Sponsored Content
Full Discussion: ssh trail
Top Forums UNIX for Advanced & Expert Users ssh trail Post 302114970 by jgt on Thursday 19th of April 2007 09:18:07 PM
Old 04-19-2007
Wrong End

Why not add code to .profile on the target machines to record logon and logoff
times, and ip address that originated the request.
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Security Audit Trail

Dear Experts, I would like to know whether there are any tools available to view the Security Audit Trail files (SAT) in UNIX in a easier and customized way. If there is any similar type of S/W is available, please let me know. Thanks, Aswin (1 Reply)
Discussion started by: na100006
1 Replies

2. Shell Programming and Scripting

Is it possible to create audit trail on remote server using FTP

Hi, I'm automatically FTPing few files daily as a cron job to a remote server. I wanted to know if there is a way to log the successful transfer in a log on the remote server? The log on the remote server should look something like this. 10/30/2006 00:00:02 - File 1 transferred... (0 Replies)
Discussion started by: dayanand
0 Replies

3. UNIX for Dummies Questions & Answers

Audit Trail problems

I am trying to set up audit trail for our company server. (Mac OS X Server 10.3.9) We would like to record the activity of standard, non-administrative, users. We would like to record file creation, modification, deletion, among other things. We have installed the common criteria tools, but the... (3 Replies)
Discussion started by: iarnum
3 Replies

4. Shell Programming and Scripting

could not send commands SSH session with Net::SSH::Expect

I am using Net::SSH::Expect to connect to the device(iLO) with SSH. After the $ssh->login() I'm able to view the prompt, but not able to send any coommands. With the putty I can connect to the device and execute the commands without any issues. Here is the sample script my $ssh =... (0 Replies)
Discussion started by: hansini
0 Replies

5. Shell Programming and Scripting

Ssh = ssh expect and keep everything not change include parameter postion

I have write a script which contains ssh -p 12345 dcplatform@10.125.42.50 ssh 127.0.0.1 -p 5555 "$CMD" ssh root@$GUEST_IP "$CMD" before I use public key, it works well, now I want to change to "expect", BUT I don't want to change above code and "parameter position" I can post a... (1 Reply)
Discussion started by: yanglei_fage
1 Replies

6. UNIX for Dummies Questions & Answers

OS level audit trail for SSH?

Hi everyone, I have a situation where I need my personal account (say bob1) to login into a Red Hat 6 server, su to a system/application account (say app1) and kick off a script to do x,y and z. This isn't an issue. Now once I su- to the app1 account and kick-off the script this script then... (3 Replies)
Discussion started by: solomani
3 Replies

7. News, Links, Events and Announcements

Wine project and Oracle google trail over aoi copyright

Wine is a project that allow user to run windows apps on linux os. It does that by reimplementation of the windows api. However Oracle claim that API are copyrightable able and sue google for reimplementation of Java api. If they win, then wine project will be in the same problem. ... (0 Replies)
Discussion started by: programAngel
0 Replies

8. Shell Programming and Scripting

Script fro file check and load the trail file

Hi, Im going to use shell script for load the data into DB. First i need to read the trail file(csv file has two columns with comma separated ) like file name trail1024(last 4 digitsMMDD). In this trail file 27 entries will have like below,I need to read first csv file name and get the 4... (1 Reply)
Discussion started by: krajasekhar.v
1 Replies

9. UNIX for Beginners Questions & Answers

Ssh script to validate ssh connection to multiple serves with status

Hi, I want to validate ssh connection one after one for multiple servers..... password less keys already setup but now i want to validate if ssh is working fine or not... I have .sh script like below and i have servers.txt contains all the list of servers #/bin/bash for host in $(cat... (3 Replies)
Discussion started by: sreeram4
3 Replies
WPA_CLI(8)						    BSD System Manager's Manual 						WPA_CLI(8)

NAME
wpa_cli -- text-based frontend program for interacting with wpa_supplicant SYNOPSIS
wpa_cli [commands] DESCRIPTION
The wpa_cli utility is a text-based frontend program for interacting with wpa_supplicant(8). It is used to query current status, change con- figuration, trigger events, and request interactive user input. The wpa_cli utility can show the current authentication status, selected security mode, dot11 and dot1x MIBs, etc. In addition, wpa_cli can configure EAPOL state machine parameters and trigger events such as reassociation and IEEE 802.1X logoff/logon. The wpa_cli utility provides an interface to supply authentication information such as username and password when it is not provided in the wpa_supplicant.conf(5) configuration file. This can be used, for example, to implement one-time passwords or generic token card authentica- tion where the authentication is based on a challenge-response that uses an external device for generating the response. The wpa_cli utility supports two modes: interactive and command line. Both modes share the same command set and the main difference is in interactive mode providing access to unsolicited messages (event messages, username/password requests). Interactive mode is started when wpa_cli is executed without any parameters on the command line. Commands are then entered from the control- ling terminal in response to the wpa_cli prompt. In command line mode, the same commands are entered as command line arguments. The control interface of wpa_supplicant(8) can be configured to allow non-root user access by using the ctrl_interface_group parameter in the wpa_supplicant.conf(5) configuration file. This makes it possible to run wpa_cli with a normal user account. AUTHENTICATION PARAMETERS
When wpa_supplicant(8) needs authentication parameters, such as username and password, that are not present in the configuration file, it sends a request message to all attached frontend programs, e.g., wpa_cli in interactive mode. The wpa_cli utility shows these requests with a ``CTRL-REQ-<type>-<id>:<text>'' prefix, where <type> is IDENTITY, PASSWORD, or OTP (One-Time Password), <id> is a unique identifier for the current network, <text> is a description of the request. In the case of an OTP (One-Time Password) request, it includes the challenge from the authentication server. A user must supply wpa_supplicant(8) the needed parameters in response to these requests. For example, CTRL-REQ-PASSWORD-1:Password needed for SSID foobar > password 1 mysecretpassword Example request for generic token card challenge-response: CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar > otp 2 9876 COMMANDS
The following commands may be supplied on the command line or at a prompt when operating interactively. status Report the current WPA/EAPOL/EAP status for the current interface. mib Report MIB variables (dot1x, dot11) for the current interface. help Show usage help. interface [ifname] Show available interfaces and/or set the current interface when multiple are available. level debug_level Change the debugging level in wpa_supplicant(8). Larger numbers generate more messages. license Display the full license for wpa_cli. logoff Send the IEEE 802.1X EAPOL state machine into the ``logoff'' state. logon Send the IEEE 802.1X EAPOL state machine into the ``logon'' state. set [settings] Set variables. When no arguments are supplied, the known variables and their settings are displayed. pmksa Show the contents of the PMKSA cache. reassociate Force a reassociation to the current access point. reconfigure Force wpa_supplicant(8) to re-read its configuration file. preauthenticate BSSID Force preauthentication of the specified BSSID. identity network_id identity Configure an identity for an SSID. password network_id password Configure a password for an SSID. otp network_id password Configure a one-time password for an SSID. terminate Force wpa_supplicant(8) to terminate. quit Exit wpa_cli. SEE ALSO
wpa_supplicant.conf(5), wpa_supplicant(8) HISTORY
The wpa_cli utility first appeared in FreeBSD 6.0. AUTHORS
The wpa_cli utility was written by Jouni Malinen <j@w1.fi>. This manual page is derived from the README file included in the wpa_supplicant distribution. BSD
June 16, 2005 BSD
All times are GMT -4. The time now is 06:48 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy