<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Password History without being a Trusted System in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813152#M84829</link>
    <description>look at :&lt;BR /&gt;man 4 security&lt;BR /&gt;&lt;BR /&gt;the thing you are looing for is :&lt;BR /&gt;PASSWORD_HISTORY_DEPTH&lt;BR /&gt;This parameter controls the password history depth. A new password is checked only against the number of most recently used passwords stored in password history for a particular user.  A user is not allowed to reuse a previously used password.&lt;BR /&gt;&lt;BR /&gt;BR,&lt;BR /&gt;Jannik</description>
    <pubDate>Wed, 25 Sep 2002 13:13:24 GMT</pubDate>
    <dc:creator>Telia BackOffice</dc:creator>
    <dc:date>2002-09-25T13:13:24Z</dc:date>
    <item>
      <title>Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813148#M84825</link>
      <description>Is there a way in HP-UX 11x to use password history so users cannot change their password to a the last 3 or 4 previous passwords?  I know this can be done if you HP is converted to trusted, but is there a way to do this without being a trusted system?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Mark</description>
      <pubDate>Wed, 25 Sep 2002 12:51:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813148#M84825</guid>
      <dc:creator>Mark VineGar</dc:creator>
      <dc:date>2002-09-25T12:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813149#M84826</link>
      <description>Hi Mark:&lt;BR /&gt;&lt;BR /&gt;Sorry, the password history feature is available only for trusted systems.  See the "security features" of the man page for 'passwd(1)'.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Wed, 25 Sep 2002 13:06:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813149#M84826</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2002-09-25T13:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813150#M84827</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt; I am not sure whether this can be done on a nontrusted system.  But, you can do password aging on a non-trusted system by inserting special characters after the passwd entry in the passwd file. This is specified in the man page of passwd. eg:The characters used to represent "digits" are . for 0, / for 1, 0&lt;BR /&gt;      through 9 for 2 through 11, A through Z for 12 through 37, and a&lt;BR /&gt;      through z for 38 through 63.&lt;BR /&gt;&lt;BR /&gt;      Password aging is put in effect for a particular user if his encrypted&lt;BR /&gt;      password in the password file is followed by a comma and a nonnull&lt;BR /&gt;      string of characters from the above alphabet.  (Such a string must be&lt;BR /&gt;      introduced in the first instance by a superuser.) This string defines&lt;BR /&gt;      the "age" needed to implement password aging.&lt;BR /&gt;&lt;BR /&gt;      The first character of the age, M, denotes the maximum number of weeks&lt;BR /&gt;      for which a password is valid.  A user who attempts to login after his&lt;BR /&gt;      password has expired is forced to supply a new one.  The next&lt;BR /&gt;      character, m, denotes the minimum period in weeks that must expire&lt;BR /&gt;      before the password can be changed.  The remaining characters define&lt;BR /&gt;      the week (counted from the beginning of 1970) when the password was&lt;BR /&gt;      last changed (a null string is equivalent to zero).  M and m have&lt;BR /&gt;      numerical values in the range 0 through 63 that correspond to the 64-&lt;BR /&gt;&lt;BR /&gt;**&lt;BR /&gt;  Also, have a look at SAM and the user section to check whether it has the options.  Normally, SAM is  a good clue  to see what options the system provides in these sort of cases.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;raj&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Sep 2002 13:09:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813150#M84827</guid>
      <dc:creator>Roger Baptiste</dc:creator>
      <dc:date>2002-09-25T13:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813151#M84828</link>
      <description>Check out "man security".&lt;BR /&gt;&lt;BR /&gt;In /etc/default/security, you can set&lt;BR /&gt;&lt;BR /&gt;PASSWORD_HISTORY_DEPTH=9&lt;BR /&gt;&lt;BR /&gt;Allowed values are 1 to 10.&lt;BR /&gt;&lt;BR /&gt;Tom</description>
      <pubDate>Wed, 25 Sep 2002 13:09:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813151#M84828</guid>
      <dc:creator>Tom Maloy</dc:creator>
      <dc:date>2002-09-25T13:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813152#M84829</link>
      <description>look at :&lt;BR /&gt;man 4 security&lt;BR /&gt;&lt;BR /&gt;the thing you are looing for is :&lt;BR /&gt;PASSWORD_HISTORY_DEPTH&lt;BR /&gt;This parameter controls the password history depth. A new password is checked only against the number of most recently used passwords stored in password history for a particular user.  A user is not allowed to reuse a previously used password.&lt;BR /&gt;&lt;BR /&gt;BR,&lt;BR /&gt;Jannik</description>
