<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security question in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672753#M756663</link>
    <description>Hi Kelli,&lt;BR /&gt;&lt;BR /&gt;It depends on exactly you want to do...&lt;BR /&gt;&lt;BR /&gt;I am currently testing IDS/9000 V. 2.0 which is supplied free by HP.  This may be of some use.  It is available on the Dec 2001 Application CD-ROM.&lt;BR /&gt;&lt;BR /&gt;It is a configurable product, and will notify you of su, users creating and modifying file, etc.  It is at least worthwhile looking at.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
    <pubDate>Wed, 27 Feb 2002 20:57:06 GMT</pubDate>
    <dc:creator>Joanne Keegan</dc:creator>
    <dc:date>2002-02-27T20:57:06Z</dc:date>
    <item>
      <title>security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672740#M756650</link>
      <description>Hi,&lt;BR /&gt;Is there a good HP-UX "Snooper" program that will quietly watch (in the backround) what all users are doing? &lt;BR /&gt;Thanks,&lt;BR /&gt;Kel</description>
      <pubDate>Wed, 27 Feb 2002 17:13:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672740#M756650</guid>
      <dc:creator>Kelli Ward</dc:creator>
      <dc:date>2002-02-27T17:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672741#M756651</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt;maybe something like snort:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/snort-1.8.1/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Networking/Admin/snort-1.8.1/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;but it won't help you with NON-TCP/IP connections. And the output from snort is ugly.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 27 Feb 2002 17:35:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672741#M756651</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-02-27T17:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672742#M756652</link>
      <description>Hi Kelli:&lt;BR /&gt;&lt;BR /&gt;Depending on what you mean by "snoop", you may find DoubleVision potentially useful:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.tridia.com/index2.html" target="_blank"&gt;http://www.tridia.com/index2.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The product permits a remote system to connect to another terminal, (tty or pseudo-tty), and have full access to its screen and keyboard.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Feb 2002 17:43:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672742#M756652</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2002-02-27T17:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672743#M756653</link>
      <description>Thanks for the info.&lt;BR /&gt;Without going into detail, I'm not worried about network attacks, but rather internal "playing". Based on the way this particular setup works, users sign in generically, so seeing who by name, is not possible.&lt;BR /&gt;More info or program possibilities, if anyone, has them is appreciated. I will post points a little later.&lt;BR /&gt;Thanks,&lt;BR /&gt;Kel</description>
      <pubDate>Wed, 27 Feb 2002 17:52:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672743#M756653</guid>
      <dc:creator>Kelli Ward</dc:creator>
      <dc:date>2002-02-27T17:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672744#M756654</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt;Do you have mux strips with direct connect users or Network based users (like users using telnet, rlogin, rexec, ...)?&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 27 Feb 2002 17:56:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672744#M756654</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-02-27T17:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672745#M756655</link>
      <description>Hi Kelli&lt;BR /&gt;&lt;BR /&gt;This type of login as you have found out has security problems.&lt;BR /&gt;&lt;BR /&gt;Is it not possible to give each user their own login?&lt;BR /&gt;&lt;BR /&gt;This by using top, ps and glance lets you know who is doing what.&lt;BR /&gt;&lt;BR /&gt;The files wtmp, btmp and sulog all help to track users, but only really workable if they can be identified correctly.&lt;BR /&gt;&lt;BR /&gt;I know it can be a lot of work but one user one login.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paula&lt;BR /&gt;</description>
      <pubDate>Wed, 27 Feb 2002 18:14:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672745#M756655</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2002-02-27T18:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672746#M756656</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt;Do you want to "watch" what these generic logged in users are doing at the shell level or from within an application? How would you know which user is which, if a group of them share a user name?&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 27 Feb 2002 18:19:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672746#M756656</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-02-27T18:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672747#M756657</link>
