03-02-2018
Hi,
It's been a long time since I worked on HPUX (15 Years), but from memory there was an other way of preparing the system which I think used the "tsconvert -x" command followed by the "pwconv" command.
This might not be relevant any more as this was HPUX 10.20, but it might be worth exploring - although I may just be having a senior moment.
Regards
Gull04
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All,
Some questions on PAM (Pluggable Authentication Modulues) and Trusted mode in HP-UX.
As default, when I turn on trusted mode (need shadow password only), the PAM is atomatically installed(not sure the word "installed" is appropriate or not). Can we turn on the trusted mode only,... (0 Replies)
Discussion started by: wilsonchan1000
0 Replies
2. Cybersecurity
About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.
How many... (0 Replies)
Discussion started by: kduffin
0 Replies
3. HP-UX
I was playing with sam and i turned on the Trusted System feature (UX11i).
Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen.
I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies
4. UNIX for Dummies Questions & Answers
Hello
I am looking for advise on how to convert a windows based computer system into a UNIX based operating system.. I would like to be able to learn UNIX better than I know it and work didn't allow me to work with UNIX much.
Is there a book where I could learn how to accomplish that... (6 Replies)
Discussion started by: baksg1995
6 Replies
5. HP-UX
Is it possible to have shadowed password file without implementing a Trusted System? (3 Replies)
Discussion started by: linuxdude
3 Replies
6. Solaris
How to check if a system has Solaris trusted extensions installed or not on a solaris 10 system ? (5 Replies)
Discussion started by: fugitive
5 Replies
7. What is on Your Mind?
I have an old Dell system that I would like to convert over to a Unix system and I have no idea how to do this. Where can I go to get the information to do this. This will be a secondary computer that I will learn and "play" with. I have heard that it is fairly easy to do and that once I get used... (0 Replies)
Discussion started by: Richard.Borden2
0 Replies
8. HP-UX
I have a new box that was set up for me and I want to allow telnet to the box as root. I know that it's not secure but due to the nature of what I test I need an easy and reliable way back in if I've messed up the other connection methods(SSH). This is in a protected lab environment. Eventually... (17 Replies)
Discussion started by: gctaylor
17 Replies
9. HP-UX
All,
I have inherited some software that is running on HP-HX 11.11. The software ofers a GUI login and the user passwords can be either internal to the software, user defined or based on the matching unix account. The problem I have is that the server has been converted to 'trusted' years... (7 Replies)
Discussion started by: rbatte1
7 Replies
LEARN ABOUT ULTRIX
hosts.equiv
hosts.equiv(5) File Formats Manual hosts.equiv(5)
Name
hosts.equiv - list of trusted hosts
Description
The file resides in the directory and contains a list of trusted hosts. When an or request from a host listed in the file is made, and the
initiator of the request has an entry in further validity checking is not required. Thus, does not prompt for a password, and completes
successfully. When a remote user is in the local file, that user is defined as equivalenced to a local user with the same user ID.
The format of is a list of names, as in:
host1
-host2
+@group1
-@group2
A line consisting of a host name means that anyone logging in from that host is trusted. A line consisting of a host name preceded by -
means that anyone logging in from that host is not trusted. A line consisting of a single + means that all hosts are trusted. Placing a
line consisting of a single + in your file poses substantial security risks and is not recommended.
The +@ and -@ syntax are specific to Yellow Pages (YP). A line consisting of +@group means that all hosts in that network group (which is
served by YP) are trusted. A line consisting of -@group means that hosts in that network group (which is served by YP) are not trusted.
Programs scan the file sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries, or
negative for -@ entries).
The file has the same format as the file. When a user executes or the file from that user's home directory is concatenated onto the file
for permission checking. The host names listed in the and files may optionally contain the local BIND domain name. For more information
on BIND, see the Guide to the BIND/Hesiod Service. If a user is excluded by a minus entry from but included in that user is considered
trusted. In the special case when the user is root, only the file is checked.
It is possible to have two entries on a single line. Separate the entires with a space. If the remote host is equivalenced by the first
entry, the user named by the second entry is allowed to specify any name to the option (provided that name is in the file). For example:
suez john
This entry allows John to log in from suez. The normal use would be to put this entry in the file in the home directory for bill. Then,
John can log in as bill when coming from suez without having to supply a password. The second entry can be a netgroup. For example:
+@group1 +@group2
This entry allows any user in group2 coming from a host in group1 to log in as anyone.
Files
/var/yp/domain/netgroup
/var/yp/domain/netgroup.byuser
/var/yp/domain/netgroup.byhost
See Also
rlogin(1c), rsh(1c), netgroup(5yp)
Guide to the BIND/Hesiod Service
Guide to the Yellow Pages Service
hosts.equiv(5)