Solved

Which hardening in HPUX (trusted security) disabled console CDE login (hourglass stayed there after password entry)

Posted on 2008-10-22
3
822 Views
Last Modified: 2013-12-06
Hi,

I'm not sure what hardening has been done the last few months but
we now faced this problem on our HPUX B11.23 Itanium :
when we login to CDE at console, it gives an hourglass that displays
perpetually.

First,
which process should I kill to release the console GUI - I still have
access from ssh into the servers

second,
what's the hardening change I should reverse so that I don't get
this problem anymore

Third,
my account seem to get suspended easily (I don't think it's due to 3 incorrect
password entry attempts).  anyway, how do I increase the number of allowed
retries for password for an account

I'm running in Trusted mode, ie /etc/shadow does not exist
0
Comment
Question by:sunhux
  • 2
3 Comments
 
LVL 38

Accepted Solution

by:
yuzh earned 500 total points
ID: 22783603
First,
which process should I kill to release the console GUI - I still have
access from ssh into the servers
you need to login as root, to do the followings:
/usr/dt/bin/dtconfig -kill
/usr/dt/bin/dtconfig -e
/usr/dt/bin/dtconfig -reset

man  dtconfig
to learn more deatis.
also have a look at the HP-UX FAQ:
http://www.unixguide.net/hp/faq/
second,
what's the hardening change I should reverse so that I don't get
this problem anymore
You know what you have done, you need to post the details about what you have done to the system.
Third,
my account seem to get suspended easily (I don't think it's due to 3 incorrect
password entry attempts).  anyway, how do I increase the number of allowed
retries for password for an account

have a look at  /etc/default/security file and check AUTH_MAXTRIES, you can also run sam (GUI tool) to check it out.
man security
to learn more details.
0
 

Author Comment

by:sunhux
ID: 22784117
Hardening was done before me
0
 
LVL 38

Assisted Solution

by:yuzh
yuzh earned 500 total points
ID: 22792349
You need to find out the details from logs/doc etc about what had been done for the box, soem one in your IT team might know  something about it.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now