      <description>I do know, boy do I know ;), about the security problems. Unfortunately, this particular group runs shifts and each shift has to continue the work of the previous shift on GUI based applications. If one user logs out, the next user can't continue the work, because the application doesn't transfer with their log in, hence the generic log in. If I could figure a work around for that. Everyone would have their own log in. If someone has a neat trick for this, I'm very willig to entertain the notion, but I know of none.&lt;BR /&gt;So, I'm stuck with being a big snoop! ;)&lt;BR /&gt;Thanks,&lt;BR /&gt;Kel</description>
      <pubDate>Wed, 27 Feb 2002 18:43:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672747#M756657</guid>
      <dc:creator>Kelli Ward</dc:creator>
      <dc:date>2002-02-27T18:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672748#M756658</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt; Generic IDs are a very BAD thing :(&lt;BR /&gt;&lt;BR /&gt;Is this an internally developed app?&lt;BR /&gt;&lt;BR /&gt;If so I'd lobby hard to mgmnt to rewrite it to allow separate logins.&lt;BR /&gt;Seems awfully silly that you can't logout. What happens if the users lose connectivity? Do they lose all their work? I can almost hear the tick...tick...tick.... ;~)  Fear is a great motivator for mgmnt - second only to $$$$$&lt;BR /&gt; &lt;BR /&gt;Barring that, Harry's snort recommendation is your best bet I believe. You should be able to track activity, I think, by IP. Of course you'll need to round up workstation IPs &amp;amp; know what's/who's where (at all times).&lt;BR /&gt;Unfortunately he's also right that output is very "busy". But I think it can be tailored somewhat - at a minimum by perl/grep/sed/awk, etc.. It is definitely the sniffer of choice.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 27 Feb 2002 19:04:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672748#M756658</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-02-27T19:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672749#M756659</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt;Can you keep them OUT of shells, because that's one of the biggest security violations.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 27 Feb 2002 19:05:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672749#M756659</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-02-27T19:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672750#M756660</link>
      <description>Hi,&lt;BR /&gt;Changing or rewriting the application won't happen, even if I'd like it to.&lt;BR /&gt;I can look into removing "shell" access, but these guys are a very small percentage of the hundreds of systems/processes I oversee. I do not neccessarily have an intimate understanding of everything they need to do, although auditing this is not a bad idea. If I can, I just might.&lt;BR /&gt;Thanks,&lt;BR /&gt;Kel</description>
      <pubDate>Wed, 27 Feb 2002 19:49:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672750#M756660</guid>
      <dc:creator>Kelli Ward</dc:creator>
      <dc:date>2002-02-27T19:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672751#M756661</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt; I definitely agree w/Harry &amp;amp; think he's on the right track here.&lt;BR /&gt;If they all use the same ID then set their .profile (or whatever their shell type/login method demands) to start the app &amp;amp; imediately exit upon app termination. If they can't bang out of the app then they'll never have a shell to "play" with!&lt;BR /&gt;&lt;BR /&gt;If they complain you can tell them you'll give them a unique ID to login with if they need it for other purposes &amp;amp; they'll be very easy to "track" then. You'll also get some idea of what they're "doing" when you ask them WHY they need shell access.&lt;BR /&gt;&lt;BR /&gt;Good idea Harry!.&lt;BR /&gt;&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 27 Feb 2002 20:19:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672751#M756661</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-02-27T20:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672752#M756662</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt;Of course you could give every operator their own logins and then make the "su" up to the generic account.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 27 Feb 2002 20:23:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672752#M756662</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-02-27T20:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672753#M756663</link>
      <description>Hi Kelli,&lt;BR /&gt;&lt;BR /&gt;It depends on exactly you want to do...&lt;BR /&gt;&lt;BR /&gt;I am currently testing IDS/9000 V. 2.0 which is supplied free by HP.  This may be of some use.  It is available on the Dec 2001 Application CD-ROM.&lt;BR /&gt;&lt;BR /&gt;It is a configurable product, and will notify you of su, users creating and modifying file, etc.  It is at least worthwhile looking at.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Wed, 27 Feb 2002 20:57:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672753#M756663</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2002-02-27T20:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672754#M756664</link>
