<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: shadow vs trusted in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499943#M760347</link>
    <description>trusted and C2 aren't the same thing.  Just because it's trusted, doesn't mean you mean you meet the governments C2 certification criteria.  &lt;BR /&gt;&lt;BR /&gt;In HP'ese, if you are Trusted and you employ all of the safeguards required by the government, the you're C2.  Many of the requirements have to do with auditing and the like (things you get by being trusted, but not necessarily things you have to use when you are trusted).  If your not DOD or DOE, you shouldn't have to worry about C2.&lt;BR /&gt;&lt;BR /&gt;Given that, Trusted and Shadow are fairly similar.  It's certainly possible to keep password sync'd between trusted/non-trusted system; it just might be a little harder.  Just as there are password extraction capabilities for non-trusted systems, there are similar capabilities for trusted systems:&lt;BR /&gt;see &lt;BR /&gt;man getprpwent&lt;BR /&gt;vs&lt;BR /&gt;man getpwent&lt;BR /&gt;&lt;BR /&gt;You can use these capabilites to keep things in sync.&lt;BR /&gt;&lt;BR /&gt;Usually if a vendor doesn't run on a trusted system, it's because they haven't taken the 10 minutes required to conditionally reference the trusted system library calls and link to a library :-(.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 02 Mar 2001 14:07:20 GMT</pubDate>
    <dc:creator>Christopher Caldwell</dc:creator>
    <dc:date>2001-03-02T14:07:20Z</dc:date>
    <item>
      <title>shadow vs trusted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499939#M760343</link>
      <description>hi all,&lt;BR /&gt;&lt;BR /&gt;i have a system that i have to protect the passwd file, but dont want to trust. is there a way to implement some sort of shadow passwd file on a regular unix system without having to convert to a trusted system&lt;BR /&gt;&lt;BR /&gt;thx in advance&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Mar 2001 15:55:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499939#M760343</guid>
      <dc:creator>David Bellamy</dc:creator>
      <dc:date>2001-03-01T15:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: shadow vs trusted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499940#M760344</link>
      <description>There is no shadow password file on HP-UX.  It is available on sun solaris though.  Other than converting your system to trusted, there is not a way I know of the protect the password file from prying eyes.</description>
      <pubDate>Thu, 01 Mar 2001 15:59:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499940#M760344</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2001-03-01T15:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: shadow vs trusted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499941#M760345</link>
      <description>Why not trust the system?&lt;BR /&gt;&lt;BR /&gt;Do you use NIS? (this is the only reason I can think of for avoiding a trusted system)</description>
      <pubDate>Thu, 01 Mar 2001 18:09:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499941#M760345</guid>
      <dc:creator>Duncan Edmonstone</dc:creator>
      <dc:date>2001-03-01T18:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: shadow vs trusted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499942#M760346</link>
      <description>thx for the responses,&lt;BR /&gt;the reason we didnt want to implement a trusted system had to do with passwd syncing, etc for a serviceguard environment, also its sister node in that environment runs peoplesoft, which is not C2 certified&lt;BR /&gt;</description>
      <pubDate>Thu, 01 Mar 2001 19:27:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499942#M760346</guid>
      <dc:creator>David Bellamy</dc:creator>
      <dc:date>2001-03-01T19:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: shadow vs trusted</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499943#M760347</link>
      <description>trusted and C2 aren't the same thing.  Just because it's trusted, doesn't mean you mean you meet the governments C2 certification criteria.  &lt;BR /&gt;&lt;BR /&gt;In HP'ese, if you are Trusted and you employ all of the safeguards required by the government, the you're C2.  Many of the requirements have to do with auditing and the like (things you get by being trusted, but not necessarily things you have to use when you are trusted).  If your not DOD or DOE, you shouldn't have to worry about C2.&lt;BR /&gt;&lt;BR /&gt;Given that, Trusted and Shadow are fairly similar.  It's certainly possible to keep password sync'd between trusted/non-trusted system; it just might be a little harder.  Just as there are password extraction capabilities for non-trusted systems, there are similar capabilities for trusted systems:&lt;BR /&gt;see &lt;BR /&gt;man getprpwent&lt;BR /&gt;vs&lt;BR /&gt;man getpwent&lt;BR /&gt;&lt;BR /&gt;You can use these capabilites to keep things in sync.&lt;BR /&gt;&lt;BR /&gt;Usually if a vendor doesn't run on a trusted system, it's because they haven't taken the 10 minutes required to conditionally reference the trusted system library calls and link to a library :-(.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Mar 2001 14:07:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-vs-trusted/m-p/2499943#M760347</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2001-03-02T14:07:20Z</dc:date>
    </item>
  </channel>
</rss>

