- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: HP default users bin sys adm etc in /etc/pass...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-13-2007 11:57 PM
11-13-2007 11:57 PM
HP default users bin sys adm etc in /etc/passwd
Can anyone explain what each user does? or when each user is needed?
daemon:*:1:5::/:/usr/bin/false
bin:*:2:2::/usr/bin:/usr/bin/false
sys:*:3:3::/:/usr/bin/false
adm:*:4:4::/var/adm:/usr/bin/false
hpdb:*:27:1:ALLBASE:/:/sbin/sh
nobody:*:-2:-2::/:/usr/bin/false
www:*:30:1::/:
webadmin:*:40:1::/usr/obam/server/nologindir:/usr/bin/false
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-14-2007 12:25 AM
11-14-2007 12:25 AM
Re: HP default users bin sys adm etc in /etc/passwd
Check only webadmin user.
What is your OS version?
Do you have webmin installed ?
regards,
ivan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-14-2007 03:26 PM
11-14-2007 03:26 PM
Re: HP default users bin sys adm etc in /etc/passwd
I checked obam installed which related with webadmin.
OBAM B.11.00.05.3.04 Object Action Manager user interface framework for HP-UX tools
I want to know what each user does. Can anyone tell me?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-14-2007 03:44 PM
11-14-2007 03:44 PM
Re: HP default users bin sys adm etc in /etc/passwd
www and webadmin are related to httpd. The remainder are standard system accounts. Consider that you have to have OS-related software and the files must belong to somebody. While it is possible that all of these could belong to root, that would be dumb because some of these need to be setuid and setuid root programs are an inherent risk and must be coded very carefully. If someone replaced a setuid program owned by daemon with a rogue program that would not be good but it would be far less bad than if it were owned by root. These are standard accounts and with the possible exceptions of hpdb, nobody, www, and webadmin, they should be left intact.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-14-2007 06:31 PM
11-14-2007 06:31 PM
Re: HP default users bin sys adm etc in /etc/passwd
See:
http://docs.hp.com/en/B2355-90950/B2355-90950.pdf
chapter 8 page 750
root::0:3::/:/sbin/sh
daemon:*:1:5::/:/sbin/sh
bin:*:2:2::/usr/bin:/sbin/sh
sys:*:3:3::/:
adm:*:4:4::/var/adm:/sbin/sh
uucp:*:5:3::/var/spool/uucppublic:/usr/lbin/uucp/uucico
lp:*:9:7::/var/spool/lp:/sbin/sh
nuucp:*:11:11::/var/spool/uucppublic:/usr/lbin/uucp/uucico
hpdb:*:27:1:ALLBASE:/:/sbin/sh
nobody:*:-2:-2::/:
The key to the privileged status of these subsystems is their ability to
grant access to programs under their jurisdiction, without granting root
access (uid 0). Instead, the setuid bit for the executable file is set and the
effective user of the process corresponds to the owner of the executable
file. For example, the cancel command is part of the lp subsystem and
runs as effective user lp.
Once set, the security mediation of that subsystem enforces the security
of all programs encompassed by the subsystem, not the entire system.
Hence, the subsystemâ s vulnerability to a breach of security is also
limited to only that subsystem files. Breaches cannot affect the programs
under different subsystems. For example, programs under lp do not
affect those under daemon.
WK