<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secure password verification script in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586045#M759367</link>
    <description>Hi,&lt;BR /&gt;I have a bit of a tricky problem. Our application support people have lots of scripts where they have hardcoded the application username and password. This creates a problem of me as sys admin, when I want to change this password.&lt;BR /&gt;I am looking for a way, where the script can lookup the password, so only one file would have to be changed for future password changes. This file also needs to be secure from all users.&lt;BR /&gt;I was looking at using grep, and having the file in a directory which only has execute rights. This hides the file, but once anyone knows the filename (which will have to be in the scripts) they will be able to read it.&lt;BR /&gt;I would greatly appreciate any help or suggestions on this (what about a secure database for example)&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Kevin</description>
    <pubDate>Thu, 27 Sep 2001 13:59:16 GMT</pubDate>
    <dc:creator>Kevin Moore_2</dc:creator>
    <dc:date>2001-09-27T13:59:16Z</dc:date>
    <item>
      <title>Secure password verification script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586045#M759367</link>
      <description>Hi,&lt;BR /&gt;I have a bit of a tricky problem. Our application support people have lots of scripts where they have hardcoded the application username and password. This creates a problem of me as sys admin, when I want to change this password.&lt;BR /&gt;I am looking for a way, where the script can lookup the password, so only one file would have to be changed for future password changes. This file also needs to be secure from all users.&lt;BR /&gt;I was looking at using grep, and having the file in a directory which only has execute rights. This hides the file, but once anyone knows the filename (which will have to be in the scripts) they will be able to read it.&lt;BR /&gt;I would greatly appreciate any help or suggestions on this (what about a secure database for example)&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Kevin</description>
      <pubDate>Thu, 27 Sep 2001 13:59:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586045#M759367</guid>
      <dc:creator>Kevin Moore_2</dc:creator>
      <dc:date>2001-09-27T13:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: Secure password verification script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586046#M759368</link>
      <description>Hi Kevin:&lt;BR /&gt;&lt;BR /&gt;If we place security aside for the moment, a general guideline for managing global variables is to place them in *one* file which is sourced (included) as needed.  For scripts, you do this like by specifying a "dot" a "space" and the filename, as:&lt;BR /&gt;&lt;BR /&gt;#!/usr/bin/sh&lt;BR /&gt;cd $HOME&lt;BR /&gt;. ./myfile #...source $HOME/myfile&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Thu, 27 Sep 2001 14:16:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586046#M759368</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2001-09-27T14:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: Secure password verification script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586047#M759369</link>
      <description>This all depends on what you're doing with the passwords and how they're been used.&lt;BR /&gt;&lt;BR /&gt;If you want to do password look ups, you can use:&lt;BR /&gt;   * blank textfile (but anybody who can run the script  can see this - ergo only run scripts as special users which normal users don't have the passwords for)&lt;BR /&gt;   * Database using OS authentication (bit overkill really!)&lt;BR /&gt;   * Some proprietry progrsm to keep an encrypted filebase of user/passname/machine combinations and to authenticate and decrypt on current user.&lt;BR /&gt;&lt;BR /&gt;All 3 of the above have their problems, all 3 are a pain to admin and all 3 could potentially show an account user/password to a simple 'ps' list.&lt;BR /&gt;&lt;BR /&gt;A much better solution is to analyse how you're using your passwords. In general use passwords don't *need* to be used, you can:&lt;BR /&gt;   * Passwords to databases: Use OS authentication, eg on oracle use OPS$ accounts.&lt;BR /&gt;   * Passwords for file transfer: Use scp instead of ftp - this also stops cleartext passwords flying across the networks&lt;BR /&gt;   * Spawning scripts as different users - use some creative scheduling to call the scripts from root's cron, or use a package which allows jobs tied together (eg Maestro, Control M)&lt;BR /&gt;&lt;BR /&gt;My suggestion is to get your developers to defend *every* use of a cleartext password within a shell script/config file.&lt;BR /&gt;&lt;BR /&gt;dave</description>
      <pubDate>Fri, 05 Oct 2001 14:14:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-password-verification-script/m-p/2586047#M759369</guid>
      <dc:creator>David Lodge</dc:creator>
      <dc:date>2001-10-05T14:14:23Z</dc:date>
    </item>
  </channel>
</rss>

