Operating System - HP-UX
1832978 Members
2674 Online
110048 Solutions
New Discussion

Re: Remote access in a Trusted HP-UX system

 
SOLVED
Go to solution
Enrico Venturi
Super Advisor

Remote access in a Trusted HP-UX system

Hello again,
are there any restrictions on the remote access between machines in a trusted environment?
I mean: is it still possible to use the .rhosts file to "open" the machines each other?
Arethere any doc. to summarize the main "restrictions"?

thanks again
Enrico
5 REPLIES 5
Jeff Schussele
Honored Contributor
Solution

Re: Remote access in a Trusted HP-UX system

Hi Enrico,

No, there are no restrictions on remote access introduced by the conversion to Trusted. Same rules still apply.

Rgds,
Jeff
PERSEVERANCE -- Remember, whatever does not kill you only makes you stronger!
Pete Randall
Outstanding Contributor

Re: Remote access in a Trusted HP-UX system

Enrico,

The trusted environment only affects the handling of the password file. There should be no impact or "r" utilities.


Pete

Pete
Marco Santerre
Honored Contributor

Re: Remote access in a Trusted HP-UX system

No, trusted mode doesn't stop you from using r-commands. So yes you can still define a .rhosts and use it in your Trusted environment. Actually you can even come from a non-trusted mode environement as well.
Cooperation is doing with a smile what you have to do anyhow.
Steven E. Protter
Exalted Contributor

Re: Remote access in a Trusted HP-UX system

Trusted system makes the users passwords more secure by shadowing them. They are moved from /etc/passwd to the /tcb folder into multiple files.

It does not in any way effect your ability to run insecure Berkley r- protocols.

Doing so after trusted system is a contradiction, but if you want to use Ignite, for example, thats what you have to do.

SEP
Steven E Protter
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
Lee Huei
Regular Advisor

Re: Remote access in a Trusted HP-UX system

refer to the link below:
http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90742/B2355-90742_top.html&con=/hpux/onlinedocs/B2355-90742/00/00/67-con.html&toc=/hpux/onlinedocs/B2355-90742/00/00/67-toc.html&searchterms=trusted%7cremote&queryid=20031117-031115

Chapter 8: Administering a System: Managing System Security

Trusted System Security

the remote access that can still be used in trusted environment:
remshd Remote shell server daemon; see remshd(1M)
rlogind Remote login server daemon; see rlogind(1M)