<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871449#M98519</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;1) On non-trusted system is hard task to do, pls try downloading &lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/crack-5.0/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/crack-5.0/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;2) If you keep your /var/adm/wtmp with info you can use "last" command to check the last successfully login by user. So, you need make a cron script that read /etc/passwd and verify for each user the unloged time, for this try with this "last" command implementation:&lt;BR /&gt;last &lt;USER&gt;|tail -3|head -1&lt;BR /&gt;the following output will be generated:&lt;BR /&gt;&lt;USER&gt;  pts/tkc Mon Aug 26 09:05 - 13:41(2+04:35)&lt;BR /&gt;&lt;BR /&gt;If you select "Month" and "Day" fields the time calculation will be possible.&lt;BR /&gt;&lt;BR /&gt;To disable acounts try changing current valid Shell definition by "/usr/bin/false". This file must be with 555 permission. If not exist just create it with the "exit" content.&lt;BR /&gt;Pls **be careful** with the /etc/passwd file treatment. To remove accounts, I recomend you a similar procedure to calculate the last login date, but try to act through an email that report you these users ant then you will take a decision about.&lt;BR /&gt;&lt;BR /&gt;Rgds.&lt;/USER&gt;&lt;/USER&gt;</description>
    <pubDate>Mon, 30 Dec 2002 10:09:00 GMT</pubDate>
    <dc:creator>Jose Mosquera</dc:creator>
    <dc:date>2002-12-30T10:09:00Z</dc:date>
    <item>
      <title>security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871445#M98515</link>
      <description>I have some question here:&lt;BR /&gt;&lt;BR /&gt;If i don't want convert to trusted system,&lt;BR /&gt;&lt;BR /&gt;1) How can i perform password cracking (to test password strength)on the fly when user change their password?&lt;BR /&gt;&lt;BR /&gt;2) How to seach for a userid is not use for 3 month to disable and 6 month to delete the account.</description>
      <pubDate>Mon, 30 Dec 2002 07:37:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871445#M98515</guid>
      <dc:creator>Jason Tan</dc:creator>
      <dc:date>2002-12-30T07:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871446#M98516</link>
      <description>&lt;BR /&gt;&lt;BR /&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1) How can i perform password cracking (to test password strength)on the fly when user change their password? &lt;BR /&gt;&lt;BR /&gt;ans. I think there are crack utilities for /etc/passwd. Search for more info.&lt;BR /&gt;&lt;BR /&gt;2) How to search for a userid is not use for 3 month to disable and 6 month to delete the account.&lt;BR /&gt;&lt;BR /&gt;ans. Use the non_active_accounts script found in the scripts thread of thid forum. Attached for fast access....&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Good luck......&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Dec 2002 08:47:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871446#M98516</guid>
      <dc:creator>Khalid A. Al-Tayaran</dc:creator>
      <dc:date>2002-12-30T08:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871447#M98517</link>
      <description>You will be a little limited if you choose using un-trusted.&lt;BR /&gt;&lt;BR /&gt;Searching for user-id's that haven't been used for X months, you'll have to write a script that scans your password file and give you a report based on your 'wtmp' file. This will involve using the 'last' command. Same goes for the the deletion.&lt;BR /&gt;&lt;BR /&gt;As far as password cracking, there are some commercial ones, but you can get 'crack' from here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/crack-5.0/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/crack-5.0/&lt;/A&gt;</description>
      <pubDate>Mon, 30 Dec 2002 08:53:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871447#M98517</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-12-30T08:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871448#M98518</link>
      <description>Hi,&lt;BR /&gt;See password cracking are programs which you one makes on continous basis, and many people write in different way. As far as its security is concerened, since the passowrds are no more encrypted in /etc/passwd file instead in /tcb/files/auth so its more harder for crackers to trace a singe file as /etc/passwd file is.&lt;BR /&gt;&lt;BR /&gt;Use /usr/lbin/getprpw &lt;LOGIN&gt; on a userid, this will give you all details and even the last successful login, which means when he last logged in. To disable after 3 months and expire the login can be done in password policy under users in sam.&lt;BR /&gt;Go to sam-&amp;gt;users-&amp;gt;options&lt;BR /&gt;&lt;BR /&gt;Rajeev&lt;/LOGIN&gt;</description>
      <pubDate>Mon, 30 Dec 2002 08:59:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871448#M98518</guid>
      <dc:creator>Rajeev  Shukla</dc:creator>
      <dc:date>2002-12-30T08:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871449#M98519</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;1) On non-trusted system is hard task to do, pls try downloading &lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/crack-5.0/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/crack-5.0/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;2) If you keep your /var/adm/wtmp with info you can use "last" command to check the last successfully login by user. So, you need make a cron script that read /etc/passwd and verify for each user the unloged time, for this try with this "last" command implementation:&lt;BR /&gt;last &lt;USER&gt;|tail -3|head -1&lt;BR /&gt;the following output will be generated:&lt;BR /&gt;&lt;USER&gt;  pts/tkc Mon Aug 26 09:05 - 13:41(2+04:35)&lt;BR /&gt;&lt;BR /&gt;If you select "Month" and "Day" fields the time calculation will be possible.&lt;BR /&gt;&lt;BR /&gt;To disable acounts try changing current valid Shell definition by "/usr/bin/false". This file must be with 555 permission. If not exist just create it with the "exit" content.&lt;BR /&gt;Pls **be careful** with the /etc/passwd file treatment. To remove accounts, I recomend you a similar procedure to calculate the last login date, but try to act through an email that report you these users ant then you will take a decision about.&lt;BR /&gt;&lt;BR /&gt;Rgds.&lt;/USER&gt;&lt;/USER&gt;</description>
      <pubDate>Mon, 30 Dec 2002 10:09:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2871449#M98519</guid>
      <dc:creator>Jose Mosquera</dc:creator>
      <dc:date>2002-12-30T10:09:00Z</dc:date>
    </item>
  </channel>
</rss>

