<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unnecessary preinstalled users in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233915#M10935</link>
    <description>If they have /sbin/nologin (or /bin/false) shell you shouldnt worry about them, they will not be exploited. If they have other programs as shell just keep these programs up to date.  &lt;BR /&gt;&lt;BR /&gt;I agreee with you tough that it should be better documented since this is very distribution specific.</description>
    <pubDate>Tue, 30 Mar 2004 16:10:06 GMT</pubDate>
    <dc:creator>Olivier Drouin</dc:creator>
    <dc:date>2004-03-30T16:10:06Z</dc:date>
    <item>
      <title>Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233910#M10930</link>
      <description>Red Hat (and Fedora) Linux distributions ship with  quite a few preinstalled users (bin, mail, ftp, nobody, etc.)  I know what purpose quite a few of these serve, but I don't have a clue about some of the others.  Does anyone know if there is a list anywhere that describes each of these users and the consequences of removing them?  For obvious security reasons, I'd like to get rid of the unnecessary users.&lt;BR /&gt;&lt;BR /&gt;Bruce</description>
      <pubDate>Tue, 30 Mar 2004 10:45:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233910#M10930</guid>
      <dc:creator>Bruce Copeland</dc:creator>
      <dc:date>2004-03-30T10:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233911#M10931</link>
      <description>Why don't you just check that those account have /nologin as login shell ?&lt;BR /&gt;&lt;BR /&gt;Therefore, you would not take any risk that a software will need this account and you would save he time needed to check and "clean" those accounts&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Mar 2004 10:52:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233911#M10931</guid>
      <dc:creator>Nicolas Dumeige</dc:creator>
      <dc:date>2004-03-30T10:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233912#M10932</link>
      <description>Most of them already have /sbin/nologin a their login, but some of them like sync and halt are installed with /sbin/"username". I guess my question is 'Why do some of these come preinstalled with an actual login?'&lt;BR /&gt;&lt;BR /&gt;Bruce</description>
      <pubDate>Tue, 30 Mar 2004 13:19:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233912#M10932</guid>
      <dc:creator>Bruce Copeland</dc:creator>
      <dc:date>2004-03-30T13:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233913#M10933</link>
      <description>Most of the users are there for very good reasons. The user needs to be there to own binaries, run a daemon and such.&lt;BR /&gt;&lt;BR /&gt;I've found that on these users I can set a password on them without effecting the underlying application.&lt;BR /&gt;&lt;BR /&gt;It is possible for these users to be exploited. Thats why I generally build my systems off line, then take note of what those users are. &lt;BR /&gt;&lt;BR /&gt;I would not delete many of these users as functionality will be effected.&lt;BR /&gt;&lt;BR /&gt;Its better to have the user than not. Lets say i have a user called named. He runs the DNS/BIND daemon. It takes some configuration to make that happen, but if someone exploits DNS/BIND under this scenario they get named priviledges, not root priveledges.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 30 Mar 2004 13:46:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233913#M10933</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-03-30T13:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233914#M10934</link>
      <description>Thanks SEP.  &lt;BR /&gt;&lt;BR /&gt;I knew that many of these users were associated with daemons and that removing them might break something.  I'll see if I can (one at a time) add passwords to some of them.  That's easy to do on individual Linux boxes.  The server is more problematic, since it rarely gets completely rebooted, and I think a reboot is probably what it takes to fully test a change in user status.  &lt;BR /&gt;&lt;BR /&gt;I'm still a little surprised there isn't more organized documentation on these various preinstalled users.  Seems like a security hole since most individual Linux users and a fair number of administrators won't have the know-how or patience to investigate this issue.&lt;BR /&gt;&lt;BR /&gt;Bruce</description>
      <pubDate>Tue, 30 Mar 2004 15:52:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233914#M10934</guid>
      <dc:creator>Bruce Copeland</dc:creator>
      <dc:date>2004-03-30T15:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233915#M10935</link>
      <description>If they have /sbin/nologin (or /bin/false) shell you shouldnt worry about them, they will not be exploited. If they have other programs as shell just keep these programs up to date.  &lt;BR /&gt;&lt;BR /&gt;I agreee with you tough that it should be better documented since this is very distribution specific.</description>
      <pubDate>Tue, 30 Mar 2004 16:10:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233915#M10935</guid>
      <dc:creator>Olivier Drouin</dc:creator>
      <dc:date>2004-03-30T16:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233916#M10936</link>
      <description>By default, these users will have a /etc/shadow password entry of '!!'.  Simply put, someone can try hack that account (using password/dictionary attacks) and never break it.&lt;BR /&gt;&lt;BR /&gt;'!!' is shadow for "Never will a password match this!".  There is no possible string that will encrypt to match it.&lt;BR /&gt;&lt;BR /&gt;Apart from the fact that they have '/sbin/nologin' as their shell, someone would have had to already hacked into the system in order to utilize these accounts.&lt;BR /&gt;&lt;BR /&gt;Putting a password on these accounts actually reduces their protection.</description>
      <pubDate>Tue, 30 Mar 2004 18:59:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233916#M10936</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2004-03-30T18:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233917#M10937</link>
      <description>Thanks Stuart.  That clears things up AND saves me some work.&lt;BR /&gt;&lt;BR /&gt;Bruce</description>
      <pubDate>Tue, 30 Mar 2004 23:51:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233917#M10937</guid>
      <dc:creator>Bruce Copeland</dc:creator>
      <dc:date>2004-03-30T23:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233918#M10938</link>
      <description>What Stuart points out was new to me. My advice was based on Linux 7.3 experience, where i had a few default users hacked.&lt;BR /&gt;&lt;BR /&gt;Point totals do not tell the whole Story. Stuart is the most knowledgeable person I've run into in this forum.&lt;BR /&gt;&lt;BR /&gt;If Stuart ever disagrees with me, go with him first.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 31 Mar 2004 01:17:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233918#M10938</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-03-31T01:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unnecessary preinstalled users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233919#M10939</link>
      <description>On workstations, I have always deleted some of the default users, such as news/ftp/gopher and similar. These are users used by some specific servers and whenever I knew those servers will never run on a particular machine, I deleted that specific user(s). Never had problems because those users dissapeared during the last 4 years. A hint in choosing the unnecessary users: their home directory, as specified by /etc/passwd, does not actually exist. It is created and populated with files only when the server software is installed.&lt;BR /&gt;&lt;BR /&gt;As a sidenote, I am still curious what is the "operator" user meant for. I've seen several machines hacked, where "operator" was used as a backdoor for root. OTOH, never seen any software making use of this specific user.</description>
      <pubDate>Wed, 31 Mar 2004 03:39:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unnecessary-preinstalled-users/m-p/3233919#M10939</guid>
      <dc:creator>Manuel Wolfshant</dc:creator>
      <dc:date>2004-03-31T03:39:09Z</dc:date>
    </item>
  </channel>
</rss>

