09-07-2007
How to Enable TELNET for root user
How to Enable TELNET for root user in Linux.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi Every one
I disable the root account entering wrong password for many time
How can I enable the root account
I am using Tru64 Unix V4.0G
Thank you (2 Replies)
Discussion started by: Syed_45
2 Replies
2. Linux
hi ,
i have jsut installed linux 9.0 , but i can not ftp or telnet to the system .
i have installed the ftp and the telnet server during installation .
i have also configured the files to enable the ftp and telnet , the ftp and the telnet daemons are running , but when i do ftp :
ftp... (1 Reply)
Discussion started by: ppass
1 Replies
3. Solaris
Hi to All,
I have configured telnet service in my server but am not able to login with root user in Linux Servers.
For that what can i do ?
Please help me
Thanks in Advance. (1 Reply)
Discussion started by: Sharath Kumar
1 Replies
4. Solaris
Hi...
How do I enable SSH and disable telnet..
Also - is there anything special I need to do to ensure that a new user can use ssh and su but not telnet?
Adel (15 Replies)
Discussion started by: ArabOracle.com
15 Replies
5. Cybersecurity
Hi - I have a SUSE Enterprise Linux Server V9 that I have an issue with. Policy says that root connectivity via ssh needs to be disabled. So, to do that, I made the following change in the sshd_config section:
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin yes
PermitRootLogin no... (3 Replies)
Discussion started by: cpolikowsky
3 Replies
6. Linux
hi
iam installed mandriva spring 2009
iam unble to login into gui using root
how to enable it
where the settings are stored (5 Replies)
Discussion started by: seshumohan
5 Replies
7. Solaris
I am not able to get ftp working for Solaris 10 for root user. I am getting login failed error.
331 Password required for root.
Password:
530 Login incorrect.
Login failed.
Tried following things already.
1. SFTP works ok, still would like to know why FTP is not working (curious).
2.... (5 Replies)
Discussion started by: webkid
5 Replies
8. HP-UX
I have a new box that was set up for me and I want to allow telnet to the box as root. I know that it's not secure but due to the nature of what I test I need an easy and reliable way back in if I've messed up the other connection methods(SSH). This is in a protected lab environment. Eventually... (17 Replies)
Discussion started by: gctaylor
17 Replies
9. UNIX for Dummies Questions & Answers
I've been through many threads before i decide to create a separate thread.
I can't really find the solution to my (simple) problem.
Here's what I'm trying to achieve:
As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user.
The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies
LEARN ABOUT DEBIAN
setuid
SETUID(2) Linux Programmer's Manual SETUID(2)
NAME
setuid - set user identity
SYNOPSIS
#include <sys/types.h>
#include <unistd.h>
int setuid(uid_t uid);
DESCRIPTION
setuid() sets the effective user ID of the calling process. If the effective UID of the caller is root, the real UID and saved set-user-ID
are also set.
Under Linux, setuid() is implemented like the POSIX version with the _POSIX_SAVED_IDS feature. This allows a set-user-ID (other than root)
program to drop all of its user privileges, do some un-privileged work, and then reengage the original effective user ID in a secure man-
ner.
If the user is root or the program is set-user-ID-root, special care must be taken. The setuid() function checks the effective user ID of
the caller and if it is the superuser, all process-related user ID's are set to uid. After this has occurred, it is impossible for the
program to regain root privileges.
Thus, a set-user-ID-root program wishing to temporarily drop root privileges, assume the identity of an unprivileged user, and then regain
root privileges afterward cannot use setuid(). You can accomplish this with seteuid(2).
RETURN VALUE
On success, zero is returned. On error, -1 is returned, and errno is set appropriately.
ERRORS
EAGAIN The uid does not match the current uid and uid brings process over its RLIMIT_NPROC resource limit.
EPERM The user is not privileged (Linux: does not have the CAP_SETUID capability) and uid does not match the real UID or saved set-user-ID
of the calling process.
CONFORMING TO
SVr4, POSIX.1-2001. Not quite compatible with the 4.4BSD call, which sets all of the real, saved, and effective user IDs.
NOTES
Linux has the concept of the file system user ID, normally equal to the effective user ID. The setuid() call also sets the file system
user ID of the calling process. See setfsuid(2).
If uid is different from the old effective UID, the process will be forbidden from leaving core dumps.
The original Linux setuid() system call supported only 16-bit user IDs. Subsequently, Linux 2.4 added setuid32() supporting 32-bit IDs.
The glibc setuid() wrapper function transparently deals with the variation across kernel versions.
SEE ALSO
getuid(2), seteuid(2), setfsuid(2), setreuid(2), capabilities(7), credentials(7)
COLOPHON
This page is part of release 3.44 of the Linux man-pages project. A description of the project, and information about reporting bugs, can
be found at http://www.kernel.org/doc/man-pages/.
Linux 2010-11-22 SETUID(2)