Sponsored Content
Operating Systems Linux Red Hat sudo: no tty present and no askpass program specified Post 302403876 by linuxgeek on Monday 15th of March 2010 03:37:36 AM
Old 03-15-2010
hi pludi,

Yes, im running ssh remotely on my script and I specify the NOPASSWD command

Code:
nagios ALL=NOPASSWD: /usr/sbin/smartctl

I can login automatically to my destination server using nagios. The problem is it won't allocate a TTY for a non-interactive remote command.

Last edited by linuxgeek; 03-15-2010 at 04:52 AM..
 

10 More Discussions You Might Find Interesting

1. Solaris

How to remove sudo program

How to completely uninstall sudo program? Thank u in advance (1 Reply)
Discussion started by: unitipon
1 Replies

2. Shell Programming and Scripting

how to execute a program present on another server using SFTP in perl

Hi, I want to execute a program which is present on another server. i want to use SFTP in perl, is it possible? how ? thanks. (1 Reply)
Discussion started by: anandgodse
1 Replies

3. Shell Programming and Scripting

sudo: sorry, you must have a tty to run sudo

Hi All, I running a unix command using sudo option inside shell script. Its working well. But in crontab the same command is not working and its throwing "sudo: sorry, you must have a tty to run sudo". I do not have root permission to add or change settings for my userid. I can not even ask... (9 Replies)
Discussion started by: Apple1221
9 Replies

4. UNIX for Advanced & Expert Users

Error - sudo: no tty present and no askpass program specified

Hi I am trying to automate the deployment of a tar ball onto a set of remote servers and am getting this error from the ssh - sudo: no tty present and no askpass program specified What I have done is add some code into the user's ssh key that does a few things like delete the existing... (2 Replies)
Discussion started by: steadyonabix
2 Replies

5. Red Hat

sudo: no tty present and no askpass program specified

i am trying overide the below error sudo: sorry, you must have a tty to run sudoi am aware of ssh -t option. But just experimenting with OS :D So, tried commenting out Defaults requiretty from my sudoers file after which i am getting the below error sudo: no tty present and no askpass... (4 Replies)
Discussion started by: chidori
4 Replies

6. UNIX for Dummies Questions & Answers

linux sudo: no tty present and no askpass program specified

Hi I have an Oracle DBA that is trying to install an RPM from Stratavia which is a web based portal and it executes the following: Instance Wrapper=sudo -u oracle /opt/datapalette/jython/jython Server Wrapper=sudo -u root /opt/datapalette/jython/jython I've compared the /etc/sudoers... (8 Replies)
Discussion started by: jeff-fafa
8 Replies

7. Shell Programming and Scripting

sudo: sorry, you must have a tty to run sudo

Hi, Have a need to run the below command as a "karuser" from a java class which will is running as "root" user. When we are trying to run the below command from java code getting the below error. Command: sudo -u karuser -s /bin/bash /bank/karunix/bin/build_cycles.sh Error: sudo: sorry,... (8 Replies)
Discussion started by: Satyak
8 Replies

8. Solaris

[Solved] No tty present and no askpass program specified!

Hi Guys, I use a script sdcmdeploy.ksh to deploy java application to respective dev/test environment. This script is being executed on SunOS. These apps are weblogic apps & the script internally calls weblogic deploy script to deploy application to weblogic cluster. But at this point it... (2 Replies)
Discussion started by: raj100
2 Replies

9. UNIX for Beginners Questions & Answers

No tty present and no askpass program specified

I am trying to rsync files from NodeA to NodeB. Using the below command. /usr/bin/rsync -v -a -e "ssh" --rsync-path="sudo -u msd rsync" /home/ansible/templates/app/Sprint6/webapps eric@NodeB:/opt/msdp/ca/iam_cac I can only ssh into NodeB as eric user but I want files placed as msd user.... (4 Replies)
Discussion started by: Junaid Subhani
4 Replies

10. Shell Programming and Scripting

Python: Redirecting to tty and reading from tty

In bash, you can do something like this: #!/bin/bash echo -n "What is your name? " > /dev/tty read thename < /dev/tty How can I do the same in python? I have a python script that has the following content: #!/usr/bin/python2.7 import getpass import sys import telnetlib import... (2 Replies)
Discussion started by: SkySmart
2 Replies
nagios_checkdisk_plugin_selinux(8)		      SELinux Policy nagios_checkdisk_plugin			nagios_checkdisk_plugin_selinux(8)

