Search the FAQ Archives

3 - A - B - C - D - E - F - G - H - I - J - K - L - M
N - O - P - Q - R - S - T - U - V - W - X - Y - Z
faqs.org - Internet FAQ Archives

comp.sys.hp.hpux FAQ
Section - 5.1.7 What are the major differences between trusted and non-trusted systems?

( Single Page )
[ Usenet FAQs | Web FAQs | Documents | RFC Index | Business Photos and Profiles ]


Top Document: comp.sys.hp.hpux FAQ
Previous Document: 5.1.6 How can I protect my systems against SATAN?
Next Document: 5.1.8 How can I configure things like minimum password length, password history, and maximum simultaneous logins?
See reader questions & answers on this topic! - Help others by sharing your knowledge
Added: 05/15/01

1. A trusted system allows system auditing to be turned on.
   System auditing enables the ability to trace every system call
   issued by each user on the system.  Non-trusted systems run
   with system auditing disabled.

2. Trusted systems have improved password management.

   Below is a list of password management features:

     a. Specification of a grace period and expiration period for
        passwords.

     b. The ability to specify system-wide password aging.

     c. The ability to specify an absolute account life.

     d. The ability to disable accounts after repeated login
        failures.

     e. Passwords lengths of up to forty (40) characters.

     f. The ability to access a random password generator.

3. Trusted systems have additional login restrictions, while
   non-trusted systems do not.  Below are the features of
   trusted system login restrictions:

     a. In addition to account disabling, the account may also be
        locked.

     b. Setting accounts to be accessed only at certain times of
        the day.

     c. The ability to specify account location access.  In other
        words, account access at specific devices, workstations,
        and so on.

     d. The ability to specify a single-user boot password.

   Note: These login restrictions are NOT available on
         NON-TRUSTED systems.

4. A trusted system has shadowed passwords, while a non-trusted
   system does not have shadowed passwords.  Shadowed passwords
   are kept in locations other than /etc/passwd.  This prevents
   users from viewing the /etc/passwd file and determining which
   accounts do not have passwords.  This also prevents hackers from
   running "password cracker programs" against passwords in the
   /etc/passwd file.

For more information, please refer to the following document:

  "Administering Your HP-UX Trusted System"

The document is located at the following web site:

  o <http://docs.hp.com/en/B2355-90121/>

Locate the "Description of the HP-UX Trusted System" section in
the left menu.  The following two pages contain more information:

  o What is a Trusted System?

  o What is C2-Level Trusted Mode?

User Contributions:

Comment about this article, ask questions, or add new information about this topic:

CAPTCHA