<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic restricted telnet access in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485522#M757844</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Although I am working with Unix now for three years (which is not very much) I am coming right now to the system administration of our HP9000 which is really new to me.&lt;BR /&gt;&lt;BR /&gt;We have several applications running on our HP-UX 11.0 system which are used and accessed by several people via the LAN/WAN.&lt;BR /&gt;To have a better possibility of logging users and their activities I would like to disable the Unix user accounts where the apps are isntalled and have one account for each user who should do a "su - &lt;APPUSER&gt;" then.&lt;BR /&gt;&lt;BR /&gt;Could You please help me in setting this up as I cannot really find something about this in the documentation?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Peter&lt;/APPUSER&gt;</description>
    <pubDate>Tue, 23 Jan 2001 11:24:53 GMT</pubDate>
    <dc:creator>Carsten Drzensky</dc:creator>
    <dc:date>2001-01-23T11:24:53Z</dc:date>
    <item>
      <title>restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485522#M757844</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Although I am working with Unix now for three years (which is not very much) I am coming right now to the system administration of our HP9000 which is really new to me.&lt;BR /&gt;&lt;BR /&gt;We have several applications running on our HP-UX 11.0 system which are used and accessed by several people via the LAN/WAN.&lt;BR /&gt;To have a better possibility of logging users and their activities I would like to disable the Unix user accounts where the apps are isntalled and have one account for each user who should do a "su - &lt;APPUSER&gt;" then.&lt;BR /&gt;&lt;BR /&gt;Could You please help me in setting this up as I cannot really find something about this in the documentation?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Peter&lt;/APPUSER&gt;</description>
      <pubDate>Tue, 23 Jan 2001 11:24:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485522#M757844</guid>
      <dc:creator>Carsten Drzensky</dc:creator>
      <dc:date>2001-01-23T11:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485523#M757845</link>
      <description>Hi,&lt;BR /&gt;I suppose the easiest would be to install and use sudo: You will not have to fight with shells configs etc...&lt;BR /&gt;You will not have to give the passwd of your application UID, you could configure sudo so it su them with the command without passwd asked...&lt;BR /&gt;&lt;BR /&gt;Good luck&lt;BR /&gt;&lt;BR /&gt;Victor</description>
      <pubDate>Tue, 23 Jan 2001 11:47:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485523#M757845</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2001-01-23T11:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485524#M757846</link>
      <description>If the users have no need for a shell prompt (that is, their work is dedicated to a specific application), then change the user's shell to the application, or if the app needs a certain environment, a shell wrapper that only starts the application and exits when it is done.  Just change /etc/passwd for each user's shell.</description>
      <pubDate>Tue, 23 Jan 2001 12:22:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485524#M757846</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2001-01-23T12:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485525#M757847</link>
      <description>Thanks for the fast replies!&lt;BR /&gt;&lt;BR /&gt;The users will need Shell access so logging them directly into the application will not work on our system.&lt;BR /&gt;&lt;BR /&gt;I had a quick look at sudo and it looks really nice. What I still wonder is how I can use sudo to prevent specific users logging on via telnet. Will sudo deny the connection when configured properly? (If yes would it be possible to have an example configuration for this?)&lt;BR /&gt;&lt;BR /&gt;Peter</description>
      <pubDate>Tue, 23 Jan 2001 12:46:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485525#M757847</guid>
      <dc:creator>Carsten Drzensky</dc:creator>
      <dc:date>2001-01-23T12:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485526#M757848</link>
      <description>The idea is the user has to connect himself first since he doesnt know the passwd of the app-user, and has to use sudo...&lt;BR /&gt;&lt;BR /&gt;You can trace the sudo activity because it will be logged in /var/adm/syslog/syslog.log:&lt;BR /&gt;COMMAND=/usr/bin/su - dbatram -c save_export_dbid 2WEEKS 2001.01.12&lt;BR /&gt;Jan 12 23:38:57 caph syslog: su : + tty?? root-dbatram&lt;BR /&gt;Jan 12 23:50:01 caph sudo: opertopa : TTY=unknown ; PWD=/home/opertopa ; USER=root ;&lt;BR /&gt; COMMAND=/usr/bin/su - dbatopa -c save_config_dbid&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Good luck&lt;BR /&gt;Victor</description>
      <pubDate>Tue, 23 Jan 2001 15:12:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485526#M757848</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2001-01-23T15:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485527#M757849</link>
      <description>Hi,&lt;BR /&gt;I remembered that I used the source and compiled sudo myself in order for it to do what I wanted, I cant remember what was wrong with the one from the porting center, it was maybe timeout limit and asking passwd issue...&lt;BR /&gt;&lt;BR /&gt;Best regards&lt;BR /&gt;Victor</description>
      <pubDate>Tue, 23 Jan 2001 15:19:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485527#M757849</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2001-01-23T15:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485528#M757850</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The easiest way to prevent a direct telnet or ftp session for a specific user is by changing the password field to '*'. On a normal system this can be done in /etc/passwd, on a trusted system you can find the file in /tcb/files/auth. Setting the password field (not the password, but the field) to '*' will still allow su, rcp, rlogin, cron scripts etc.&lt;BR /&gt;&lt;BR /&gt;Good luck and regards,&lt;BR /&gt;&lt;BR /&gt;Paul te Vaanholt&lt;BR /&gt;HP Consulting</description>
