<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: hosts.allow workaround in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558723#M759124</link>
    <description>Re. ssh vs. ipsec, I agree that ssh definitely has its place.  We use it quite extensively here.  I just wouldn't use it directly from the Internet.  SSH tunneled in IPsec is your best bet.  Yes, this is redundant encryption.  But the IPsec would likely terminate at a firewall or VPN appliance on the corporate network, so you still need something that covers from there to the end system.</description>
    <pubDate>Tue, 31 Jul 2001 12:40:32 GMT</pubDate>
    <dc:creator>Chris Calabrese</dc:creator>
    <dc:date>2001-07-31T12:40:32Z</dc:date>
    <item>
      <title>hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558717#M759118</link>
      <description>We are running ssh w/ tcp wrappers.  We have some users who want to connect from home really badly using ssh, but they are on dsl lines, and do not have a static ip or a static machine name.  Does anyone know a good/easy way to let them in when we are using hosts.allow/hosts.deny in our environment?  Thanks&lt;BR /&gt;John</description>
      <pubDate>Mon, 30 Jul 2001 14:37:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558717#M759118</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-07-30T14:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558718#M759119</link>
      <description>Usually they should be getting IP's on the same Class B or C.  If so, just add their class C(preferrably) to the hosts.allow file.  As long as you are forcing them to authenticate, then you should be okay with this.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Mon, 30 Jul 2001 15:16:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558718#M759119</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2001-07-30T15:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558719#M759120</link>
      <description>Yes, but we are hoping to not open the hosts.allow to their entire ISP.  That is where the concern lies...</description>
      <pubDate>Mon, 30 Jul 2001 16:01:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558719#M759120</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-07-30T16:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558720#M759121</link>
      <description>I definitely would not do this given the number of security issues that have popped up in SSH over the years.  But, if you are going to do this, use OpenSSH (which has a better track record than other variants) and use only the 2.0 protocol (not 1.0 or 1.5).&lt;BR /&gt;&lt;BR /&gt;A better idea is to use IPsec with strong authentication (X.509 certs with passphrases, for example).</description>
      <pubDate>Mon, 30 Jul 2001 16:19:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558720#M759121</guid>
      <dc:creator>Chris Calabrese</dc:creator>
      <dc:date>2001-07-30T16:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558721#M759122</link>
      <description>This is not our only security tool, just a small piece of it. (Partly to get rid of plaintext passwords, etc.)  We also have a heterogenious environment here, and have to use tools that can span across to AIX, Solaris, Linux.  (Unfortunately for me...)</description>
      <pubDate>Mon, 30 Jul 2001 21:43:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558721#M759122</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-07-30T21:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558722#M759123</link>
      <description>You only need to open ssh for their ISP if they truely &lt;BR /&gt;don't have effectively static addresses or names.&lt;BR /&gt;The ADSL server I work with has a static name.&lt;BR /&gt;My home network effectively has a static IP.  Doesn't&lt;BR /&gt;change unless I change my NIC.  It depends on &lt;BR /&gt;the ISPs implementation.&lt;BR /&gt;&lt;BR /&gt;Try a hosts.allow entry like &lt;BR /&gt;      ssh : 24.24. 142.222.221.&lt;BR /&gt;using the appropriate subnets.  &lt;BR /&gt;</description>
      <pubDate>Tue, 31 Jul 2001 00:27:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558722#M759123</guid>
      <dc:creator>Bill Thorsteinson</dc:creator>
      <dc:date>2001-07-31T00:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558723#M759124</link>
      <description>Re. ssh vs. ipsec, I agree that ssh definitely has its place.  We use it quite extensively here.  I just wouldn't use it directly from the Internet.  SSH tunneled in IPsec is your best bet.  Yes, this is redundant encryption.  But the IPsec would likely terminate at a firewall or VPN appliance on the corporate network, so you still need something that covers from there to the end system.</description>
      <pubDate>Tue, 31 Jul 2001 12:40:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558723#M759124</guid>
      <dc:creator>Chris Calabrese</dc:creator>
      <dc:date>2001-07-31T12:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558724#M759125</link>
      <description>Hello John,&lt;BR /&gt;&lt;BR /&gt;why don't you tell your users to make use of the tool&lt;BR /&gt;"xauth" - that is just what it is good for?&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;   Wodisch</description>
      <pubDate>Sat, 04 Aug 2001 14:02:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558724#M759125</guid>
      <dc:creator>Wodisch</dc:creator>
      <dc:date>2001-08-04T14:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558725#M759126</link>
      <description>Hi John Payne,&lt;BR /&gt;&lt;BR /&gt;This is not any answer to your qts, as you have mention that u have configured tcp wrappers on Hp-UX, can you guide me in doing so. As 'm not able to get it working. &lt;BR /&gt;&lt;BR /&gt;when i do it using : &lt;BR /&gt;make REAL_DAEMON_DIR=/bkp/tcpw hpux&lt;BR /&gt;it throws the following errors :&lt;BR /&gt;&lt;BR /&gt;(Bundled) cc: warning 480: The -O option is available only with the C/ANSI C product; ignored.&lt;BR /&gt;/usr/ccs/bin/ld: (Warning) At least one PA 2.0 object file (tcpd.o) was detected. The linked output may not run on a PA 1.x system.&lt;BR /&gt;/usr/ccs/bin/ld: Unsatisfied symbols:&lt;BR /&gt;   yp_get_default_domain (code)&lt;BR /&gt;*** Error exit code 1&lt;BR /&gt;Stop.&lt;BR /&gt;*** Error exit code 1&lt;BR /&gt;Stop.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dayanand Naik.</description>
      <pubDate>Thu, 09 Aug 2001 03:43:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558725#M759126</guid>
      <dc:creator>Dayanand Naik</dc:creator>
      <dc:date>2001-08-09T03:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558726#M759127</link>
      <description>Here is the fix:&lt;BR /&gt;&lt;BR /&gt;HP-UX: if you have trouble building TCP Wrapper, and the compilation&lt;BR /&gt;fails with: /usr/ccs/bin/ld: Unsatisfied symbols:  yp_get_default_domain&lt;BR /&gt;(code), edit the Makefile and add -DUSE_GETDOMAIN to the definition&lt;BR /&gt;of the BUGS macro.&lt;BR /&gt;&lt;BR /&gt;This is from Wietse's FAQ.  I have seen the problem and this fixes the problem and lets you compile.</description>
      <pubDate>Thu, 09 Aug 2001 14:37:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558726#M759127</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-08-09T14:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: hosts.allow workaround</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558727#M759128</link>
      <description>Wodisch, (or anyone else)&lt;BR /&gt;   Can you elaborate as to how to use xauth?  We try not to use CDE or it's buddies here as much as we can..&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;John</description>
      <pubDate>Thu, 09 Aug 2001 14:40:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hosts-allow-workaround/m-p/2558727#M759128</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-08-09T14:40:13Z</dc:date>
    </item>
  </channel>
</rss>

