<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: restricting  su in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073924#M808992</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;for non-root users this is easy : keep user2's password secret ;-)&lt;BR /&gt;&lt;BR /&gt;for root : you could test in user2's .profile on 'who am i' which still reflects the original user.&lt;BR /&gt;But 'su user2' (without the minus) will pass this again :(&lt;BR /&gt;&lt;BR /&gt;good luck,&lt;BR /&gt;Thierry.</description>
    <pubDate>Thu, 18 Sep 2003 09:06:48 GMT</pubDate>
    <dc:creator>Thierry Poels_1</dc:creator>
    <dc:date>2003-09-18T09:06:48Z</dc:date>
    <item>
      <title>restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073922#M808990</link>
      <description>Is there any way to restrict the su command .&lt;BR /&gt;&lt;BR /&gt;I want to allow &lt;BR /&gt;     su - user1&lt;BR /&gt;but &lt;BR /&gt;     su - user2 &lt;BR /&gt;should be denied.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Rainer&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Sep 2003 08:42:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073922#M808990</guid>
      <dc:creator>Rainer von Bongartz</dc:creator>
      <dc:date>2003-09-18T08:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073923#M808991</link>
      <description>You will have to replace the su binary with a script which checks for who you are trying to su to then allows or disallows it.</description>
      <pubDate>Thu, 18 Sep 2003 08:50:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073923#M808991</guid>
      <dc:creator>Stefan Farrelly</dc:creator>
      <dc:date>2003-09-18T08:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073924#M808992</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;for non-root users this is easy : keep user2's password secret ;-)&lt;BR /&gt;&lt;BR /&gt;for root : you could test in user2's .profile on 'who am i' which still reflects the original user.&lt;BR /&gt;But 'su user2' (without the minus) will pass this again :(&lt;BR /&gt;&lt;BR /&gt;good luck,&lt;BR /&gt;Thierry.</description>
      <pubDate>Thu, 18 Sep 2003 09:06:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073924#M808992</guid>
      <dc:creator>Thierry Poels_1</dc:creator>
      <dc:date>2003-09-18T09:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073925#M808993</link>
      <description>Sorry, I don't agree.&lt;BR /&gt;I think there is only one way (when not using an external produkt) to solve this. Current permissions are :&lt;BR /&gt;-r-sr-xr-x   1 root       root         24576 Aug  6  1998 /usr/bin/su&lt;BR /&gt;&lt;BR /&gt;change them to :&lt;BR /&gt;-r-sr-x---   1 root       sugroup         24576 Aug  6  1998 /usr/bin/su&lt;BR /&gt;&lt;BR /&gt;Now you create a sugroup in the /etc/group. Make the members that are allowed to examine su member of the group sugroup.&lt;BR /&gt;&lt;BR /&gt;Regs David</description>
      <pubDate>Thu, 18 Sep 2003 09:47:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073925#M808993</guid>
      <dc:creator>David_246</dc:creator>
      <dc:date>2003-09-18T09:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073926#M808994</link>
      <description>Hi guys,&lt;BR /&gt;&lt;BR /&gt;I do not want to restrict the use of su (any user is allowed to use it) but I need to restrict the target user called by su. There is a list of users which are only allowed to do a regular login, the use of su to gain this users priviliges is not allowed. (Of course this is a demand from our audit people so let's not debate about the sense of this demand)&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Rainer&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Sep 2003 10:16:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073926#M808994</guid>
      <dc:creator>Rainer von Bongartz</dc:creator>
      <dc:date>2003-09-18T10:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073927#M808995</link>
      <description>Ive not heard of auditing requiring this before. Ive heard many times of them requiring an audit trail of who uses the su command. This is easier as all you need to do is switch on accounting and select the su system call so you can log processes which use it. Then, just in case, you can backtrack and see who used su in the event of a problem.&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Sep 2003 11:09:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073927#M808995</guid>
      <dc:creator>Stefan Farrelly</dc:creator>
      <dc:date>2003-09-18T11:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073928#M808996</link>
      <description>There is a more secure way to do this than a script -- if you can install sudo.&lt;BR /&gt;&lt;BR /&gt;First, disable all access to /usr/bin/su&lt;BR /&gt;&lt;BR /&gt;# chmod go-rwx /usr/bin/su&lt;BR /&gt;&lt;BR /&gt;Then add the following to /etc/sudoers&lt;BR /&gt;&lt;BR /&gt;ALL  ALL = NOPASSWD : /usr/bin/su &lt;YOUR list="" of="" valid="" users="" here=""&gt;&lt;BR /&gt;&lt;BR /&gt;Then to su, your users run:&lt;BR /&gt;&lt;BR /&gt;sudo su &lt;NAME&gt;&lt;BR /&gt;&lt;BR /&gt;If &lt;NAME&gt; does not match the list provided in the sudoers file, then sudo will not allow su to run.&lt;BR /&gt;&lt;BR /&gt;This also has the side benifit of loggin all su activity, including unauthorized attempts.&lt;BR /&gt;&lt;BR /&gt;See the sudoers man page for the specific syntax.&lt;BR /&gt;&lt;BR /&gt;HTH.&lt;/NAME&gt;&lt;/NAME&gt;&lt;/YOUR&gt;</description>
      <pubDate>Thu, 18 Sep 2003 11:31:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073928#M808996</guid>
      <dc:creator>Brian Bergstrand</dc:creator>
      <dc:date>2003-09-18T11:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073929#M808997</link>
      <description>Instead of executing "su", use "sudo".&lt;BR /&gt;"sudo" lets you have more control over what users can do as other users.&lt;BR /&gt;Or&lt;BR /&gt;DON'T give out users passwords and change them immediately when a problem is discovered.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Sergejs</description>
      <pubDate>Thu, 18 Sep 2003 11:48:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073929#M808997</guid>
      <dc:creator>Sergejs Svitnevs</dc:creator>
      <dc:date>2003-09-18T11:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: restricting  su</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073930#M808998</link>
      <description>Hi Rainer,&lt;BR /&gt;&lt;BR /&gt;Sorry for the misunderstanding. I do this using "eTrust Access Control" from CA. It works perfect for your question.&lt;BR /&gt;Also other sudo tools work great with it. From a standard OS without extra tooling this will not be possible.&lt;BR /&gt;&lt;BR /&gt;Regs David</description>
      <pubDate>Thu, 18 Sep 2003 11:52:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-su/m-p/3073930#M808998</guid>
      <dc:creator>David_246</dc:creator>
      <dc:date>2003-09-18T11:52:29Z</dc:date>
    </item>
  </channel>
</rss>

