<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing root access from xterm in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808093#M83549</link>
    <description>Or&lt;BR /&gt;&lt;BR /&gt;echo console &amp;gt; /etc/securetty&lt;BR /&gt;&lt;BR /&gt;GL,&lt;BR /&gt;C</description>
    <pubDate>Tue, 17 Sep 2002 20:06:53 GMT</pubDate>
    <dc:creator>Craig Rants</dc:creator>
    <dc:date>2002-09-17T20:06:53Z</dc:date>
    <item>
      <title>Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808091#M83547</link>
      <description>I have been charged with securing access to my HP/UX 11.0 environment. One of the requests is to restrict root access to the su command and the console. I have used SAM to restrict tty connections, and I've reviewed the process for restricting CDE connections, but I can not figure out a way to restrict my Hummingbird users who execute xterm without using the login scripts. Has anyone else faced this problem before? &lt;BR /&gt;  tks&lt;BR /&gt;    ken</description>
      <pubDate>Tue, 17 Sep 2002 19:57:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808091#M83547</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-17T19:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808092#M83548</link>
      <description>HI&lt;BR /&gt;We block root users by checking it in .profile of root user.&lt;BR /&gt;####&lt;BR /&gt;if [ ${user} = "root" ]&lt;BR /&gt;then&lt;BR /&gt; if [ ${TTY} != "console" ]&lt;BR /&gt;   then&lt;BR /&gt;  echo "&lt;ERR&gt; : root login allowed only through console..."&lt;BR /&gt;  echo "ERR ${date} - ${TTY} ${user}-root" &amp;gt;&amp;gt; ${sulog}&lt;BR /&gt;           exit&lt;BR /&gt; fi&lt;BR /&gt;&lt;BR /&gt;##&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;Prashant.&lt;/ERR&gt;</description>
      <pubDate>Tue, 17 Sep 2002 20:02:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808092#M83548</guid>
      <dc:creator>Deshpande Prashant</dc:creator>
      <dc:date>2002-09-17T20:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808093#M83549</link>
      <description>Or&lt;BR /&gt;&lt;BR /&gt;echo console &amp;gt; /etc/securetty&lt;BR /&gt;&lt;BR /&gt;GL,&lt;BR /&gt;C</description>
      <pubDate>Tue, 17 Sep 2002 20:06:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808093#M83549</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2002-09-17T20:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808094#M83550</link>
      <description>Hi Ken,&lt;BR /&gt;&lt;BR /&gt; This is what I have on this:&lt;BR /&gt;&lt;BR /&gt;Both dtlogin and vuelogin do not refer to the /etc/securetty file &lt;BR /&gt;after checking the login information against the /etc/passwd file. &lt;BR /&gt;There are several ways to prevent this:&lt;BR /&gt;&lt;BR /&gt;1) To keep root from using the workstation graphics console or xterminal &lt;BR /&gt;when vuelogin or dtlogin are running, add the following lines to the &lt;BR /&gt;end of either /usr/vue/config/Xstartup (in HP-UX 10.X this would be &lt;BR /&gt;/etc/vue/config/Xstartup) or /etc/dt/config/Xstartup (copy over from &lt;BR /&gt;/usr/dt/config if the file does not exist in /etc/dt/config) for CDE: &lt;BR /&gt;&lt;BR /&gt;if [ $USER = root ] ; then &lt;BR /&gt;exit 1 &lt;BR /&gt;fi &lt;BR /&gt;&lt;BR /&gt;This will terminate the login process if the user is logging in as &lt;BR /&gt;root. &lt;BR /&gt;&lt;BR /&gt;or for all users : &lt;BR /&gt;&lt;BR /&gt;if [ "$USER" != "root" ]; then &lt;BR /&gt;exit 1 &lt;BR /&gt;fi &lt;BR /&gt;&lt;BR /&gt;OR follow the steps in the HP TKB Doc (KBRC00000074):&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://support1.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;admit=-682735245+1028645265478+28353475&amp;amp;docId=200000045437203" target="_blank"&gt;http://support1.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;admit=-682735245+1028645265478+28353475&amp;amp;docId=200000045437203&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 17 Sep 2002 20:13:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808094#M83550</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-09-17T20:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808095#M83551</link>
      <description>${user} is not set on my system. The only thing that I have which is close to this is $LOGNAME and it gets changed to "root" when I execute the "su -" command.</description>
      <pubDate>Tue, 17 Sep 2002 20:14:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808095#M83551</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-17T20:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808096#M83552</link>
      <description>echo console &amp;gt; /etc/securetty&lt;BR /&gt;will only disable telnet sessions. xterm sessions can still get through.</description>
      <pubDate>Tue, 17 Sep 2002 20:14:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808096#M83552</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-17T20:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808097#M83553</link>
      <description>&amp;gt; echo $USER&lt;BR /&gt;sh: USER: Parameter not set.&lt;BR /&gt;&lt;BR /&gt;$USER is not being set in my environment.</description>
      <pubDate>Tue, 17 Sep 2002 20:17:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808097#M83553</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-17T20:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808098#M83554</link>
      <description>$TERM does get set, so I know if someone is connecting from the console, however, I want to allow su to be executed from an xterm session and the profile to be executed.&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Sep 2002 20:22:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808098#M83554</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-17T20:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808099#M83555</link>
      <description>try echo $LOGNAME&lt;BR /&gt;&lt;BR /&gt;Ted</description>
      <pubDate>Tue, 17 Sep 2002 20:23:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808099#M83555</guid>
      <dc:creator>Ted Ellis_2</dc:creator>
      <dc:date>2002-09-17T20:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808100#M83556</link>
      <description>$LOGNAME gets changed to "root" when you "su -".</description>
