- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Root user password causing security hole...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 02:16 PM
02-21-2001 02:16 PM
Root user password causing security hole...
I stumbled across a problem where the root password is set, yet when ANY user 'su' and enter a blank password they are granted entry as 'root'. The password set for root is not blank, yet somehow the blank entry is also accepted. Any clues on where to start looking?
Thanks in advance. This even happens upon login, rlogin, and telnet as 'root'.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 02:19 PM
02-21-2001 02:19 PM
Re: Root user password causing security hole...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 02:37 PM
02-21-2001 02:37 PM
Re: Root user password causing security hole...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 02:45 PM
02-21-2001 02:45 PM
Re: Root user password causing security hole...
So, if so check your local /etc/passwd file. It will have a line that begins with a "+". It should be after the 'local only users'. So, after all the system users is a minimum.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 03:01 PM
02-21-2001 03:01 PM
Re: Root user password causing security hole...
'ypbind' is not running, and there is no '+' entry in the /etc/passwd file. I guess we are NOT running NIS. Sorry. Any other ideas?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 03:07 PM
02-21-2001 03:07 PM
Re: Root user password causing security hole...
What does the /etc/passwd entry for root look like?
-sam
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2001 10:09 PM
02-21-2001 10:09 PM
Re: Root user password causing security hole...
If you're NOT using NIS, remove the line starting with 'passwd:' in the file /etc/nsswitch.conf
Regards,
Dan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-22-2001 06:37 AM
02-22-2001 06:37 AM
Re: Root user password causing security hole...
root:vIoK1y0bdoV5E:0:3::/:/sbin/sh
There is no 'nsswitch.conf' in /etc. There are only example files which could be copied to /etc/nsswitch.conf.
Am I simply overlooking something?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-22-2001 06:46 AM
02-22-2001 06:46 AM
Re: Root user password causing security hole...
Q: Is this on ALL clients that people can su with no passwd?
Q: If you are using NIS, where is the "+::0:0:::" in /etc/passwd? It should be the LAST line!
Q: Do any of the local or NIS users have a UID of 0? This is the most critical! I have seen many backdoors made by people assigning a UID of 0 to an ID. This UID means the user is really root already, so a su is only beneficial for the accounting system.
Make sure that No user is assigned UID=0, GID=0!. Make sure permissions on /etc/passwd and /etc/group are 444. Make permissions on "/" 555, chown root "/" chgrp root "/".
Regards,
Shannon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-22-2001 09:20 AM
02-22-2001 09:20 AM
Re: Root user password causing security hole...
a few things that may be worth checking :-
1. the 'root' user is the first entry in the passwd file.
2. the 'root' user is only in the passwd file once.
3. no other user had a uid of '0'.
awk -F: '{ print $3 " " $1 }' /etc/passwd | sort -n | more
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-23-2001 07:08 AM
02-23-2001 07:08 AM
Re: Root user password causing security hole...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-23-2001 08:54 AM
02-23-2001 08:54 AM
Re: Root user password causing security hole...
I do have something to try, but don't do it with users on the system.
Firstly, take a copy of the existing /etc/passwd file and put it somewhere safe.
The copy the passwd file in /usr/newconfig/etc to /etc (over-writing the existing one).
Then add a new user (using sam or useradd) and also assign root a new password. Then try your test again.
This should at least prove if it's the passwd file or something else.
After you've finished the test, copy the old passwd file back.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-23-2001 12:53 PM
02-23-2001 12:53 PM
Re: Root user password causing security hole...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2001 12:21 PM
02-26-2001 12:21 PM
Re: Root user password causing security hole...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2001 12:37 PM
02-26-2001 12:37 PM
Re: Root user password causing security hole...
Here is su on my 10.20 system:
# ll /usr/bin/su
-r-sr-xr-x 1 root bin 20480 Feb 20 1998 /usr/bin/su
[scrooge:root] 1241 /
# file /usr/bin/su
/usr/bin/su: s800 shared executable dynamically linked
[scrooge:root] 1242 /
# what /usr/bin/su
/usr/bin/su:
$Revision: 80.1.1.1 $
PATCH_10_20: su.o 98/02/20
Here is su on my 11.0 system:
[uran:root] 223 /tmp/pww
# ll /usr/bin/su
-r-sr-xr-x 1 root bin 24576 Aug 6 1998 /usr/bin/su
[uran:root] 224 /tmp/pww
# file /usr/bin/su
/usr/bin/su: PA-RISC1.1 shared executable dynamically linked
[uran:root] 225 /tmp/pww
# what /usr/bin/su
/usr/bin/su:
$Revision: 82.15.1.1 $
PATCH_11_00: su.o 98/08/06
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2001 12:39 PM
02-26-2001 12:39 PM
Re: Root user password causing security hole...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2001 06:55 PM
02-26-2001 06:55 PM
Re: Root user password causing security hole...
whence -v su
Because sysadmins so commonly type su, hackers will hide a false su in your $PATH, aliases or function libraries. which will not find these aliases. Try this:
alias su=aBADcommand
which su
whence -v su
which will not tell what the shell is going to do with su.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2001 12:48 PM
02-27-2001 12:48 PM