- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Preventing Telnet by Root but allowing only c...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 06:20 AM
09-17-2001 06:20 AM
I hope all those in NYC are OK. I'm from
NYC so I am very glad all my family and friends
are OK. Working seems to help deal with the
pain.
I have a L2000 on 11.0 and I want to not
allow ROOT to telnet in (we have a web
console for that) and only allow 3 users
to be able to telnet in.
I have SUDO installed so once these 3 users
log in, they can use SUDO and do whatever
they want.
This is for high security on our most important
box. We have a TRUSTED system and we are
not using NIS, and we don't want to use
NIS (trust me on this).
I think I need to do something to the
/etc/services and the /etc/passwd file???
Thanks for your help,
Laurie
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 06:24 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 06:30 AM
09-17-2001 06:30 AM
Re: Preventing Telnet by Root but allowing only certain logins
This link may help you.
http://forums.itrc.hp.com/cm/QuestionAnswer/1,1150,0x41b76af52b04d5118fef0090279cd0f9,00.html
GK
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 06:42 AM
09-17-2001 06:42 AM
Re: Preventing Telnet by Root but allowing only certain logins
To prevent direct root logins do this
echo "console" > /etc/securetty
chmod 400 /etc/securetty
(This would limit direct root logins to the console)
Since you said your system is TRUSTED, you cannot run NIS. NIS+ is an option but i don't know if you want the additional work.
The other option is modify your /etc/profile to allow only certain users to login.
Since you say it is an important machine, any reason why you are allowing telnetd to run rather than sshd?
-Regards
Ramesh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 06:52 AM
09-17-2001 06:52 AM
Re: Preventing Telnet by Root but allowing only certain logins
Hope this helps.
...jcd...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 07:09 AM
09-17-2001 07:09 AM
Re: Preventing Telnet by Root but allowing only certain logins
Anyone capable of sniffing the root password through a root telnet is also capable of sniffing the passwords passed to sudo and to the web console.
What's that you say, web console traffic encrypted? Yes, but by crackerjack box ring decoder variety encryption. See Bugtraq postings from last year on how trivial it is to crack (much easier than the protections NIS has through Secure RPC).
I've taken HP to task on this on several occasions, but so far they haven't done anything about it (something about using too slow a processor to do real encryption - a pretty lame argument considering that this was only a few months after the thing came out and they could have long since fixed the problem by now - especially given how much they charge for these things).
If you want your system to be reasonably secure from sniffing attacks, use newer versions of OpenSSH for network access and OpenSSH connecting to an SSH-capable terminal server for console access (several vendors, including Cisco, sell such things, though it's also easy to turn an old 486 running Linux or *BSD into one). IPsec based protections would be even better (including telnet over IPsec).
Don't use regular Telnet, HP Web Console, FTP, or even older versions of SSH.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 07:27 AM
09-17-2001 07:27 AM
Re: Preventing Telnet by Root but allowing only certain logins
Looks like putting "console" in your /etc/securetty file is your best bet. Though your users once logged in using telnet can still "su" and can gain root access.
Hope this helps.
thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 08:25 AM
09-17-2001 08:25 AM
Re: Preventing Telnet by Root but allowing only certain logins
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2001 09:13 AM
09-17-2001 09:13 AM
Re: Preventing Telnet by Root but allowing only certain logins
However, there are huge differences between encryption technologies...
IPsec is built on a very strong foundation with only the more theoretical of attacks discovered against it (and then only DoS attacks - not direct compromise - and with fixes under study).
Newer versions of SSH are built on a reasonably sound protocol foundation with some odd implementation problems found (and fixed, at least in OpenSSH) over the years.
Older versions of SSH (i.e., Protocol version 1.x) were built on a shakey foundation.
SWC is built on jello.
Telnet is built on wishful thinking.