      <pubDate>Wed, 25 Sep 2002 13:13:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813152#M84829</guid>
      <dc:creator>Telia BackOffice</dc:creator>
      <dc:date>2002-09-25T13:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813153#M84830</link>
      <description>Sorry Mark,&lt;BR /&gt;&lt;BR /&gt;Although security(4) discusses this feature, it is not valid unless the system is trusted.  See passwd(1) for info.&lt;BR /&gt;&lt;BR /&gt;There's quite a few threads discussing the benefits and problems of trusted systems to help you decide whether you should change your system to trusted.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren.</description>
      <pubDate>Wed, 25 Sep 2002 13:24:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813153#M84830</guid>
      <dc:creator>Darren Prior</dc:creator>
      <dc:date>2002-09-25T13:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813154#M84831</link>
      <description>note that /eyc/security exists only in HP-UX 11i (not in 11.0) and the PASSWORD_HISTORY_DEPTH is only supported in a trusted system!&lt;BR /&gt;&lt;BR /&gt;  The password history depth configuration is on a system&lt;BR /&gt;  basis and is supported in trusted system for users in&lt;BR /&gt;  files repository only.  This feature does not support&lt;BR /&gt;  the users in NIS or NISPLUS repositories.  Once the&lt;BR /&gt;  feature is enabled, all the users on the system are&lt;BR /&gt;  subject to the same check.  If this parameter is not&lt;BR /&gt;  configured, the password history check feature is&lt;BR /&gt;  automatically disabled.  When the feature is disabled,&lt;BR /&gt;  the password history check depth is set to 1.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Sep 2002 13:27:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813154#M84831</guid>
      <dc:creator>Joaquin Gil de Vergara</dc:creator>
      <dc:date>2002-09-25T13:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813155#M84832</link>
      <description>Well the beauty of Unix is that there are many ways to skin the proverbial cat ;)&lt;BR /&gt;&lt;BR /&gt;This being said, you can be creative and try the following steps on a non-production box.&lt;BR /&gt;&lt;BR /&gt;1.  Write a script which will replace the binary program "passwd".&lt;BR /&gt;The script needs to do the following.&lt;BR /&gt;a.  set and create a file with the encrypted string for any user.&lt;BR /&gt;b.  adjust this file size to trim the top line from itself when the max history has been reached.&lt;BR /&gt;c.  call the real passwd file that would be replaced with something like passwd.bin&lt;BR /&gt;d.  before closing log the new encrypted string from /etc/passwd to the history file.&lt;BR /&gt;2.  rename the real passwd binary to whatever you will call in your script.&lt;BR /&gt;3.  rename your script as passwd, and set exact permissions and owner ship to it as the real passwd file.&lt;BR /&gt;&lt;BR /&gt;PROBLEMS:  Of course there are lots of them that could occur, but there is a way to see if a program is called interactively or not.  perhaps build in a safety and fall through the script if it is not an interactive call.&lt;BR /&gt;Obviously this will not work with yppasswd, or any other program of that type.&lt;BR /&gt;&lt;BR /&gt;Dont know if it would work as I never tried, however I have replace many other binaries on systems with my own scripts for many different reasons.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Wed, 25 Sep 2002 14:37:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813155#M84832</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2002-09-25T14:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813156#M84833</link>
      <description>Forgot to add an important item to "d" in the script functionality list.&lt;BR /&gt;d.  should not only add the string to passwd, but first check to see if it already exists.  If it exists then warn the user, and loop back to your passwd again.  Once the user enters a password that does not generate the same salted string fall through that loop.&lt;BR /&gt;&lt;BR /&gt;Shannon</description>
      <pubDate>Wed, 25 Sep 2002 14:38:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813156#M84833</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2002-09-25T14:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813157#M84834</link>
      <description>Shannon,&lt;BR /&gt;&lt;BR /&gt;Great cat skinning ;-) , but I believe that a plaintext password could encrypt to different encrypted strings due to the salt.  This might make it tricky to compare the encrypted strings.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren.</description>
