&lt;BR /&gt;&lt;BR /&gt;Using inetd.sec allows me to block by source host, but not by user.&lt;BR /&gt;&lt;BR /&gt;ideas????&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;Eric</description>
      <pubDate>Thu, 29 Nov 2001 15:05:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622111#M756007</guid>
      <dc:creator>Eric Porter</dc:creator>
      <dc:date>2001-11-29T15:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622112#M756008</link>
      <description>Hmmmm. Forgot about the password thing and .rhosts.  Sorry.&lt;BR /&gt;&lt;BR /&gt;1) use a wrapper&lt;BR /&gt;&lt;BR /&gt;2) don't give folks the passwords to the other boxes.&lt;BR /&gt;&lt;BR /&gt;In a nutshell, Unix is fairly bad about discretionary access; root ends up being omnipotent unless accomodations are made in software (we have some software that says "you can run as anyone but root).&lt;BR /&gt;&lt;BR /&gt;If you're problem is really delegation of user privs, then use sudo, scm (service control manager), or rsam (restricted sam) so you can tell a user what they can run as root (easy), as opposed to telling root what root can't run (hard, unless the software is intrumented to do so).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Nov 2001 15:17:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622112#M756008</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2001-11-29T15:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622113#M756009</link>
      <description>Eric, is it possible for you to set up a non-root user ID and provide user restrictions based on that ID? Your somewhat limitted on restricting root access... if some of your users (other admins I hope) have root access, then they can get around anything.  If they do not have the knowledge to "get around anything" then what do they need root access for? I don't mean to question your policies but I just wanted to understand more about your issue...   &lt;BR /&gt;&lt;BR /&gt;Tony</description>
      <pubDate>Thu, 29 Nov 2001 15:18:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622113#M756009</guid>
      <dc:creator>Anthony deRito</dc:creator>
      <dc:date>2001-11-29T15:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622114#M756010</link>
      <description>In following with the wrapper idea, you could download GNU's inetutils package.  Then you have the source for rexecd.c to which you could add a few lines just after the call to endpwent() :&lt;BR /&gt;&lt;BR /&gt;if (*pwd-&amp;gt;pw_uid == 0) {&lt;BR /&gt;  error("Login incorrect\n");&lt;BR /&gt;  exit(1);&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;Then compile and edit inetd.conf so that the GNU daemon is run instead of the default HPUX rexecd.  I've done similar things many times before... the only drawback is you now have a rexecd that is not supported by HP which may be a problem for you.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Steve&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Nov 2001 16:44:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622114#M756010</guid>
      <dc:creator>Steven Gillard_2</dc:creator>
      <dc:date>2001-11-29T16:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: rexecd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622115#M756011</link>
      <description>oops, get rid of that *:&lt;BR /&gt;&lt;BR /&gt;if (pwd-&amp;gt;pw_uid == 0) {&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Steve</description>
      <pubDate>Thu, 29 Nov 2001 16:53:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rexecd/m-p/2622115#M756011</guid>
      <dc:creator>Steven Gillard_2</dc:creator>
      <dc:date>2001-11-29T16:53:42Z</dc:date>
    </item>
  </channel>
</rss>

