<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: password changes in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761028#M945286</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;If you manage to get access to one server , you have access to them all via that specific id. Not that the intruder would now that the passwd's are the same. It wouldn't be hard to work out though&lt;BR /&gt;&lt;BR /&gt;I take it that you have .rhosts set up on each server as well ?&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Steve</description>
    <pubDate>Wed, 10 Jul 2002 12:47:29 GMT</pubDate>
    <dc:creator>steven Burgess_2</dc:creator>
    <dc:date>2002-07-10T12:47:29Z</dc:date>
    <item>
      <title>password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761027#M945285</link>
      <description>I wanted an easy way to change passwords across 17 different servers without setting up NIS.  I created a script that utilizes sed to change the password field in the /etc/passwd file to the same encrypted password across all servers.  What kind of security problems would this open up? It is still using the encrypted password it is just the same encrytion on each server.</description>
      <pubDate>Wed, 10 Jul 2002 12:38:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761027#M945285</guid>
      <dc:creator>Jason Berendsen</dc:creator>
      <dc:date>2002-07-10T12:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761028#M945286</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;If you manage to get access to one server , you have access to them all via that specific id. Not that the intruder would now that the passwd's are the same. It wouldn't be hard to work out though&lt;BR /&gt;&lt;BR /&gt;I take it that you have .rhosts set up on each server as well ?&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Wed, 10 Jul 2002 12:47:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761028#M945286</guid>
      <dc:creator>steven Burgess_2</dc:creator>
      <dc:date>2002-07-10T12:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761029#M945287</link>
      <description>Yes we do have an .rhosts set up. I am aware that this is a security risk.&lt;BR /&gt;&lt;BR /&gt;Jason</description>
      <pubDate>Wed, 10 Jul 2002 12:51:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761029#M945287</guid>
      <dc:creator>Jason Berendsen</dc:creator>
      <dc:date>2002-07-10T12:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761030#M945288</link>
      <description>allo,&lt;BR /&gt;&lt;BR /&gt;I'v tried it before also with sed and aslong &lt;BR /&gt;as your hosts.equiv &amp;amp; .rhosts are set up well &lt;BR /&gt;then there will be no problems. &lt;BR /&gt;Atleast not for me a couple of month ago.&lt;BR /&gt;&lt;BR /&gt;GrtZZ&lt;BR /&gt;&lt;BR /&gt;R.Mielen</description>
      <pubDate>Wed, 10 Jul 2002 12:52:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761030#M945288</guid>
      <dc:creator>R.Mielen</dc:creator>
      <dc:date>2002-07-10T12:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761031#M945289</link>
      <description>The passwd file itself is probably no less secure. In fact, it's about at the level NIS would leave it since a 'ypcat passwd' would reveal the hashed passwd's to anyone. Your real security risk is the .rhosts and hosts.equiv that allow your remsh'ed sed commands to work. Theother risk is that your script probably create a temp file before moving back to /etc/passwd. Someone might be able to write a daemon to look for the existence of that temp file and subvert it before it is moved into final position. &lt;BR /&gt;&lt;BR /&gt;You should really give NIS a try. It's very easy to set up. You can even use SAM.&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Jul 2002 12:52:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761031#M945289</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2002-07-10T12:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761032#M945290</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;To increase your security further, you should go for the NIS or convert your system to a trusted system using SAM.&lt;BR /&gt;&lt;BR /&gt;.rhosts, hosts.equiv files are security loopholes.&lt;BR /&gt;&lt;BR /&gt;Piyush&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Jul 2002 12:59:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761032#M945290</guid>
      <dc:creator>PIYUSH D. PATEL</dc:creator>
      <dc:date>2002-07-10T12:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: password changes</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761033#M945291</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Here is the doc for setting up nis&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B1031-90048/B1031-90048_top.html&amp;amp;con=/hpux/onlinedocs/B1031-90048/00/00/20-con.html&amp;amp;toc=/hpux/onlinedocs/B1031-90048/00/00/20-toc.html&amp;amp;searchterms=nis&amp;amp;queryid=20020710-084235" target="_blank"&gt;http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B1031-90048/B1031-90048_top.html&amp;amp;con=/hpux/onlinedocs/B1031-90048/00/00/20-con.html&amp;amp;toc=/hpux/onlinedocs/B1031-90048/00/00/20-toc.html&amp;amp;searchterms=nis&amp;amp;queryid=20020710-084235&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Wed, 10 Jul 2002 14:34:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-changes/m-p/2761033#M945291</guid>
      <dc:creator>steven Burgess_2</dc:creator>
      <dc:date>2002-07-10T14:34:22Z</dc:date>
    </item>
  </channel>
</rss>