      <pubDate>Wed, 25 Sep 2002 14:41:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813157#M84834</guid>
      <dc:creator>Darren Prior</dc:creator>
      <dc:date>2002-09-25T14:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813158#M84835</link>
      <description>Thanks everyone for all the input.  It appears that the answer is NO unless we convert to Trusted or write script as Shannon suggest.&lt;BR /&gt;&lt;BR /&gt;Mark</description>
      <pubDate>Wed, 25 Sep 2002 15:28:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813158#M84835</guid>
      <dc:creator>Mark VineGar</dc:creator>
      <dc:date>2002-09-25T15:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813159#M84836</link>
      <description>Yeah, for the bit more complex then use perl as you can work with the unslated plain text password and let perl crypt it for you!&lt;BR /&gt;&lt;BR /&gt;Use an unsalted crypt to store the passwords and make the comparison that way!&lt;BR /&gt;&lt;BR /&gt;To the experienced programmer I dont think this would be too much work.  Im not fluent in perl past simple web forms and tidy scripts so cant offer any pointers for a script like this in perl.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Shannon</description>
      <pubDate>Wed, 25 Sep 2002 16:19:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813159#M84836</guid>
      <dc:creator>Shannon Petry</dc:creator>
      <dc:date>2002-09-25T16:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813160#M84837</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I believe you will find that if the salt and the plaintext password are always the same, the encrypted password will always be the same as well.  That's my experience.  Further, it will be the same whether on HP-UX, Solaris, or AIX since it's a UNIX thing.&lt;BR /&gt;&lt;BR /&gt;Try playing around with the following (where "password" is to be crypted using "Y7" as the salt):&lt;BR /&gt;echo passwordY7 | /usr/lbin/makekey&lt;BR /&gt;&lt;BR /&gt;I think you'll always get Y7mVtdV.zWazc as the result.&lt;BR /&gt;&lt;BR /&gt;That being the case, your password history checking script would need to get the salt from each encrypted password in the history list, use each of those salts to encrypt the new password, and compare each result to those in the list.&lt;BR /&gt;&lt;BR /&gt;To truly emulate passwd you need to randomly select the salt.  man makekey for more info.&lt;BR /&gt;&lt;BR /&gt;In the end, I'd rather just convert to a trusted system than to mess around with passwd.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
      <pubDate>Wed, 25 Sep 2002 17:12:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813160#M84837</guid>
      <dc:creator>Darrell Allen</dc:creator>
      <dc:date>2002-09-25T17:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813161#M84838</link>
      <description>HI Mark&lt;BR /&gt;Converting system to trusted will be better and easy wayt to achive password history option. Is there any reason you are avoiding using trusted systems?&lt;BR /&gt;&lt;BR /&gt;You can use the "PASSWORD_HISTORY_DEPTH" parameter on 11.x systems.&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;Prashant.</description>
      <pubDate>Wed, 25 Sep 2002 17:32:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813161#M84838</guid>
      <dc:creator>Deshpande Prashant</dc:creator>
      <dc:date>2002-09-25T17:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813162#M84839</link>
      <description>Joaquin wrote:&lt;BR /&gt;  "note that /eyc/security exists only in HP-UX 11i (not in 11.0) and the PASSWORD_HISTORY_DEPTH is only supported in a trusted system!"&lt;BR /&gt;&lt;BR /&gt;Actually, the original reason for the creation of /etc/default/security was to support the addition of this history feature in 11.00.  While the original version of 11.00 did not support the history feature, patches PHCO_13808 and PHCO_13809 added support for it (and the /etc/default/security file) in 11.00.  Joaquin is correct that this feature is currently supported only on trusted system configurations of HP-UX.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Sep 2002 08:24:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813162#M84839</guid>
      <dc:creator>doug hosking</dc:creator>
      <dc:date>2002-09-26T08:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using Password History without being a Trusted System</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813163#M84840</link>
      <description>ok&lt;BR /&gt;&lt;BR /&gt;thank uoy for the correction :-)</description>
      <pubDate>Thu, 26 Sep 2002 08:55:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/using-password-history-without-being-a-trusted-system/m-p/2813163#M84840</guid>
      <dc:creator>Joaquin Gil de Vergara</dc:creator>
      <dc:date>2002-09-26T08:55:28Z</dc:date>
    </item>
  </channel>
</rss>

