01-15-2002
I am not really familiar with FreeBSD but most Unix systems have the concept of host.allow and hosts.deny which allow and deny hosts by IP or name respectively. You may want to check into this.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
hi,
i have in my /etc/group an unix group full.
i need to add new user in this group.
users need to have the same gid and the same name...
is it possible ?
can i create a concatenation with an other group or something else ?
thx (1 Reply)
Discussion started by: farzolito
1 Replies
2. UNIX for Dummies Questions & Answers
I have installed vnc on my computer but do not want every one to be able to incite a vncserver
how can I limit users of the vncserver command to only a specifc group? (1 Reply)
Discussion started by: macdonto
1 Replies
3. UNIX for Dummies Questions & Answers
I'm setting up a file server for users. Does anyone know how I can limit each users directory to 500MB?
--------------
Runing Solaris 8 (3 Replies)
Discussion started by: merlin
3 Replies
4. SCO
Hello Every One. :D
Can any 1 tell how to configure unix so that only specified IP's can connect to that machine using telnet. :rolleyes: I guess there is also sum stratgy to limit it by time. such as from 9 a.m to 5 p.m. :eek:
This is imp 4 me. plz help
Thanks
Shaikh Naveed
Islamabad.... (5 Replies)
Discussion started by: shaikh.naveed
5 Replies
5. AIX
Trying to limit 1 login per account...
Setup:
We have 2 auth logins, one to the AIX (telnet)then into a distribution mgmt software, the users do not have a shell to log into on the AIX itself, so placing a script such as:
active=`who | awk '{printf",%s,\n",$1}' | grep ,$LOGNAME, | wc -l`
... (0 Replies)
Discussion started by: pheusion
0 Replies
6. Shell Programming and Scripting
hello, i'm trying to figure out a way to limit the output from an SQL query that is counting the number of occurances of a value in a field and the problem is when i run this query against a huge file with many unique values the output is pretty huge.
Is there a way i can specifically LIMIT the... (2 Replies)
Discussion started by: bobk544
2 Replies
7. Shell Programming and Scripting
I am doing an ftp of around 1010 files and I am using mput for this. For some reason its only transferring 10 or 20 files and the rest are
not getting transferred. There is some socket error in the log. is there an issue if we have more than 50 or so files for mput.
here is the o/p in the log... (2 Replies)
Discussion started by: dsravan
2 Replies
8. Solaris
Hi all, I'm using to Solaris machine. When I run a simple script this messenger come out:"limit: stacksize: Can't remove limit". Any one know the way to resolve this problem without reboot the machine?
Thanks in advance. (3 Replies)
Discussion started by: Diabolist9
3 Replies
9. Solaris
Hi,
I can able to view the limit of ARG_MAX ENV variable using the command:
getconf ARG_MAX
can we modify the value of ARG_MAX somewhere or is that common value depending upon the version of kernel ? (1 Reply)
Discussion started by: penqueen
1 Replies
10. UNIX for Dummies Questions & Answers
// AIX 6.1 & Power 7 server
I have maxuproc set to 16384.
lsattr -El sys0 -a maxuproc
maxuproc 16384 Maximum number of PROCESSES allowed per user True
What is the maximum number of maxuproc we can go for?
If I increase maxuproc to the higher number, what would be ramifications?
I... (1 Reply)
Discussion started by: Daniel Gate
1 Replies
LEARN ABOUT DEBIAN
hosts.equiv
HOSTS.EQUIV(5) Linux Programmer's Manual HOSTS.EQUIV(5)
NAME
/etc/hosts.equiv - list of hosts and users that are granted "trusted" r command access to your system
DESCRIPTION
The hosts.equiv file allows or denies hosts and users to use the r-commands (e.g., rlogin, rsh or rcp) without supplying a password.
The file uses the following format:
[ + | - ] [hostname] [username]
The hostname is the name of a host which is logically equivalent to the local host. Users logged into that host are allowed to access
like-named user accounts on the local host without supplying a password. The hostname may be (optionally) preceded by a plus (+) sign. If
the plus sign is used alone it allows any host to access your system. You can explicitly deny access to a host by preceding the hostname
by a minus (-) sign. Users from that host must always supply a password. For security reasons you should always use the FQDN of the host-
name and not the short hostname.
The username entry grants a specific user access to all user accounts (except root) without supplying a password. That means the user is
NOT restricted to like-named accounts. The username may be (optionally) preceded by a plus (+) sign. You can also explicitly deny access
to a specific user by preceding the username with a minus (-) sign. This says that the user is not trusted no matter what other entries
for that host exist.
Netgroups can be specified by preceding the netgroup by an @ sign.
Be extremely careful when using the plus (+) sign. A simple typographical error could result in a standalone plus sign. A standalone plus
sign is a wildcard character that means "any host"!
FILES
/etc/hosts.equiv
NOTES
Some systems will only honor the contents of this file when it has owner root and no write permission for anybody else. Some exceptionally
paranoid systems even require that there be no other hard links to the file.
Modern systems use the Pluggable Authentication Modules library (PAM). With PAM a standalone plus sign is only considered a wildcard char-
acter which means "any host" when the word promiscuous is added to the auth component line in your PAM file for the particular service
(e.g., rlogin).
SEE ALSO
rhosts(5), rlogind(8), rshd(8)
COLOPHON
This page is part of release 3.44 of the Linux man-pages project. A description of the project, and information about reporting bugs, can
be found at http://www.kernel.org/doc/man-pages/.
Linux 2003-08-24 HOSTS.EQUIV(5)