NAME
nagios_checkdisk_plugin_selinux - Security Enhanced Linux Policy for the nagios_checkdisk_plugin processes DESCRIPTION
Security-Enhanced Linux secures the nagios_checkdisk_plugin processes via flexible mandatory access control. The nagios_checkdisk_plugin processes execute with the nagios_checkdisk_plugin_t SELinux type. You can check if you have these processes running by executing the ps command with the -Z qualifier. For example: ps -eZ | grep nagios_checkdisk_plugin_t ENTRYPOINTS
The nagios_checkdisk_plugin_t SELinux type can be entered via the nagios_checkdisk_plugin_exec_t file type. The default entrypoint paths for the nagios_checkdisk_plugin_t domain are the following: /usr/lib/nagios/plugins/check_disk, /usr/lib/nagios/plugins/check_disk_smb, /usr/lib/nagios/plugins/check_ide_smart, /usr/lib/nagios/plug- ins/check_linux_raid PROCESS TYPES
SELinux defines process types (domains) for each process running on the system You can see the context of a process using the -Z option to ps Policy governs the access confined processes have to files. SELinux nagios_checkdisk_plugin policy is very flexible allowing users to set- up their nagios_checkdisk_plugin processes in as secure a method as possible. The following process types are defined for nagios_checkdisk_plugin: nagios_checkdisk_plugin_t Note: semanage permissive -a nagios_checkdisk_plugin_t can be used to make the process type nagios_checkdisk_plugin_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated. BOOLEANS
SELinux policy is customizable based on least access required. nagios_checkdisk_plugin policy is extremely flexible and has several bool- eans that allow you to manipulate the policy and run nagios_checkdisk_plugin with the tightest access possible. If you want to deny any process from ptracing or debugging any other processes, you must turn on the deny_ptrace boolean. Enabled by default. setsebool -P deny_ptrace 1 If you want to allow all domains to use other domains file descriptors, you must turn on the domain_fd_use boolean. Enabled by default. setsebool -P domain_fd_use 1 If you want to allow all domains to have the kernel load modules, you must turn on the domain_kernel_load_modules boolean. Disabled by default. setsebool -P domain_kernel_load_modules 1 If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default. setsebool -P fips_mode 1 If you want to enable reading of urandom for all domains, you must turn on the global_ssp boolean. Disabled by default. setsebool -P global_ssp 1 FILE CONTEXTS
SELinux requires files to have an extended attribute to define the file type. You can see the context of a file using the -Z option to ls Policy governs the access confined processes have to these files. SELinux nagios_checkdisk_plugin policy is very flexible allowing users to setup their nagios_checkdisk_plugin processes in as secure a method as possible. STANDARD FILE CONTEXT SELinux defines the file context types for the nagios_checkdisk_plugin, if you wanted to store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. semanage fcontext -a -t nagios_checkdisk_plugin_exec_t '/srv/nagios_checkdisk_plugin/content(/.*)?' restorecon -R -v /srv/mynagios_checkdisk_plugin_content Note: SELinux often uses regular expressions to specify labels that match multiple files. The following file types are defined for nagios_checkdisk_plugin: nagios_checkdisk_plugin_exec_t - Set files with the nagios_checkdisk_plugin_exec_t type, if you want to transition an executable to the nagios_checkdisk_plugin_t domain. Paths: /usr/lib/nagios/plugins/check_disk, /usr/lib/nagios/plugins/check_disk_smb, /usr/lib/nagios/plugins/check_ide_smart, /usr/lib/nagios/plugins/check_linux_raid Note: File context can be temporarily modified with the chcon command. If you want to permanently change the file context you need to use the semanage fcontext command. This will modify the SELinux labeling database. You will need to use restorecon to apply the labels. COMMANDS
semanage fcontext can also be used to manipulate default file context mappings. semanage permissive can also be used to manipulate whether or not a process type is permissive. semanage module can also be used to enable/disable/install/remove policy modules. semanage boolean can also be used to manipulate the booleans system-config-selinux is a GUI tool available to customize SELinux policy settings. AUTHOR
This manual page was auto-generated using sepolicy manpage . SEE ALSO
selinux(8), nagios_checkdisk_plugin(8), semanage(8), restorecon(8), chcon(1), sepolicy(8) , setsebool(8) nagios_checkdisk_plugin 14-06-10 nagios_checkdisk_plugin_selinux(8)
All times are GMT -4. The time now is 04:11 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy