- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- .rhosts file permissions
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-07-2000 01:45 PM
тАО11-07-2000 01:45 PM
.rhosts file permissions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-07-2000 01:50 PM
тАО11-07-2000 01:50 PM
Re: .rhosts file permissions
For root it would be in roots 'home' directory, which is /
If you want to read more on this take a look for .rhosts info in the Installing and Administering Internet Services Manual as well as in the System Administration Tasks (these are the HP manuals)....these are just 2 places...
rcw
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-07-2000 01:52 PM
тАО11-07-2000 01:52 PM
Re: .rhosts file permissions
The .rhosts file for root will be owned by root and have 644. The .rhosts for user1 will be owned by user1 and have permissions of 644.
For the root, you may want to remove the read access for all other users. Anyone can read the file and see what the trusted systems in the network are.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-07-2000 02:48 PM
тАО11-07-2000 02:48 PM
Re: .rhosts file permissions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-07-2000 03:13 PM
тАО11-07-2000 03:13 PM
Re: .rhosts file permissions
Also, the file should exist (even if empty). This prevents someone from creating it with thier own prefered entries.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-07-2000 07:02 PM
тАО11-07-2000 07:02 PM
Re: .rhosts file permissions
In some big firms especially with the banking/finance industries, they prefer to prohibit or control remote access to their servers. By assigning your .rhosts ownership to root that I think someone from your company/organization (perhaps the security officers) is trying to control the list of external users who can remote control your account.
By controlling individual .rhosts, I guess the security weaknesses of a server will not be exposed OUTSIDE the box.
Let say if you as an user for a highly sensitive server, granted remote access ability to another user in another box which isn't secured, then your account in the sensitive server will become a security loop hole for the hackers.
Just my 2 cents.
Regards,
Philip
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-08-2000 12:03 AM
тАО11-08-2000 12:03 AM
Re: .rhosts file permissions
Here are my $0.02...
Permissions should be either 644 (owner=root)
or 600 (owner=user in user homedir, owner=root in /)
If permission is set to 600, owner=root in a home dir, the file won't be readable by anybody but root and would be useless.
As Philip said, setting the ownership to root and preventing a user to modify the .rhosts file is a way to control who may login and from which box. It's a lot more secure than allowing a user to widely open doors into a system.
Dan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-08-2000 12:08 AM
тАО11-08-2000 12:08 AM
Re: .rhosts file permissions
Just a thought
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-09-2000 07:21 AM
тАО11-09-2000 07:21 AM
Re: .rhosts file permissions
.rhosts file that is owned by root in the users directory
does NOT buy anything. Althought this prevents the
user from making modifications to the existing file, this
does NOT prevent them from deleting the .rhosts file
altogether and replacing it with their own .rhosts file.
In order to prevent this, you would have to turn on the
sticky bit on their home directory (the 't' permission).
This would prevent anyone other than the owner of the
file from deleting the file.
So you would have to set the permissions on the user's
home directory as follows:
rwxr-xr-t
and then create the .rhosts files in their home directory.
-Santosh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-09-2000 07:48 AM
тАО11-09-2000 07:48 AM
Re: .rhosts file permissions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-09-2000 09:24 AM
тАО11-09-2000 09:24 AM
Re: .rhosts file permissions
.rhosts should have 400 or 600 permissions, and be owned by the user. Some administrators change the ownership to root to prevent users from modifying their .rhosts file. This gives a false sense of security, though. Since users almost always have "w" permission on their home directory, they could simply remove the file and recreate it with whatever owner/permissions they choose, regardless of the ownership/permissions on the original file.
Here's a much better approach to preventing users from configuring .rhosts inappropriately: add a "-l" option on the end of the "login" and "shell" lines in /etc/inetd.conf, then type "inetd -c". The "-l" option tells HPUX to ignore regular users' .rhosts files even if they exist. Root's .rhosts file is still honored, however. Then, if you want to allow remsh/rlogin/rcp access for selected users, add them to the /etc/hosts.equiv file (eg: "hosta user1" allows user1 password free access from hosta).
Of course, if you are REALLY serious about security, you should disable the Berkeley services altogether and use ssh (www.openssh.org) instead.