<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795020#M80736</link>
    <description>I would agree with Harry. But to answer your question:&lt;BR /&gt;If you convert the system to trusted, then you can change the boot_authentication to ask for a password even in single user mode.</description>
    <pubDate>Tue, 27 Aug 2002 14:15:27 GMT</pubDate>
    <dc:creator>Sajid_1</dc:creator>
    <dc:date>2002-08-27T14:15:27Z</dc:date>
    <item>
      <title>security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795017#M80733</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;I would like to protect system using password when the machine is booting.&lt;BR /&gt;&lt;BR /&gt;Example: -&lt;BR /&gt;&lt;BR /&gt;You can protect a SUN unix machine during boot prompt level.  Also you can protect a PC during intial boot it self.&lt;BR /&gt;Similarly i want to protect HP-Server's too.&lt;BR /&gt;&lt;BR /&gt;I reason behind is a person who have access to the the machine and able to boot the machine in single user mode, he can knock of root password and do what ever he/she wants.  To avoid this situation, is there any way to over come this problem.</description>
      <pubDate>Tue, 27 Aug 2002 14:03:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795017#M80733</guid>
      <dc:creator>P.V.Ramesh</dc:creator>
      <dc:date>2002-08-27T14:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795018#M80734</link>
      <description>&lt;BR /&gt;If you can't PHYSICALLY secure your computer, then your computer is NOT SECURE!&lt;BR /&gt;&lt;BR /&gt;What would prevent the person from removing the root disk drive and put it into another server, then mount that volume, modify the password file, then put the drive back into said server?? Thus bypassing your root password???&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;PHYSICAL security is MORE important than PASSWORD security!!!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 27 Aug 2002 14:06:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795018#M80734</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-08-27T14:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795019#M80735</link>
      <description>Well Harry, the thing is with Sun Servers/Workstations the password is in the boot PROM, not on a disk.  Lots of PC's have this too.&lt;BR /&gt;&lt;BR /&gt;There is no way to secure a HP UNIX system in the same fashion, so you must physically secure the system.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Tue, 27 Aug 2002 14:14:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795019#M80735</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2002-08-27T14:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795020#M80736</link>
      <description>I would agree with Harry. But to answer your question:&lt;BR /&gt;If you convert the system to trusted, then you can change the boot_authentication to ask for a password even in single user mode.</description>
      <pubDate>Tue, 27 Aug 2002 14:15:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795020#M80736</guid>
      <dc:creator>Sajid_1</dc:creator>
      <dc:date>2002-08-27T14:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795021#M80737</link>
      <description>This was a good discussion about the same issue:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/0,,0x6c118f960573d611abdb0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/0,,0x6c118f960573d611abdb0090277a778c,00.html&lt;/A&gt;</description>
      <pubDate>Tue, 27 Aug 2002 14:16:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795021#M80737</guid>
      <dc:creator>Sajid_1</dc:creator>
      <dc:date>2002-08-27T14:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795022#M80738</link>
      <description>Hello &lt;BR /&gt;&lt;BR /&gt;Harry is of course right, but perhabs this is a first step:&lt;BR /&gt;In sam you can convert your server to a trusted system. If this happens, you can in the task&lt;BR /&gt;--&amp;gt; auditing and security&lt;BR /&gt;--&amp;gt; System Security Policies&lt;BR /&gt;--&amp;gt; General User Account Policies&lt;BR /&gt;activate the button "require Login Upon Boot to single-user state".&lt;BR /&gt;Now you have to login with a valid (super-)user and password in the single-user state, too.&lt;BR /&gt;&lt;BR /&gt;Dirk</description>
      <pubDate>Tue, 27 Aug 2002 14:17:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795022#M80738</guid>
      <dc:creator>Dirk Wiedemann</dc:creator>
      <dc:date>2002-08-27T14:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795023#M80739</link>
      <description>I have not checked that this would work under single user mode (depends if profile is run which I can't recall) at the console but I have setup the root profile to ask for a name at login. Then there is a request for a password (hidden text) and the name and the password are then checked against an encrypted password that was previously setup by that authorised user. If the name or the password are invalid an email is immediatly sent out to our Exchange server and the same is true if the the script is aborted for any reason. All of the actions for this are logged.&lt;BR /&gt;&lt;BR /&gt;The script in the profile does not restrict access for root (not a good idea) but merely adds an extra validation and alert of missue and is merely to report on attempted local violation. Of course once in as root then the logs could be changed but it would be hard to stop the email getting out to the exchange server after the event (of course if some one knew about this before hand they could remove network connections etc but this again comes down to physical security of your computer.&lt;BR /&gt;&lt;BR /&gt;Or as a second suggestion why not get a secure web console (small box from HP that lets you connect as console via a browser) and remove the physical console from the computer (lock it in a cupboard) - That way your culprit either needs to know the web console password or have access to a spare console.</description>
      <pubDate>Tue, 27 Aug 2002 15:37:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2795023#M80739</guid>
      <dc:creator>Nick Wickens</dc:creator>
      <dc:date>2002-08-27T15:37:31Z</dc:date>
    </item>
  </channel>
</rss>

