dialups(4) Kernel Interfaces Manual dialups(4)NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO login(1), passwd(4).
dialups(4)
Check Out this Related Man Page
dialups(4) Kernel Interfaces Manual dialups(4)NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO login(1), passwd(4).
dialups(4)
Hi there thanks for checking in.
I run a helpdesk with about 500 users login onto a network
and then onto a Unix box.
Sometimes people use other people's login's.:-(
All user's use there own PC.( I.P )
Is there a way that when somebody logs onto the unix box with a different I.P that the... (6 Replies)
I bought a pentium 2 (office auction) for my country home. When I turned it on it had Unix. It asks me for a login and password. I don't have these and since I don't know Unix I want to reformat the drive or at least be able to install Windows. I can't get past the Login and password promt. Anyone... (8 Replies)
I would really like to work within security in the I.T industry,
though I am not sure what my next step should be.
I can not afford a security course at this point in time. I have
been reading books and catching up with security tips as
much as I can from the Internet. Though I feel I can... (6 Replies)
I have a script in which I need to login as another user, using the
su command
What is the syntax/format for this command which allows me to input the password along with the command name and userid, all at the same time?
Something like:
su newuserid ????????
(where ???????? is... (4 Replies)
I have used the system administration management trusted security system and in the process the root password have been changed or lost.
Is there any possible way to recover root status after this incident:( (5 Replies)
Hi folks,
Postfix 2.3.8
SquirrelMail 1.4.11
I'm prepared installing One-time-password on SquirrelMail as experiment and don't have a clue to start. On googling I found;
SquirrelMail and OPTs
WiKID Strong Authentication System
SourceForge.net: WiKID Strong Authentication System... (7 Replies)
I would like to use SFTP from command line without entering userid and password.
Here is what I have gathered and did.
1) Create a public and private key pair for the protocol you want to use.
To create a key pair for use by SSH2, enter:
ssh-keygen -t dsa
I did that and got... (7 Replies)
Hello all ,
I looked up this site for solutions to hide login info from ps -ef | grep like using a seperate file and store the password in that especially for oracle sqlplus scripts.
I just got this thought , But dont know how to implement this in UNIX.
Is there a way to revoke access from... (17 Replies)
All,
I enabled PAM and aged a password, but when I login it asks me for the current password then says password unchanged after entering the current password. Is this a bug? My security dept is going to want me to enable password aging and I'm stuck!
Any help on what the issu is?
... (6 Replies)
Hello,
for an automated telnet login script I need to store a password on the server. Is there a possibility to store the password in an encrypted form and decrypt it every time the login is performed? Are there any ideas
Love, Sally (5 Replies)
I am trying to create a script that will report (email and ftp results) on any file, system wide, that has the word password= in it. (and any variation of password=). Basicaly looking for any plain text passwds. I figured the easiest way would be like this......
for i in `cat find-pw.dat`
do... (6 Replies)
Here is my new password generation script. The attachment, swordfish.txt, is in dos format. Remember that you need to use dos2unix or flip or something to get it into unix format.
The script is self documenting. It has an extensive help system built-in. And you can run:
swordfish "set... (8 Replies)
Hello, can anyone explain me please what do those lines do ?
From file .login
1) set history=40
2) setenv MACH `uname -s`
3) source /etc/login
4) source ~/$MACH/.login
From file .cshrc
1) if ( ! $?prompt) exit 0 (5 Replies)
Hi,
I have setup password less ssh connection between Server A and Server B and I am able to connect with User2.
But my requirement is, User 1 run a script in Server A to ssh into Server B as User 2 but it is asking password every time I execute.
Server A:
Login as User 1 and execute sh... (8 Replies)
hi to all, i have an AIX6.1 machine and i want to decrypt an ssha1 password written on /etc/security/passwd. the reason that i want to do that is because i have some complains about a few users that cannot login and receive the message for invalid login. i suspect that they are entering wrong... (15 Replies)