<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: count root disable in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632583#M849855</link>
    <description>Jairo,&lt;BR /&gt;&lt;BR /&gt;This could have been caused by someone trying to log in as root more than the allowed number of times.  Regardless, you should be able to log in as root at the system console.  Give that a shot.  Once in, you can take a look at root's history file (.sh_history normally, but not necessarily), use the last command to see who had logged in recently, check the /var/adm/syslog/syslog.log to see who used the su command to become root.&lt;BR /&gt;&lt;BR /&gt;-Tim</description>
    <pubDate>Tue, 18 Dec 2001 17:47:25 GMT</pubDate>
    <dc:creator>Timothy Czarnik</dc:creator>
    <dc:date>2001-12-18T17:47:25Z</dc:date>
    <item>
      <title>count root disable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632581#M849853</link>
      <description>hello, my system this in way trusted and with system security policies somebody disabled account of root .&lt;BR /&gt;as I can know who was?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;$ su - root                                                                     &lt;BR /&gt;Password: &lt;BR /&gt;Account is disabled - see Account Administrator&lt;BR /&gt;su: Sorry&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Dec 2001 17:38:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632581#M849853</guid>
      <dc:creator>Jairo Campana</dc:creator>
      <dc:date>2001-12-18T17:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: count root disable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632582#M849854</link>
      <description>Once you get roots account re-enalbed you can do a:&lt;BR /&gt;&lt;BR /&gt;# lastb -R | grep root&lt;BR /&gt;&lt;BR /&gt;This will tell you what host (IP address) the login attempt to root came from.  From there you can hopefully trace that back to a workstation and figure out who it was.</description>
      <pubDate>Tue, 18 Dec 2001 17:47:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632582#M849854</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2001-12-18T17:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: count root disable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632583#M849855</link>
      <description>Jairo,&lt;BR /&gt;&lt;BR /&gt;This could have been caused by someone trying to log in as root more than the allowed number of times.  Regardless, you should be able to log in as root at the system console.  Give that a shot.  Once in, you can take a look at root's history file (.sh_history normally, but not necessarily), use the last command to see who had logged in recently, check the /var/adm/syslog/syslog.log to see who used the su command to become root.&lt;BR /&gt;&lt;BR /&gt;-Tim</description>
      <pubDate>Tue, 18 Dec 2001 17:47:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632583#M849855</guid>
      <dc:creator>Timothy Czarnik</dc:creator>
      <dc:date>2001-12-18T17:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: count root disable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632584#M849856</link>
      <description>This could be due to either telnet logins or su attempts.&lt;BR /&gt;&lt;BR /&gt;First enable root doing a modprpw -k in single user mode.&lt;BR /&gt;&lt;BR /&gt;Later do an audit&lt;BR /&gt;&lt;BR /&gt;For telnet logins &lt;BR /&gt;&lt;BR /&gt;lastb -R |grep root&lt;BR /&gt;&lt;BR /&gt;And find the third column of IP Address/Hostname&lt;BR /&gt;&lt;BR /&gt;For su attempts&lt;BR /&gt;&lt;BR /&gt;try /var/adm/sulog and look for "-" signs. You will also get it from /var/adm/syslog/syslog.log&lt;BR /&gt;&lt;BR /&gt;grep root /var/adm/syslog/syslog.log |grep su and look for - sign.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Tue, 18 Dec 2001 18:04:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632584#M849856</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-12-18T18:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: count root disable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632585#M849857</link>
      <description>to fix the problem you can run /usr/lbin/modprpw -k -l root, but follow the above suggestions to find out why the account was disabled</description>
      <pubDate>Tue, 18 Dec 2001 18:17:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632585#M849857</guid>
      <dc:creator>Jeff Machols</dc:creator>
      <dc:date>2001-12-18T18:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: count root disable</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632586#M849858</link>
      <description>Just a matter of policy but it sure simplifies these types of problems: you do have less than 3 people with the root password, right? In that case, just ask them what happened. For systems with more than 3 or 4 sysadmins, I would expect general chaos to be the result unless very strict rules are followed concerning communication.&lt;BR /&gt;&lt;BR /&gt;Another rule is: never login as root unless there is no other way to accomplish the task. If there is no choice, read the first rule again...most of the 'oops' mistakes by sysadmins are due to casual usage of the root account.&lt;BR /&gt;&lt;BR /&gt;FYI: last and lastb both have methods to filter out a user name:&lt;BR /&gt;&lt;BR /&gt;# lastb -R -20 root&lt;BR /&gt;&lt;BR /&gt;for example.</description>
      <pubDate>Tue, 18 Dec 2001 20:46:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/count-root-disable/m-p/2632586#M849858</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2001-12-18T20:46:17Z</dc:date>
    </item>
  </channel>
</rss>