      <pubDate>Wed, 24 Jan 2001 08:21:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485528#M757850</guid>
      <dc:creator>Paul te Vaanholt</dc:creator>
      <dc:date>2001-01-24T08:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485529#M757851</link>
      <description>1. you can restrict access to any inetd service (as telnetd, ftpd, etc) using /etc/hosts.allow and /etc/hosts.deny&lt;BR /&gt;&lt;BR /&gt;2. you can put all useres who can access de aplication on a group (/etc/group). Then you can check on login script ( /etc/profile )&lt;BR /&gt;&lt;BR /&gt;   [ `id | grep -c "xxx=(nnn)"` != 1 ] &amp;amp;&amp;amp; exit&lt;BR /&gt;&lt;BR /&gt;where xxx is the group ID and nnn is the group name</description>
      <pubDate>Wed, 24 Jan 2001 12:54:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485529#M757851</guid>
      <dc:creator>Luiz Fernando de Andrad</dc:creator>
      <dc:date>2001-01-24T12:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485530#M757852</link>
      <description>You can also restrict access to hosts via /var/adm/inetd.sec file.  Do a 'man inetd.sec' for more information.  Inetd.sec allows you to allow all hosts to connect, but deny certain ones, or deny all hosts but allow certain ones.</description>
      <pubDate>Wed, 24 Jan 2001 15:23:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485530#M757852</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2001-01-24T15:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485531#M757853</link>
      <description>Two parts to this answer:&lt;BR /&gt;&lt;BR /&gt;1) How do I prevent certain users from loggin ing in via telnet?&lt;BR /&gt;&lt;BR /&gt;Add a few lines in the ~/.profile script belonging to the user you want to lock out.  The following code snippet seems to work:&lt;BR /&gt;&lt;BR /&gt;if ps -f | grep -q [t]elnetd; then&lt;BR /&gt;   echo "telnet access not allowed"&lt;BR /&gt;   exit 99&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;This code immediately terminates telnet logins, but allows CDE and local logins to succeed.  &lt;BR /&gt;&lt;BR /&gt;2) How do I grant non-root users root access to execute selected commands?&lt;BR /&gt;&lt;BR /&gt;I concur with the previous postings: sudo is the tool you need.  I installed it from &lt;A href="http://hpux.cs.utah.edu/" target="_blank"&gt;http://hpux.cs.utah.edu/&lt;/A&gt; before with great success.&lt;BR /&gt;&lt;BR /&gt;Hope that helps!</description>
      <pubDate>Wed, 24 Jan 2001 16:10:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485531#M757853</guid>
      <dc:creator>Darren Miller</dc:creator>
      <dc:date>2001-01-24T16:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485532#M757854</link>
      <description>I know this is a late answer but I just came across your question.  It sounds like you want to deny direct login access to an application-id and force users to login with their real user-id and then su to to application-id.  If this is true, I've implemented it by creating a file called /etc/not_loginable.  In this file you would list each id you do not want direct login access (e.g. oracle, apdms, ...) Do NOT include root in this list.  Then add a script to /etc/profile to read this list and exit if the login matches.  Here are examples of the input file and script:&lt;BR /&gt;&lt;BR /&gt;# cat /etc/not_loginable&lt;BR /&gt;oracle&lt;BR /&gt;opc_op&lt;BR /&gt;applmgr&lt;BR /&gt;oradev&lt;BR /&gt;&lt;BR /&gt;First part of /etc/profile - add custom code right after the "trap" command:&lt;BR /&gt;&lt;BR /&gt;# @(#) $Revision: 74.2 $&lt;BR /&gt;&lt;BR /&gt;# Default (example of) system-wide profile file (/usr/bin/sh initialization).&lt;BR /&gt;# This should be kept to the bare minimum every user needs.&lt;BR /&gt;&lt;BR /&gt;# Ignore HUP, INT, QUIT now.&lt;BR /&gt;&lt;BR /&gt;        trap "" 1 2 3&lt;BR /&gt;#&lt;BR /&gt;# custom code for denying generic account login&lt;BR /&gt;if logname &amp;gt; /dev/null 2&amp;gt;&amp;amp;1&lt;BR /&gt;then&lt;BR /&gt;  LGNM=`logname`&lt;BR /&gt;  if egrep "^${LGNM}$" /etc/not_loginable &amp;gt; /dev/null 2&amp;gt;&amp;amp;1&lt;BR /&gt;  then&lt;BR /&gt;  echo "\nDirect login not allowed for $LGNM\n"&lt;BR /&gt;  echo "\nNO remote login allowed for $LGNM(`date '+%D %T'`)\n" |&lt;BR /&gt;  mailx -s "`hostname` login attempt for $LGNM" root&lt;BR /&gt;  echo "\nNO remote login allowed for $LGNM (`date '+%D %T'`)\n" |&lt;BR /&gt;  logger -p user.err -t NOT_LOGINABLE&lt;BR /&gt;  exit 1&lt;BR /&gt;  fi&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;# end custom code&lt;BR /&gt;&lt;BR /&gt;My apologies if the spacing did not come out right.  I'v added an attachment that should look cleaner. I never added an attachment. If this one doesn't work - I'll try again on the next post.&lt;BR /&gt;Hope this is what you were looking for.&lt;BR /&gt;</description>
      <pubDate>Tue, 06 Feb 2001 17:46:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485532#M757854</guid>
      <dc:creator>Peggy Fong</dc:creator>
      <dc:date>2001-02-06T17:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: restricted telnet access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485533#M757855</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Thanks to all for Your help and replies and apologies for the late points assignment.&lt;BR /&gt;&lt;BR /&gt;I ended up with the solution of editing the /etc/profile file. After adding the appropriate lines users listed in a specific file are not able to log on via telnet anymore.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Peter</description>
      <pubDate>Thu, 08 Mar 2001 09:39:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-telnet-access/m-p/2485533#M757855</guid>
      <dc:creator>Carsten Drzensky</dc:creator>
      <dc:date>2001-03-08T09:39:08Z</dc:date>
    </item>
  </channel>
</rss>

