06-16-2002
I use an AIX 4.3.3 box. root can only log in from the terminal.
The only way to get to root remotely is to log in using my id and su root. No other person can su root or log in to root remotely. With AIX there is an su log file that lists all attempt to su another id. When root logs in my ID is sent mail indicating the time and port of the login. Therefore I know if root is compromised. I then can search the su log files to see who attempted or sucessfully cracked my root password.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Ok heres the situation
I've been studying Solaris 8 for about 6 months now and some things click in my head but others don't.
One of the things that don't click are file permissions.
For example I login at work and I use the ls -l command to get a long listing of the files w/ the permissions.... (2 Replies)
Discussion started by: eloquent99
2 Replies
2. UNIX for Dummies Questions & Answers
Is it possible to set owner to a group? I need to have a group own a process, because there will be 3 diffrent persons that will start and stop this process. They can not use the same users cause och back logging. we need to know who end when a certian user start/stops processes. (1 Reply)
Discussion started by: dozy
1 Replies
3. UNIX for Dummies Questions & Answers
What does the following permission indicate?
-rwSr----- 1 oracle dba 1536 Nov 7 17:05 orapwRTMDB
Thanks,
Rahul. (1 Reply)
Discussion started by: rahulrathod
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
When I listed one directory in Sun, it showed that :
-rwsr-xr-x 1 root bsmbin 78004 Oct 21 2004 bsmprsm
I don't know meaning of the character "s" in "rws" above. I have searched in Sun admin documents but no result. Would you please explain it ? :)
Thank you so much. (1 Reply)
Discussion started by: msg098
1 Replies
5. UNIX for Dummies Questions & Answers
Hi all,
I created testuser. by following command.
/usr/sbin/adduser -n test -d /disk05/collections/GET/testdata/
and then set its password by following command.
passwd testuser
When I login to system by testuser, it enters everything is ok.
The problem is how to set permission to this... (3 Replies)
Discussion started by: mr_bold
3 Replies
6. Ubuntu
Pictures by worthamtx - Photobucket
The URL is graphic view my present concern. Old partition working great sdb1
both appear on nautilus, both deliver icons to desk top. Based on the label handling of gparted results I tried following with success
sudo mkdir /media/disk/data
sudo chown... (1 Reply)
Discussion started by: 77yrold
1 Replies
7. UNIX for Dummies Questions & Answers
Hello
Whenever we want to oen any type of file by name, we must have execute perm. in each
dir. mentioned in the name. I changed the dir permission using chmod to test the validity of this statement.
but i still can open the file
-------
any guides would be appreciable (2 Replies)
Discussion started by: dr_mabuse
2 Replies
8. UNIX for Dummies Questions & Answers
I dont understand why permission changes are being such a pain in the bum even after I manually changed them through properties....Anyone know what to do here because even thoguh in properties the permissions make me local admin over in the Cygwin its not working..
... (5 Replies)
Discussion started by: okhawaja
5 Replies
9. Linux
I am using korn shell
When I type in Telnet on cmd line, I get message
"cannot execute"
How can I get permission to execute command ? In which dir is telnet located ? I looked in /usr/bin dir. but its not there
Thanks (1 Reply)
Discussion started by: paramshamnani
1 Replies
10. Ubuntu
Trying to get date into the txt file.
It says
Permission denied.
echo $(date +%I:%M:%S_%D) >> /tmp/systemd_suspend_test_err.txt
exec 2>> /tmp/systemd_suspend_test_err.txt
if ; then
# Do the thing you want before suspend here
echo "we are suspending $(date +%I:%M:%S_%D)."
elif ;... (5 Replies)
Discussion started by: drew77
5 Replies
LEARN ABOUT CENTOS
pam_securetty
PAM_SECURETTY(8) Linux-PAM Manual PAM_SECURETTY(8)
NAME
pam_securetty - Limit root login to special devices
SYNOPSIS
pam_securetty.so [debug]
DESCRIPTION
pam_securetty is a PAM module that allows root logins only if the user is logging in on a "secure" tty, as defined by the listing in
/etc/securetty. pam_securetty also checks to make sure that /etc/securetty is a plain file and not world writable. It will also allow root
logins on the tty specified with console= switch on the kernel command line and on ttys from the /sys/class/tty/console/active.
This module has no effect on non-root users and requires that the application fills in the PAM_TTY item correctly.
For canonical usage, should be listed as a required authentication method before any sufficient authentication methods.
OPTIONS
debug
Print debug information.
noconsole
Do not automatically allow root logins on the kernel console device, as specified on the kernel command line or by the sys file, if it
is not also specified in the /etc/securetty file.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_SUCCESS
The user is allowed to continue authentication. Either the user is not root, or the root user is trying to log in on an acceptable
device.
PAM_AUTH_ERR
Authentication is rejected. Either root is attempting to log in via an unacceptable device, or the /etc/securetty file is world
writable or not a normal file.
PAM_INCOMPLETE
An application error occurred. pam_securetty was not able to get information it required from the application that called it.
PAM_SERVICE_ERR
An error occurred while the module was determining the user's name or tty, or the module could not open /etc/securetty.
PAM_USER_UNKNOWN
The module could not find the user name in the /etc/passwd file to verify whether the user had a UID of 0. Therefore, the results of
running this module are ignored.
EXAMPLES
auth required pam_securetty.so
auth required pam_unix.so
SEE ALSO
securetty(5), pam.conf(5), pam.d(5), pam(8)
AUTHOR
pam_securetty was written by Elliot Lee <sopwith@cuc.edu>.
Linux-PAM Manual 09/19/2013 PAM_SECURETTY(8)