United States-English |
|
|
HP-UX System Administrator's Guide: Security Management: HP-UX 11i Version 3 > Appendix A Trusted SystemsManaging Trusted Passwords and System Access |
|
The password is the most important individual user identification symbol. With it, the system authenticates a user to allow access to the system. Because they are vulnerable to compromise when used, stored, or known, passwords must be kept secret at all times. Also see Chapter 2 for password information. Security Administrator's ResponsibilitiesThe security administrator and every user on the system must share responsibility for password security. The security administrator performs the following security tasks:
User's ResponsibilitiesEvery user must observe the following rules:
A trusted system maintains multiple password files: the /etc/passwd file and the files in the protected password database /tcb/files/auth/ (see “The /tcb/files/auth/ Database”). Each user has an entry in two files, and login looks at both entries to authenticate login requests. All passwords are encrypted immediately after entry and stored in /tcb/files/auth/user-char/user-name, the user's protected password database file. Only the encrypted password is used in comparisons. Do not permit any empty (null) password fields in either password file. On trusted systems, the password field in /etc/passwd is ignored. A user with an empty password will be forced to set a password upon login on a trusted system. However, even this leaves a potential for a security breach, anyone logging in to this account is required to set the password. Do not edit the password files directly. Use HP SMH, useradd, userdel, or usermod to modify password file entries. A trusted system uses the /etc/passwd file to identify a user at login time. The file contains an entry for every account on the HP-UX system. Each entry consists of seven fields, separated by colons. A typical entry for /etc/passwd in a trusted system looks like this:
The fields contain the following information (listed in order), separated by colons:
The user can change the comment field (fifth field) with the chfn command and the login program path name (seventh field) with the chsh command. The system administrator sets the remaining fields. The user ID should be unique. For more information, see chfn(1), chsh(1), passwd(1), and passwd(4). The user can change the password in the protected password database with passwd. When a system is converted to a trusted system, the encrypted password, normally held in the second field of /etc/passwd, is moved to the protected password database, and an asterisk holds its place in the /etc/passwd file. Protected password database files are stored in the /tcb/files/auth/ hierarchy. User authentication profiles are stored in these directories based on the first letter of the user account name. For example, the authentication profile for user david is stored in the file /tcb/files/auth/d/david. On trusted systems, key security elements are held in the protected password database, accessible only to superusers. Use HP SMH to set password data entries. Password data that is not set for a user will default to the system defaults stored in the file /tcb/files/auth/system/default. The protected password database contains many authentication entries for the user. See prpwd(4) for more information on these entries, which include the following:
On trusted systems, the following password generation options are available:
You can set password generation options for a system. Alternately, you can set password generation options on a per-user basis, overriding the system default. You must set at least one password generation option for each user. If more than one option is available to a user, a password generation menu is displayed when the user changes the password. You can enable or disable password aging for each user. When password aging is enabled, the system maintains the following for the password:
The expiration time and lifetime values are reset when a password is changed. A lifetime of zero specifies no password aging; in this case, the other password aging times have no effect. You can enable the password history feature on a systemwide basis to discourage users from reusing previous passwords. You enable the password reuse check by defining the PASSWORD_HISTORY_DEPTH attribute in the /etc/default/security file:
where n is an integer specifying the number of previous passwords to check. When a user changes the password, the new password is checked against the previous n passwords, starting with the current password. If the system finds a match, it rejects the new password. An n of 2 prevents users from alternating between two passwords. For more information, see passwd(1) and security(4). On trusted systems, you can specify times-of-day and days-of-week that are allowed for login for each user. When a user attempts to log in outside the allowed access time, the event is logged (if auditing is enabled for login failures and successes) and the login is terminated. A superuser can log in outside the allowed access time, but the event is logged. The permitted range of access times is stored in the protected password database for users and can be set with HP SMH. Users that are logged in when a range ends are not logged out. For each MUX port and dedicated DTC port on a trusted system, you can specify a list of users allowed for access. When the list is null for a device, all users are allowed access. The device access information is stored in the device assignment database, /tcb/files/devassign, which contains an entry for each terminal device on the trusted system. A field in the entry lists the users allowed on the device. Terminal login information on a trusted system is stored in the terminal control database, /tcb/files/ttys, which provides the following data for each terminal:
Only superusers can access these trusted system databases and can set the entries using HP SMH. See devassign(4) and ttys(4). Use the library routines described in the following manpages to access information in the password files and in other trusted system databases:
|
Printable version | ||
|