10-18-2007
As the response says, you need to be root to do this.
So you first need to enable the root account and set password, try something like
Enabling and using the "root" user in Mac OS X
Then you need to login as root somehow.
You can then either do "su -" to get to root, or alternatively try "ssh root@127.0.0.1".
10 More Discussions You Might Find Interesting
1. IP Networking
Im very new to unix.. I want to view the route table whats the command. (1 Reply)
Discussion started by: jhale123
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I'm trying to connect to a network device, with the connection follwoing the UNIX routing table we set up. Its to go via a specific network Gateway and out throught a specific Lan card (Lan4). However when trying to conenct it keeps going through Lan3 and will not get to its destination.... (3 Replies)
Discussion started by: nhatch
3 Replies
3. UNIX for Dummies Questions & Answers
I am trying to install a new AIX server and I am migrating off of an older AIX server. Does anyone have a quick and easy method for getting the static route information from the old server so I can just maybe copy a file over to the new server ? (1 Reply)
Discussion started by: Docboyeee
1 Replies
4. IP Networking
hi all,
how to access ip routing table throgh program,
how should i integrate my rip routing table with the ip routing table :) (0 Replies)
Discussion started by: vinodkumar
0 Replies
5. IP Networking
hi all...
i need to know, where is locate the routing table on sun solaris, how i can saved the configuration....
because when i restart the server, lost the configuration....
thank you...
Regards... (3 Replies)
Discussion started by: chanfle
3 Replies
6. AIX
Hi,
IBM Server with AIX 5.2. I have already added a static route for a whole network but everyday some automatic routes to hosts adds up in route table of this server, some of which invalid routes that stops communication of server to that network. If these invalid routes are removed from route... (0 Replies)
Discussion started by: system-admin
0 Replies
7. IP Networking
Hi all,
I am confusing with routing table, i use linux and iptables.
i have 1 internet gateway, and 1 router for VPN.
here is my network.
eth0=192.168.0.1
eth1=192.168.100.1
192.168.0.0/24 --- eth0(Linux Box)eth1 ---(DSL)---Internet
|
... (4 Replies)
Discussion started by: blesets
4 Replies
8. Linux
Hello,
how to make entries in routing table perminent (1 Reply)
Discussion started by: teenasuresh
1 Replies
9. Solaris
how do I make sure that the entry in the routing table on Solaris 8 stay permanent after rebooting the server.
For example
route add 172.20.1.60 -netmask 255.255.255.0 172.20.255.253
Each time the server reboots the entry disappears when using the command netstat -nr (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
10. UNIX for Dummies Questions & Answers
Hi all. Linux noob here.
I was hoping someone could help me with configuring some routing rules on my router, an Asus AC68.
The router is connected to two gateways, wan0_gateway and wan1_gateway.
I have rules set up in the router gui that will push all traffic from every IP other than my own... (0 Replies)
Discussion started by: Bishi
0 Replies
LEARN ABOUT NETBSD
pam_ksu
PAM_KSU(8) BSD System Manager's Manual PAM_KSU(8)
NAME
pam_ksu -- Kerberos 5 SU PAM module
SYNOPSIS
[service-name] module-type control-flag pam_ksu [options]
DESCRIPTION
The Kerberos 5 SU authentication service module for PAM provides functionality for only one PAM category: authentication. In terms of the
module-type parameter, this is the ``auth'' feature. The module is specifically designed to be used with the su(1) utility.
Kerberos 5 SU Authentication Module
The Kerberos 5 SU authentication component provides functions to verify the identity of a user (pam_sm_authenticate()), and determine whether
or not the user is authorized to obtain the privileges of the target account. If the target account is ``root'', then the Kerberos 5 princi-
pal used for authentication and authorization will be the ``root'' instance of the current user, e.g. ``user/root@REAL.M''. Otherwise, the
principal will simply be the current user's default principal, e.g. ``user@REAL.M''.
The user is prompted for a password if necessary. Authorization is performed by comparing the Kerberos 5 principal with those listed in the
.k5login file in the target account's home directory (e.g. /root/.k5login for root).
The following options may be passed to the authentication module:
debug syslog(3) debugging information at LOG_DEBUG level.
use_first_pass If the authentication module is not the first in the stack, and a previous module obtained the user's password, that password
is used to authenticate the user. If this fails, the authentication module returns failure without prompting the user for a
password. This option has no effect if the authentication module is the first in the stack, or if no previous modules
obtained the user's password.
try_first_pass This option is similar to the use_first_pass option, except that if the previously obtained password fails, the user is
prompted for another password.
SEE ALSO
su(1), syslog(3), pam.conf(5), pam(8)
BSD
May 15, 2002 BSD