1830061 Members
2576 Online
109998 Solutions
New Discussion

Manuals

 
SOLVED
Go to solution
Stephen Hughes
Occasional Contributor

Manuals

Hi

I have converted my system to a trusted system. Do you know of where I can get some reading material on features and on how to setup various things on a trusted system?

Stephen
3 REPLIES 3
federico_3
Honored Contributor
Solution

Re: Manuals

Nancy Hubert
Occasional Advisor

Re: Manuals

Hi.


For Trusted System there is also some good information on the http://docs.hp.com the following manual:
Select
-> HP-UX 10.x Operating System (on main menu)
-> System Administration (area)
-> HP-UX System Administration Tasks (HP-UX 10.x) (manual)
-> Managing System Security (entire chapter on trusted system)
Thomas Schler_1
Trusted Contributor

Re: Manuals

Recently HP sent following "Technical Tips":

Document ID: 2100067383
Date Loaded: 20001014
Title: UNIX: comparing trusted and non-trusted systems

PROBLEM


Please inform as to the differences between trusted and non-trusted UNIX
systems.



CONFIGURATION


Operating System - HPUX



RESOLUTION


The following is a list of differences between trusted and non-trusted
systems:

1) A trusted system allows system auditing to be turned on. System
auditing enables the ability to trace every system call issued by
each user on the system. Non-trusted systems run with system
auditing disabled.

2) Trusted systems have improved password management. Below is a list
of features of this password management:

a. Specification of a grace period and expiration period for
passwords.

b. The ability to specify system-wide password aging.

c. The ability to specify an absolute account life.

d. The ability to disable accounts after repeated login
failures.

e. Passwords lengths of up to forty (40) characters.

f. The ability to access a random password generator.

3) Trusted systems also have additional login restrictions, while
non-trusted systems do not. Below are the features of
trusted system login restrictions:

a. In addition to account disabling, the account may also be
locked.

b. Setting accounts to be accessed only at certain times of
the day.

c. The ability to specify account location access. In other
words, account access at specific devices, workstations, etc.

d. The ability to specify a single-user boot password.

NOTE: These login restrictions are NOT available on
NON-TRUSTED systems.

4) A trusted system has shadowed passwords, while a non-trusted system
does not. Shadowed passwords are kept in locations other than
/etc/passwd. This prevents users from viewing the /etc/passwd
file and determining which accounts do not have passwords. This
also prevents hackers from running "password cracker programs"
against passwords in the /etc/passwd file.
no users -- no problems