HP-UX revert from trusted system to default


 
Thread Tools Search this Thread
Operating Systems HP-UX HP-UX revert from trusted system to default
# 8  
Old 02-06-2012
Quote:
I'm still not sure what being 'trusted' gives me. It just was already 'trusted' when I got given the opportunity to take it on (i.e. dumped with it) Does untrusted just mean that the passwords are stored (encrypted) in /etc/passwd field 2 so there is a risk that someone might peek and then decipher them? Will I lose the complexity/history rules for passwords or something else perhaps? I will be delighted if it doesn't re-prompt for the old password when I've just typed it in, and as for that generating a next password malarky, no thanks. All users, be they IT or not, hate it too.
To read about "untrused", just see "man passwd". You will lose complexity and history rules. The "root" user will not need to know an old password. Passwords will be stored encrypted in /etc/passwd, but there is no direct unencryption method beyond brute force by a "root" user.

Keep some sessions logged in as "root" if you make this change. I recall that all existing user passwords were lost during the change from "trusted" to "untrusted" and that every user needed a password reset. Don't know if this has been fixed. HP Openview stopped working and need a re-install.

The "sudo" command is not a HP-UX command. It is 3rd-party software which administrators elect to use in order to bypass "trusted" security. No guarantee that it would continue to work unchanged.

I can't see how changing from "trusted" to "untrusted" will fix your application problem.

As others advise, make a full Disaster Recovery backup before considering this change.
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies

2. UNIX for Dummies Questions & Answers

Need to revert default prompt in Linux after setting PS1 command

I have given as: PS1="Karthick>" in linux. Now the prompt changed as: Karthick> Now I need to get back the default prompt . How to achieve this? Thanks in advance (13 Replies)
Discussion started by: karthick nath
13 Replies

3. UNIX for Advanced & Expert Users

CVS command to revert deleted files

Hi, I have deleted a file and commited in CVS. So, is there any CVS command to revert back that deleted file with existing log messages. --Thanks in advance Madhu (1 Reply)
Discussion started by: madhuti
1 Replies

4. UNIX for Advanced & Expert Users

gmail revert to old look permanently

I thought I would share gmail revert to old look permanently. I am sure I am not the only one annoyed by the new look. Install Stylish extension Choose the Stylish UserStyle that you want. I know The Return of Old Gmail and gmail-b2b both work but I prefer gmail-b2b since I think it looks... (0 Replies)
Discussion started by: cokedude
0 Replies

5. Linux

Is it possible to revert a file after overwriting it ?

Long story short, there was some sort of corruption with my ide and the script I was working on has been over written with nothing (the file is blank now). The IDE doesn't store a back up from what I know (I'm using notepadd++ in wine lol I know I know I'm addictted to the nppftp sidebar and geany... (1 Reply)
Discussion started by: noPermissions
1 Replies

6. HP-UX

Enable telnet as root to 11.31 non-trusted system?

I have a new box that was set up for me and I want to allow telnet to the box as root. I know that it's not secure but due to the nature of what I test I need an easy and reliable way back in if I've messed up the other connection methods(SSH). This is in a protected lab environment. Eventually... (17 Replies)
Discussion started by: gctaylor
17 Replies

7. Emergency UNIX and Linux Support

Revert SVN import

Instead of importing a project/folder as svn import vlsms/ file:///home/repo/vlsms -m "Initial Upload" I did svn import vlsms/ file:///home/repo -m "Initial Upload" How to undo this import (in a clean way,without trace?) ---------- Post updated at 03:10 AM ---------- Previous update was at... (0 Replies)
Discussion started by: johnbach
0 Replies

8. HP-UX

shadowed password file on non-trusted system?

Is it possible to have shadowed password file without implementing a Trusted System? (3 Replies)
Discussion started by: linuxdude
3 Replies

9. Solaris

need zpool to revert...

hi i have created a pool using zpool command for my /dev/dsk/c1d0s3 disk. The poolname is qwertyuiopasdfghjklmnbvcxzzxcvbnmasdfghjklqwertyuiopoiuytrewqasdfghjklkjhgfdsazxcvbnmmnbnbcxczxzassd ddddvfhfghgjjgjhgkhkljfjlhohihiuyuioyguioyguiowyuiogwyuigwrigywuigyguiyuiogyugiyguioyuyguiowygiuygui... (1 Reply)
Discussion started by: SankarV
1 Replies

10. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies
Login or Register to Ask a Question
hosts.equiv(5)							File Formats Manual						    hosts.equiv(5)

Name
       hosts.equiv - list of trusted hosts

Description
       The file resides in the directory and contains a list of trusted hosts.	When an or request from a host listed in the file is made, and the
       initiator of the request has an entry in further validity checking is not required.  Thus, does not prompt for a  password,  and  completes
       successfully.  When a remote user is in the local file, that user is defined as equivalenced to a local user with the same user ID.

       The format of is a list of names, as in:
       host1
       -host2
       +@group1
       -@group2

       A  line	consisting  of a host name means that anyone logging in from that host is trusted.  A line consisting of a host name preceded by -
       means that anyone logging in from that host is not trusted.  A line consisting of a single + means that all hosts are trusted.	Placing  a
       line consisting of a single + in your file poses substantial security risks and is not recommended.

       The  +@ and -@ syntax are specific to Yellow Pages (YP).  A line consisting of +@group means that all hosts in that network group (which is
       served by YP) are trusted.  A line consisting of -@group means that hosts in that network group (which is served by YP)	are  not  trusted.
       Programs  scan  the  file sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries, or
       negative for -@ entries).

       The file has the same format as the file.  When a user executes or the file from that user's home directory is concatenated onto  the  file
       for  permission	checking.  The host names listed in the and files may optionally contain the local BIND domain name.  For more information
       on BIND, see the Guide to the BIND/Hesiod Service.  If a user is excluded by a minus entry from but included in	that  user  is	considered
       trusted.  In the special case when the user is root, only the file is checked.

       It  is  possible to have two entries on a single line.  Separate the entires with a space.  If the remote host is equivalenced by the first
       entry, the user named by the second entry is allowed to specify any name to the option (provided that name is in the file).  For example:
       suez john
       This entry allows John to log in from suez.  The normal use would be to put this entry in the file in the home directory for  bill.   Then,
       John can log in as bill when coming from suez without having to supply a password.  The second entry can be a netgroup.	For example:
       +@group1 +@group2
       This entry allows any user in group2 coming from a host in group1 to log in as anyone.

Files
       /var/yp/domain/netgroup
       /var/yp/domain/netgroup.byuser
       /var/yp/domain/netgroup.byhost

See Also
       rlogin(1c), rsh(1c), netgroup(5yp)
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service

																    hosts.equiv(5)