11-19-2008
To me its clearly a trusted box but Im not to understand where he sees an issue:
Quote:
a) When we give wrong root password three times in a row, the root account has been disabled.
I dont know many root users knowing the box is trusted who would try 3 times in a row... usually at the 2nd attempt he would stop and think twice...
And yes even root is asked the old passwd, so if someone has changed it meanwhile not announcing it to his collegues you are looking for trouble...
Of course when you are a bit neurotic and suffer from amnesia (like me...) you work hard on alternatives e.g. replace the default value of attempts to 5, and make great usage of sudo... And most important (passwd has been changed and you dont know it ...) I grant myself (my users account) the possibility of shutdown/reboot the box...
9 More Discussions You Might Find Interesting
1. UNIX Desktop Questions & Answers
hi,
I have scripts which are running every 3 minutes. The scripts include connection to a database, using sqlplus. Sometimes, the connection fails (invalid username or password, locked user etc..) and the connection returns the error code, to the unix screen or to a file.
I want whenever there's... (2 Replies)
Discussion started by: krem
2 Replies
2. Linux
Hi all,
I am running an oracle application server but the problem is that the default port it is using is 7777 and if i want to make it port 80 i have to run the server as root which something i do not want to do. If i understand well to run on a port under 1024 the application needs root... (1 Reply)
Discussion started by: staind_art
1 Replies
3. HP-UX
Dear All..
I have an HP-UX server, i need to access it through certain port to run application.., but i cant access it,
I can login as root by using other port
Can anyone give me any advice how to see the list of active port? and how to block / unblock it??
Thankyou in advance
... (1 Reply)
Discussion started by: grimanda
1 Replies
4. Shell Programming and Scripting
Hi,
I have to write a program to compute the checksums of files
./script.sh
I wrote the program using bash and it took me forever since I am a beginner but it works very well.
I'm getting so close to the deadline and I realised today that actually I have to use normal Bourne shell... (3 Replies)
Discussion started by: pgarg1989
3 Replies
5. Shell Programming and Scripting
Dear Members,
I have a table REQUESTS in Oracle which has an attribute REQUEST_ACTION. The entries in REQUEST_ACTION are like, ME, MD, ND, NE etc.
I would like to create a script which will will call other scripts based on the request action.
Can we directly read from the REQUEST_ACTION... (2 Replies)
Discussion started by: Yoodit
2 Replies
6. AIX
Dear All
When I start the AIX(6100-06)audit subsystem.
the log will save in /audit/stream.out (or /audit/trail), but in default when /audit/stream.out to grow up to 150MB.
It will replace the original /audit/stream.out (or /audit/trail).
Then the /audit/stream.out become empty and... (2 Replies)
Discussion started by: nnnnnnine
2 Replies
7. Solaris
Hi everyone,
how i can configure a single audit service in the global zone for all zones, on solaris BSM.
I will be glad to hear back from you.
Thanks and Regards (3 Replies)
Discussion started by: ladondo
3 Replies
8. UNIX for Dummies Questions & Answers
Hi Guys,
Some of the websites are blocked in my office. And I know the root password.
I tried to unblock those sites.. Checkedcd /etc/modprobe.d
$ cat blacklist.conf
#
# Listing a module here prevents the hotplug scripts from loading it.
# Usually that'd be so that some other driver will... (8 Replies)
Discussion started by: Adhi
8 Replies
9. Red Hat
Dear All
We have one Centos Server on Asterisk platform.We are trying to open one particular site from client machines which is our client portal.We have to upload data on that.When we trying to open that site somewhere its blocking and not opening.We did tracert and found one router down... (3 Replies)
Discussion started by: Vaibhav.T
3 Replies
LEARN ABOUT NETBSD
pam_ksu
PAM_KSU(8) BSD System Manager's Manual PAM_KSU(8)
NAME
pam_ksu -- Kerberos 5 SU PAM module
SYNOPSIS
[service-name] module-type control-flag pam_ksu [options]
DESCRIPTION
The Kerberos 5 SU authentication service module for PAM provides functionality for only one PAM category: authentication. In terms of the
module-type parameter, this is the ``auth'' feature. The module is specifically designed to be used with the su(1) utility.
Kerberos 5 SU Authentication Module
The Kerberos 5 SU authentication component provides functions to verify the identity of a user (pam_sm_authenticate()), and determine whether
or not the user is authorized to obtain the privileges of the target account. If the target account is ``root'', then the Kerberos 5 princi-
pal used for authentication and authorization will be the ``root'' instance of the current user, e.g. ``user/root@REAL.M''. Otherwise, the
principal will simply be the current user's default principal, e.g. ``user@REAL.M''.
The user is prompted for a password if necessary. Authorization is performed by comparing the Kerberos 5 principal with those listed in the
.k5login file in the target account's home directory (e.g. /root/.k5login for root).
The following options may be passed to the authentication module:
debug syslog(3) debugging information at LOG_DEBUG level.
use_first_pass If the authentication module is not the first in the stack, and a previous module obtained the user's password, that password
is used to authenticate the user. If this fails, the authentication module returns failure without prompting the user for a
password. This option has no effect if the authentication module is the first in the stack, or if no previous modules
obtained the user's password.
try_first_pass This option is similar to the use_first_pass option, except that if the previously obtained password fails, the user is
prompted for another password.
SEE ALSO
su(1), syslog(3), pam.conf(5), pam(8)
BSD
May 15, 2002 BSD