<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: remsh to localhost /  security issue????? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777094#M942913</link>
    <description>Hello&lt;BR /&gt;Mr. Bill ..&lt;BR /&gt;I think I was misunderstood. &lt;BR /&gt;We have a server Athena that runs a script that collects data via remote shell from other servers. That part works fine. But he wants Athena to trust Athena .. So he can remote shell from Athena to Athena .. &lt;BR /&gt;&lt;BR /&gt;~ Richard</description>
    <pubDate>Wed, 31 Jul 2002 20:30:09 GMT</pubDate>
    <dc:creator>someone_4</dc:creator>
    <dc:date>2002-07-31T20:30:09Z</dc:date>
    <item>
      <title>remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777092#M942911</link>
      <description>Hey everyone,&lt;BR /&gt;We have a developer that has a script that he wants to run from one server to collect informaton from the other servers. To me this was an odd request. But he says that he wants the server to remsh to its self because he doesnt want to go back and rewrite the script for it to just run the commands local. Is there a security issue with this??&lt;BR /&gt;Maybe its just me but to me it just doesnt sounds right..&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;~ Richard</description>
      <pubDate>Wed, 31 Jul 2002 20:20:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777092#M942911</guid>
      <dc:creator>someone_4</dc:creator>
      <dc:date>2002-07-31T20:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777093#M942912</link>
      <description>What you describe will do nothing. remsh to yourself isn't going to collect any information, so it's pointless. In order to collect the remote information (assuming the server is in charge) will require all the other machines to allow access. There are many other techniques that are more manageable and secure--but will require new scripting.</description>
      <pubDate>Wed, 31 Jul 2002 20:27:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777093#M942912</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2002-07-31T20:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777094#M942913</link>
      <description>Hello&lt;BR /&gt;Mr. Bill ..&lt;BR /&gt;I think I was misunderstood. &lt;BR /&gt;We have a server Athena that runs a script that collects data via remote shell from other servers. That part works fine. But he wants Athena to trust Athena .. So he can remote shell from Athena to Athena .. &lt;BR /&gt;&lt;BR /&gt;~ Richard</description>
      <pubDate>Wed, 31 Jul 2002 20:30:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777094#M942913</guid>
      <dc:creator>someone_4</dc:creator>
      <dc:date>2002-07-31T20:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777095#M942914</link>
      <description>remsh to lcoal host being done by the user is not a security issue ,so long as it is the same user.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Manoj Srivastava</description>
      <pubDate>Wed, 31 Jul 2002 20:35:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777095#M942914</guid>
      <dc:creator>MANOJ SRIVASTAVA</dc:creator>
      <dc:date>2002-07-31T20:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777096#M942915</link>
      <description>you should be more worried about remsh to REMOTE computers as a security issue.&lt;BR /&gt;especially if the user is root.&lt;BR /&gt;consider using ssh.</description>
      <pubDate>Thu, 01 Aug 2002 17:13:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777096#M942915</guid>
      <dc:creator>uri_1</dc:creator>
      <dc:date>2002-08-01T17:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777097#M942916</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;You're going to have to set up /etc/hosts.equiv or .rhosts if you haven't already.  You should be restrictive in the way you do this - trust expicit hosts/users so you minimize security risks.  Once that's done, it shouldn't be a problem.&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Thu, 01 Aug 2002 17:19:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777097#M942916</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2002-08-01T17:19:40Z</dc:date>
    </item>
    <item>
      <title>Re: remsh to localhost /  security issue?????</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777098#M942917</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;Think VERY carefully before opening any remsh or r?? ports on any machines. Do you trust all the users on this machine? If this machine is publically accessible you could be leaving yourself open to several subtle attacks. E.g. If this user (with remsh) has lax permissions in their home directory, a clever hacker can add files such as a false ".profile", that can be used to open up other attack routes. Also if the remsh user's password is easily guessed or he/she can be shoulder surfed, another internal user can also craft attacks.&lt;BR /&gt;&lt;BR /&gt;The best way to run remote commands is to install OpenSSH, create a common user (not root) on all machines, assign it a key pair and use ssh to execute commands (without requiring a password). If a remote command needs priveliged access create a captive SSH user or a setuid script on the remote system. This is much more difficult to attack as all transmissions are encryped.&lt;BR /&gt;Remember r?? commands rely on the IP address to verify the caller, and that is the easiest thing in the world to fake.</description>
      <pubDate>Fri, 02 Aug 2002 06:40:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/remsh-to-localhost-security-issue/m-p/2777098#M942917</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2002-08-02T06:40:17Z</dc:date>
    </item>
  </channel>
</rss>

