<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: rlogin in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801474#M82015</link>
    <description>On the BOB2 system, you can add the -l option to rlogind to prevent the use of .rhosts:&lt;BR /&gt;&lt;BR /&gt;In /etc/inetd.conf, change:&lt;BR /&gt;login stream tcp nowait root /usr/lbin/rlogind  rlogind&lt;BR /&gt;&lt;BR /&gt;To:&lt;BR /&gt;login stream tcp nowait root /usr/lbin/rlogind  rlogind -l&lt;BR /&gt;&lt;BR /&gt;From the rlogind man page:&lt;BR /&gt;&lt;BR /&gt;-l : This option is used to prevent any authentication based on the user's .rhosts file unless the user is logging in as super-user.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 06 Sep 2002 15:47:20 GMT</pubDate>
    <dc:creator>Tom Danzig</dc:creator>
    <dc:date>2002-09-06T15:47:20Z</dc:date>
    <item>
      <title>rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801466#M82007</link>
      <description>Here is my situation, There is a user account on several of my systems, for argument sakes we will call this user BOB. This BOB account is the admin account for the application which is also called BOB1. A certain group of users will "su" to this account to do application maintenance. We now have a new system that has an application called BOB2 (the BOB1 and BOB2 applications are from the same vendor) that requires the same BOB user account. This new system is not managed by the same group of users. The users that manage BOB1 are concerned that the users that manage BOB2 will attempt to rlogin to the BOB1 systems and gain access to data they are not supposed to have. I know we can set up the inetd.sec file on all of the BOB1 systems to not allow rlogin from the BOB2 system and I know that the .rhosts file for user BOB on the BOB1 systems can be set up to not allow the BOB2 system to login without a password. Does anyone know of a way to prevent this from happening by changing something on the BOB2 system without having to modify all of the BOB1 systems? Sorry this is so long winded but I wanted to make sure I was clear. Thanks for any help!!</description>
      <pubDate>Fri, 06 Sep 2002 15:11:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801466#M82007</guid>
      <dc:creator>Ray Brewer</dc:creator>
      <dc:date>2002-09-06T15:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801467#M82008</link>
      <description>Put an empty .rhosts file on the BOB2 system in the BOB account that is owned by root and therefore not updatteable by BOB</description>
      <pubDate>Fri, 06 Sep 2002 15:15:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801467#M82008</guid>
      <dc:creator>Charles McCary</dc:creator>
      <dc:date>2002-09-06T15:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801468#M82009</link>
      <description>Sorry, Charles, but that won't stop them from removing the .rhosts file and replacing it with one of their own design.&lt;BR /&gt;&lt;BR /&gt;:^(&lt;BR /&gt;Pete</description>
      <pubDate>Fri, 06 Sep 2002 15:19:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801468#M82009</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2002-09-06T15:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801469#M82010</link>
      <description>Pete,&lt;BR /&gt;&lt;BR /&gt;How can they remove a file to which they have no permissions?</description>
      <pubDate>Fri, 06 Sep 2002 15:20:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801469#M82010</guid>
      <dc:creator>Charles McCary</dc:creator>
      <dc:date>2002-09-06T15:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801470#M82011</link>
      <description>Thanks for the suggestion Charles but I agree they can still remove it. I could set the stickey bit on the users directory but then I would have to own that too so they could not change it. There is one other flaw to this, putting an empty .rhosts on the BOB2 system would stop the BOB1 system from being able to rlogin without a password, what I need is the opposite. I need to stop the BOB user on BOB2 from being able to rlogin to the BOB1 systems.</description>
      <pubDate>Fri, 06 Sep 2002 15:23:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801470#M82011</guid>
      <dc:creator>Ray Brewer</dc:creator>
      <dc:date>2002-09-06T15:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801471#M82012</link>
      <description>Any way you could define each group of users as two different groups. Then you can use netgroups to manage connections via rlogin.&lt;BR /&gt;&lt;BR /&gt;See "man netgroup" for info.&lt;BR /&gt;&lt;BR /&gt;-- Rod Hills</description>
      <pubDate>Fri, 06 Sep 2002 15:24:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801471#M82012</guid>
      <dc:creator>Rodney Hills</dc:creator>
      <dc:date>2002-09-06T15:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801472#M82013</link>
      <description>Hey Charles,&lt;BR /&gt;they can do that if they have write permission on the directory - but in this case that would be baad!&lt;BR /&gt;&lt;BR /&gt;Later,&lt;BR /&gt;Bill</description>
      <pubDate>Fri, 06 Sep 2002 15:25:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801472#M82013</guid>
      <dc:creator>Bill McNAMARA_1</dc:creator>
      <dc:date>2002-09-06T15:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801473#M82014</link>
      <description>For rlogin to function correctly, .rhosts files MUST be owned by the user who's home dir they are in, and must have permission of 400 or 600.&lt;BR /&gt;&lt;BR /&gt;Putting a .rhosts file on BOB2 will have no effect on doing an rlogin from BOB2 to BOB1, though.&lt;BR /&gt;&lt;BR /&gt;Something that you could possibly do though is put a wrapper around rlogin, remsh, etc on BOB2.&lt;BR /&gt;&lt;BR /&gt;You'd first rename rlogin to rloing.real.  Then do a script or C program that would do an if statement and if $1 = BOB1 (if the host they are going 2 = BOB1) then display an error message and exit.  If they are not going to BOB1, then call the real rlogin.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Sep 2002 15:28:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801473#M82014</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2002-09-06T15:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801474#M82015</link>
      <description>On the BOB2 system, you can add the -l option to rlogind to prevent the use of .rhosts:&lt;BR /&gt;&lt;BR /&gt;In /etc/inetd.conf, change:&lt;BR /&gt;login stream tcp nowait root /usr/lbin/rlogind  rlogind&lt;BR /&gt;&lt;BR /&gt;To:&lt;BR /&gt;login stream tcp nowait root /usr/lbin/rlogind  rlogind -l&lt;BR /&gt;&lt;BR /&gt;From the rlogind man page:&lt;BR /&gt;&lt;BR /&gt;-l : This option is used to prevent any authentication based on the user's .rhosts file unless the user is logging in as super-user.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Sep 2002 15:47:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801474#M82015</guid>
      <dc:creator>Tom Danzig</dc:creator>
      <dc:date>2002-09-06T15:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801475#M82016</link>
      <description>Sorry.  BOB2 should be BOB1 in the above&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Sep 2002 15:48:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801475#M82016</guid>
      <dc:creator>Tom Danzig</dc:creator>
      <dc:date>2002-09-06T15:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801476#M82017</link>
      <description>Just a way to fix the .rhost delete stuffs, as I do this on my secure FTP servers.&lt;BR /&gt;Assume BOB1's home dir is /home/bob&lt;BR /&gt;chown root /home/bob&lt;BR /&gt;touch /home/bob/.rhosts&lt;BR /&gt;chmod 400 /home/bob/.rhosts&lt;BR /&gt;&lt;BR /&gt;Now noone but root can delete the .rhosts file, or edit it.  I repeat this process for .forward also.&lt;BR /&gt;Now, make bob directories in his home that he can work in.&lt;BR /&gt;I.E.&lt;BR /&gt;mkdir /home/bob/scripts&lt;BR /&gt;mkdir /home/bob/work&lt;BR /&gt;chown bob /home/bob/*&lt;BR /&gt;&lt;BR /&gt;works like a champ, but may not fix this situation.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Fri, 06 Sep 2002 16:13:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rlogin/m-p/2801476#M82017</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2002-09-06T16:13:13Z</dc:date>
    </item>
  </channel>
</rss>