      <pubDate>Tue, 17 Sep 2002 20:27:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808100#M83556</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-17T20:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808101#M83557</link>
      <description>Hi (again) Ken,&lt;BR /&gt;&lt;BR /&gt; Yes, just change $USER to $LOGNAME &amp;amp; you should be good to go.&lt;BR /&gt;&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 17 Sep 2002 20:27:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808101#M83557</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-09-17T20:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808102#M83558</link>
      <description>Not sure what you mean by "$LOGNAME gets changed to root when you su."&lt;BR /&gt;&lt;BR /&gt;I thought your question was how to prevent direct CDE or X logins by root.&lt;BR /&gt;&lt;BR /&gt;If you want to restrict su to root - then don't give anyone the root PW......&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 17 Sep 2002 20:31:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808102#M83558</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-09-17T20:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808103#M83559</link>
      <description>can you actually login right now with Hummingbird straight to a root session?  I can't.. maybe my syntax is outta whack, but I also notice a file on my servers called 8000.migration that is under /etc/dt/config/Xsessions.d and appears to prevent direct root logins via a root user... do you have that file?  And can you access xterm with root user (no su)?</description>
      <pubDate>Tue, 17 Sep 2002 20:34:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808103#M83559</guid>
      <dc:creator>Ted Ellis_2</dc:creator>
      <dc:date>2002-09-17T20:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808104#M83560</link>
      <description>Ted and Jeff&lt;BR /&gt;Here is the Command that I use in Xstart to connect to the server.&lt;BR /&gt;&lt;BR /&gt;/usr/bin/X11/xterm -d @D -fn heb8x13 -geometry 100x50-1+1 -fg black -bg lightgray -ls -sb -sl 1000 -title "SERVER NAME"&lt;BR /&gt;&lt;BR /&gt;notice the -ls this tells xterm to execute the "login script" if I leave this option off, or by default, the .profile will not be executed at all and I gain full root access.&lt;BR /&gt;&lt;BR /&gt;Jeff,&lt;BR /&gt;On the su issue. The problem was that I did not know weather I could identify where the user is connecting. I can do this with the $TERM and check for the unique term type of my CONSOLE display. So I believe that I can modify .profile to restrict access to the system, but it's really a mute point if the any user has access to the system via xterm. Let me explain further. We have more than one administrator, and I want to force them to connect via the console if connecting as root directly. I guess that it's just not supported. I will probably just setup some type of logging flag in the .profile that will write each root access su or not and it's source Display and terminal type, but of course that can be bypassed by xterm without the -ls.</description>
      <pubDate>Wed, 18 Sep 2002 11:30:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808104#M83560</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-18T11:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808105#M83561</link>
      <description>HI&lt;BR /&gt;In my script above, I used&lt;BR /&gt;user=`logname`&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;Prashant.</description>
      <pubDate>Wed, 18 Sep 2002 15:17:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808105#M83561</guid>
      <dc:creator>Deshpande Prashant</dc:creator>
      <dc:date>2002-09-18T15:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808106#M83562</link>
      <description>Deshpande Prashant &lt;BR /&gt;Cool, I needed that command, but it still does not solve the problem of the default operation of xterm being to NOT execute the .profile. Now, xterm is called using rexec, is there something I can do with rexec to make sure it does not allow root access? One thought that I did have was replacing xterm itself with a script that would call a renamed and protected version of the binary, but that seems some how risky to me. :)&lt;BR /&gt;tks,&lt;BR /&gt;  ken</description>
      <pubDate>Wed, 18 Sep 2002 16:32:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808106#M83562</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-18T16:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808107#M83563</link>
      <description>Hi Ken,&lt;BR /&gt;&lt;BR /&gt;if you use X-Windows, then your system is NOT secure at all!&lt;BR /&gt;Maybe you can tunnel X-Widnows through OpenSSH (works with Reflection/X, should work with Exceed, too).&lt;BR /&gt;"xterm" itself is a security-risk, as it can be remote-controlled and be spied-out! USe "hpterm" or "dtterm" at least, these cannot be remote-controlled that easily...&lt;BR /&gt;If you use "ssh" then you can configure that to NOT let "root" log in through it!&lt;BR /&gt;&lt;BR /&gt;You will have to stop "XDMCP" access, too...&lt;BR /&gt;&lt;BR /&gt;And I do recommend installing "IPFilter/9000" and block everything you do not need/want on that system (BOTH directions, in and out).&lt;BR /&gt;&lt;BR /&gt;Just my $0.02,&lt;BR /&gt;Wodisch</description>
      <pubDate>Wed, 18 Sep 2002 17:21:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808107#M83563</guid>
      <dc:creator>Wodisch</dc:creator>
      <dc:date>2002-09-18T17:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Securing root access from xterm</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808108#M83564</link>
      <description>Wodisch &lt;BR /&gt;That is the 2 cents that I'm looking for, I suspected as much, xterm itself is a security risk and should not be used, you went beyond that and gave me alternatives. Thanks for you help, I'm still very new at this stuff. &lt;BR /&gt;&lt;BR /&gt;:)&lt;BR /&gt;  ken.</description>
      <pubDate>Wed, 18 Sep 2002 17:24:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-root-access-from-xterm/m-p/2808108#M83564</guid>
      <dc:creator>ken_5</dc:creator>
      <dc:date>2002-09-18T17:24:48Z</dc:date>
    </item>
  </channel>
</rss>

