- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Directory encryption
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 03:11 AM
07-24-2003 03:11 AM
Directory encryption
Any help will be thankfull
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 03:24 AM
07-24-2003 03:24 AM
Re: Directory encryption
The problem you describe is easily solved by changing the permissions to 700 for the directory and make it owned by the user that has the right to look at it. All other users will see: dir_name unreadable. If you need more than one user to look at the directory, use ACL's (man acl).
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 03:33 AM
07-24-2003 03:33 AM
Re: Directory encryption
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 04:21 AM
07-24-2003 04:21 AM
Re: Directory encryption
Regards
Rainer
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 04:23 AM
07-24-2003 04:23 AM
Re: Directory encryption
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 04:29 AM
07-24-2003 04:29 AM
Re: Directory encryption
Massimo
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 04:41 AM
07-24-2003 04:41 AM
Re: Directory encryption
e.g. No one uses root
Tim
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 05:37 AM
07-24-2003 05:37 AM
Re: Directory encryption
Using open() to access the directory entry will return an error (EISDIR). If you had a way to read the directory information into memory, encrypt it, and write it back to disk, the OS would probably complain (or worse). Even if you could encrypt the directory entry AND it didn't cause problems with the OS, you are merely encrypting the directory entry itself and not the files within the directory (it may be difficult for someone to access the files in that directory, but the files would still be in plain text).
Perhaps it would be better to create a utility that encrypted every file in the directory, while leaving the directory entry itself alone. Is that the answer you were looking for or am I taking the question a bit too literally?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 10:31 AM
07-24-2003 10:31 AM
Re: Directory encryption
To add on, one pretty effective way of hiding directories from view and be only accessible with a proper login is via a chroot cage.
A chroot cage creates a virtual root where the user has access to but no other directories beyond that. One classic example is anonymous FTP. It is a chroot cage with a virtual / directory. Any anonymous user will not have access to your actual real / and beyond. Only legitimate users with proper userids and passwords can access your real / directories and subdirectories, given the right permissions of course.
Note that using rsh (restricted shell) does not prevent users from accessing the real /.
Hope this helps. Regards.
Steven Sim Kok Leong
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-24-2003 10:38 AM
07-24-2003 10:38 AM
Re: Directory encryption
You can block root access by making use of tools such as Platinum AutoSecure or equivalent tools. They allow you to limit what root can do.
Only a different security administrator that manages the AutoSecure configuration can assign privileges to root but the security administrator himself cannot create a superuser account for himself.
Here's more details on AutoSecure from a pretty old article. I last heard it has been bought over by Computer Associates but I can't remember the exact new name. I believe it is part of CA eTrust Suite.
http://www.industrywriter.com/Platinum_samples/Autosecure%20article.htm
An extract on the relevant:
Limiting the power of root ??? A well known feature of UNIX is its use of Root ??? or Superuser ??? authority to provide an administrator with access to sensitive system files and resources. Unfortunately, and all too often, users who have no business performing system administrative tasks are able to indirectly establish root authority and gain access to restricted files. AutoSecure copes with this vulnerability by totally encapsulating Root, instead of simply trying to hide it or work around it. The result is that a user or object with Root authority is required to pass the same authorization checking as a regular user and cannot gain superuser access to system resources unless AutoSecure authorizes it. And regular users cannot change their login ids in order to assume the id of someone with Root user authorization.
Hope this helps. Regards.
Steven Sim Kok Leong