- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Trusted system question
Categories
Company
Local Language
Forums
Discussions
Knowledge Base
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2001 08:23 AM
03-29-2001 08:23 AM
Trusted system question
How can I disable number of invalid logons for root? Is it by setting the value to '0'? I cannot find a clear answer to this question. The reason why I'm asking is because if there is a limit on how many times one can try to logon to the root accout, it will become an administrative nightmare (root account locked, take the system down, unlock it, etc.).
It does not take much for a malicious user to write a very short EXPECT scritp to exhaust number of failed logins...
Any suggestions?
Thanks.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2001 08:29 AM
03-29-2001 08:29 AM
Re: Trusted system question
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-29-2001 08:55 AM
03-29-2001 08:55 AM
Re: Trusted system question
Brian
<*(((>< er
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-31-2001 12:14 PM
03-31-2001 12:14 PM
Re: Trusted system question
first: "root" can be unlocked by simply logging in on the
console using TEXT-MODE (not CDE!).
Second: Having somebody else with user-id 0, that one
could use "/usr/lbin/modprpw -k root" (or "-x", do not
remember, but one of the two does the trick) to unlock
the "root" account.
Pretty simple.
HTH,
Wodisch
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-01-2001 03:13 AM
04-01-2001 03:13 AM
Re: Trusted system question
Second, if somebody wrote EXPECT scripts to test the root password, you should NOT just increase the unsuccessful login count to avoid root being lock up. You should let the account locked so that intruder got no further chance to hack your system. Next thing you should do is to FIND who these people are (lastb -R root) then sue them perhaps, or send their boss a message for an explanation.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-01-2001 06:54 AM
04-01-2001 06:54 AM
Re: Trusted system question
It is NOT a good idea to ever have multiple UID 0 accounts. root privileges are always in force even if your login was billh or karenw. Consider the following big OOPS problems when logged in as UID 0:
- You need to cleanout your directory of a bunch of dot files (.profile, .exrc and so on) so you type: rm -rf .* Unfortunately, .* matches the current directory (.) and the parent directory (..) which is probably /home so every user file is now gone.
- billh leaves the company so you run SAM and remove billh and all the files owned by billh (which is UID 0) so the entire system is destroyed.
- All files and directories are created with root ownership, from email to temporary files, all carrying a potential security hole.
- One of the most common techniques by hackers is to simply change the UID of an existing user to 0.
You should always scan for multiple root user logins daily:
#!/usr/bin/sh
# Check for all UID 0's in the passwd file
/usr/bin/cut -f1,3 -d: /etc/passwd | tr ":" " " | while read USER UI
do
if [ $UID = 0 ]
then
echo "nuser $USER is $UID"
/usr/bin/grep ^${USER}: /etc/passwd
fi
done
------
Always use restricted SAM to allow limited root privileges to specific users or get a copy of sudo from the HP-UX archive site at: http://hpux.connect.org.uk/
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-01-2001 06:52 PM
04-01-2001 06:52 PM
Re: Trusted system question
~Philip