      <description>JRF - Double Vision looks like a great program for so much more than just snooping. I'd really consider buying it, if I had control of the purse strings. (I'd also give 20 points if I could for suggesting it.)&lt;BR /&gt;&lt;BR /&gt;Harry - I'm not sure I underdtand your last post, could you rephrase please?&lt;BR /&gt;&lt;BR /&gt;Joanna - IDS/9000 looks like a great program. I'm looking into implementing it, but have one question. &lt;BR /&gt;&lt;BR /&gt;Does anyone know if IDS/9000 requires the system to be converted to 'Trusted'?&lt;BR /&gt;&lt;BR /&gt;Points to follow.&lt;BR /&gt;Thanks all,&lt;BR /&gt;Kel</description>
      <pubDate>Wed, 27 Feb 2002 22:24:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672754#M756664</guid>
      <dc:creator>Kelli Ward</dc:creator>
      <dc:date>2002-02-27T22:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672755#M756665</link>
      <description>Kelli,&lt;BR /&gt;&lt;BR /&gt; Harry's suggestion is kind of a follow-up to my last one.&lt;BR /&gt;&lt;BR /&gt;The users would login to their unique ID then do:&lt;BR /&gt;&lt;BR /&gt;#su - genericid&lt;BR /&gt;&lt;BR /&gt;this launches a shell using the generic ID whose .profile you would modify, as I earlier noted, to ONLY run the GUI app you mention.&lt;BR /&gt;&lt;BR /&gt;This way any commands they run would only be done with their unique ID &amp;amp; you can easily track them.&lt;BR /&gt;&lt;BR /&gt;Jeff</description>
      <pubDate>Thu, 28 Feb 2002 00:11:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672755#M756665</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-02-28T00:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672756#M756666</link>
      <description>Hi Kelly,&lt;BR /&gt;&lt;BR /&gt;To add to what Jeff and Harry had to say, Generic logins (application logins) are a bad idea as pointed out earlier by Jeff, so this is what I do in my enviroment:&lt;BR /&gt;Modify /etc/profile to not to allow direct logins using the Generic id or application logins like this (this should go on top of /etc/profile):&lt;BR /&gt;NAME=`logname`&lt;BR /&gt;if [ -z "`echo $NAME`" ];then&lt;BR /&gt;  NAME=root&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;if [ ${NAME} = genericid ] || [ ${NAME} = oracle ] || [ ${NAME} = corba ] &lt;BR /&gt;  then&lt;BR /&gt;    echo "\n\n\n"&lt;BR /&gt;    echo "\t========================================================="&lt;BR /&gt;    echo "\tApplication Logins Not Allowed. Please log in as yourself"&lt;BR /&gt;    echo "\tand then \"su - ${NAME}\". Thank You"&lt;BR /&gt;    echo "\t========================================================="&lt;BR /&gt;    echo "\n\n\n"&lt;BR /&gt;    sleep 5&lt;BR /&gt;    exit&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Add this line to the Genericid's profile so that each user who login using the Generic application id (su - genericid after they login as themselves) will spawn their own history file:&lt;BR /&gt;# Each user will have their own history file.&lt;BR /&gt;HISTFILE=${HOME}/.history.${LOGNAME}.`logname`&lt;BR /&gt;HISTSIZE=1024;export HISTSIZE&lt;BR /&gt;&lt;BR /&gt;So the history file after they login to the generic id would like :&lt;BR /&gt;-rw-------   1 siebel   siebel      5098 Feb 27 16:58 .history.genericid.sxkhan&lt;BR /&gt;&lt;BR /&gt;Hope this helps !&lt;BR /&gt;&lt;BR /&gt;-Shabu&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Feb 2002 00:56:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672756#M756666</guid>
      <dc:creator>SHABU KHAN</dc:creator>
      <dc:date>2002-02-28T00:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672757#M756667</link>
      <description>Kelli -- it sounds like you're stuck with really poor security policy due to management's decision to use an application that doesn't support collaboration. &lt;BR /&gt;&lt;BR /&gt;The suggestions about using a real user login and suing to generic account would work for the first person to start work, but the next shift would come in and since the account was never logged out, they pick up with the previous user's credentials, and at this point, real logins would be even more of a disaster than generic!&lt;BR /&gt;&lt;BR /&gt;Since you're stuck with generic accounts, they should be tightened down as far as practical, and the activity monitored/logged to afford at least SOME indication of who might be responsible. Snort, probably is you best (only?) bet. &lt;BR /&gt;&lt;BR /&gt;ya gotta love it.</description>
      <pubDate>Thu, 28 Feb 2002 02:19:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672757#M756667</guid>
      <dc:creator>Mark Fenton</dc:creator>
      <dc:date>2002-02-28T02:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: security question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672758#M756668</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can use CA Etrust (previously known as Platinum Autosecure) to restrict and audit superuser accounts (thus restricting and logging root). Requires a separate security administrator to administer the policies on superuser accounts.&lt;BR /&gt;&lt;BR /&gt;The superuser (eg. root) cannot disable it, only the security administrator can.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Thu, 28 Feb 2002 07:09:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-question/m-p/2672758#M756668</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-02-28T07:09:43Z</dc:date>
    </item>
  </channel>
</rss>

