Hi:
I have been given the responsibility of administering AIX 3.1 machine in my lab recently. And, I am having trouble logging on to the machine using SSH through windous systems. Thus, now no one is able to access it!!
The following error message is displayed when I tried to login:
"The... (3 Replies)
hi,
i have red hat RHEL-5 on my machine, i ma trying to ssh login on remote machine
root@localhost~]# ssh ip_address(of remote machine)
it works fine if i know the password, i use wireless network so the ip keeps on changing,so is there any way to access the machine with some unique name, which... (1 Reply)
Hi Everyone..
User is not able to login using ssh whereas using telnet he is able to login in hp-ux. I checked for ssh configuration file but it is not configured for denying any user access.
What could be the problem? user is not allowed to use telnet.
Thanks.
Laxmikant (3 Replies)
Hi
I have a VPS with CentOS 5 installed and Kloxo v-6.1.4 as CP
Suddenly I am not able to login FTP and SSH
On FTP client I get the error: Could not connect to server
And
On Putty
Server unexpectedly closed the network connection
I have checked the /var/log/secure and /var/log/messages... (1 Reply)
why I can login by telnet using root account
but when i use login by ssh using root account
it is not successful ,is it different password
i am sure ssh service is started (2 Replies)
Hi,
I am trying to login Server2 from server1 in a shell script and need to perfrom few commands,
Below is the command i used to login to server2 from server1
ssh -l username server2
However everytime it executes it asking for password.
How do write a script in such way it takes... (1 Reply)
Dear all,
I have unknowingly deleted openssh-server on one of my linux boxes...
So I could not do ssh in to this machine and also could not scp to it.
Now I need to copy and install openssh-server in this box..
How could I do as both ssh and scp is not working.
Even FTP is also... (1 Reply)
Hello friends,
I have the problem with password less login in solaris 10.
Issue : In solaris 10 I have 2 different users on is oracle and the other is archmon. when I try to ssh to the other server from oracle it is successful but when I try to ssh from archmon it fails, and it asks for the... (1 Reply)
spawn ssh remotehost -l skysmart
when the password is incorrect, this will attempt to log in 2 more times, before it exits.
is there an option I can pass to ssh that'll make it try only once and will then abort immediately if the password is incorrect?
something like:
spawn ssh... (1 Reply)
I have a user account configuration with ssh public/private key that works on multiple servers centos and rhel. One server (Server F) that is not working in centos 6.8. When i ssh into server f I get prompted for a password. I have verified the config and it all is good. I put sshd into debug... (8 Replies)
Discussion started by: bash_in_my_head
8 Replies
LEARN ABOUT OSF1
secsetup
secconfig(8) System Manager's Manual secconfig(8)NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES RELATED INFORMATION acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)