I LOVE MUSIC

/etc/shadow 파일 소유자 권한 U-19(HP-UX Trusted mode 관련) 본문

주통기반/관련지식

/etc/shadow 파일 소유자 권한 U-19(HP-UX Trusted mode 관련)

검은쥐 2016. 2. 23. 16:44

What are the major differences between trusted and non-trusted systems?

Added: 05/15/01 

1. A trusted system allows system auditing to be turned on. 
System auditing enables the ability to trace every system call 
issued by each user on the system. Non-trusted systems run 
with system auditing disabled. 

2. Trusted systems have improved password management. 

Below is a list of password management features: 

a. Specification of a grace period and expiration period for 
passwords. 

b. The ability to specify system-wide password aging. 

c. The ability to specify an absolute account life. 

d. The ability to disable accounts after repeated login 
failures. 

e. Passwords lengths of up to forty (40) characters. 

f. The ability to access a random password generator. 

3. Trusted systems have additional login restrictions, while 
non-trusted systems do not. Below are the features of 
trusted system login restrictions: 

a. In addition to account disabling, the account may also be 
locked. 

b. Setting accounts to be accessed only at certain times of 
the day. 

c. The ability to specify account location access. In other 
words, account access at specific devices, workstations, 
and so on. 

d. The ability to specify a single-user boot password. 

Note: These login restrictions are NOT available on 
NON-TRUSTED systems. 

4. A trusted system has shadowed passwords, while a non-trusted 
system does not have shadowed passwords. Shadowed passwords 
are kept in locations other than /etc/passwd. This prevents 
users from viewing the /etc/passwd file and determining which 
accounts do not have passwords. This also prevents hackers from 
running "password cracker programs" against passwords in the 
/etc/passwd file. 

For more information, please refer to the following document: 

"Administering Your HP-UX Trusted System" 

The document is located at the following web site: 

o <http://docs.hp.com/hpux/onlinedocs/B2355-90121/B2355-90121.html

Locate the "Description of the HP-UX Trusted System" section in 
the left menu. The following two pages contain more information: 

o What is a Trusted System? 

o What is C2-Level Trusted Mode? 


출처 : http://www.unixguide.net/hp/faq/5.1.7.shtml

추가자료 : HP Community (Administering Your HP-UX Trusted System)

'주통기반 > 관련지식' 카테고리의 다른 글

/etc/syslog.conf 관련 정보  (0) 2016.02.25
Standalone, (x)inetd 데몬 관련 내용  (0) 2016.02.23
Unix & Linux 환경변수  (0) 2016.02.22
사용자 쉘 점검(U-14)  (0) 2016.02.22
PAM(Pluggable Authentication Module)이란?  (0) 2016.02.22
Comments