Hi all,
I'm using Solaris 8 right now. Recently I've a task that needs to log down all unsuccessful login to a log for auditing purpose. What steps do I have to take to log down all login failure logs? Do I've to edit a certain file for it or done by the X-window mode?
BTW, do I have to... (2 Replies)
Hi Gang,
Running a script in AIX 5.3. Users wanted me to add a "confirm you want to run script, enter 'y' or 'n'" kind of thing... here is what I came up with:
#!/bin/sh
myfile=`basename "$1"`
dateNow=`date "+%m.%d.%Y.%H.%M.%S"` # Get current date
mydatedfile=$myfile.$dateNow... (2 Replies)
Hi Everybody,
I was wondering if it was possible for someone to gain access to my Perl CGI scripts before they are interpreted by Perl (mod_perl on apache2) i.e. getting a hold of my raw scripts and not the html output?
Let's say I use the DBI module where I have the hostname, user and... (2 Replies)
Hi All,
I am trying to send a mail from my application through SMTP in solaris 9 but unable to send a mail.Same code is able to send mail in Windows.
As unix has more security,So as per me,it is due to security reason..
So please let me know what I need to do to send a mail properly.
what... (5 Replies)
Hello,
One of the senior network admins at work told me that I should not hard code temp files into my scripts. Rather I should use the mktemp commands in the script to create them on the fly.
His argument was that if a malicious user knew the name of my temp files in the script they could... (6 Replies)
Hi all,
Can someone please help to provide solutions for below security-related Linux server issue?
Level : 2 UDP Constant IP Identification Field Fingerprinting Vulnerability
Level : 2 TCP Sequence Number Approximation Based Denial of Service
Level : 2 Operating System Detected
Level : 2... (1 Reply)
Hello,
I have issue with my Zimbra Mail Server 6.0.7. In that i have configured HTTPS for client login and for whole session. but it stills communicate in http based authentication. due to that some sniffing software are easily sniffing details.
So how do i configure completely HTTPS in... (3 Replies)
$ finger yeti
Login: yeti Name: yeti
Directory: /arpa/tz/y/yeti Shell: /bin/ksh
On since Wed Apr 2 15:24 (UTC) on pts/149
Mail last read Mon Mar 31 11:08 2014 (UTC)
No Plan.
Hi there,
I am trying to... (2 Replies)
Hi there,
I am trying to understanding the difference between X11, host- based versus user-based access controls. And how vulnerability can the X11 settings be and why it is recommended to turn it off. (1 Reply)
Discussion started by: alvinoo
1 Replies
LEARN ABOUT LINUX
auths
auths(1) User Commands auths(1)NAME
auths - print authorizations granted to a user
SYNOPSIS
auths [ user ...]
DESCRIPTION
The auths command prints on standard output the authorizations that you or the optionally-specified user or role have been granted. Autho-
rizations are rights that are checked by certain privileged programs to determine whether a user may execute restricted functionality.
Each user may have zero or more authorizations. Authorizations are represented by fully-qualified names, which identify the organization
that created the authorization and the functionality that it controls. Following the Java convention, the hierarchical components of an
authorization are separated by dots (.), starting with the reverse order Internet domain name of the creating organization, and ending with
the specific function within a class of authorizations.
An asterisk (*) indicates all authorizations in a class.
A user's authorizations are looked up in user_attr(4) and in the /etc/security/policy.conf file (see policy.conf(4)). Authorizations may be
specified directly in user_attr(4) or indirectly through prof_attr(4). Authorizations may also be assigned to every user in the system
directly as default authorizations or indirectly as default profiles in the /etc/security/policy.conf file.
EXAMPLES
Example 1: Sample output
The auths output has the following form:
example% auths tester01 tester02
tester01 : solaris.system.date,solaris.jobs.admin
tester02 : solaris.system.*
example%
Notice that there is no space after the comma separating the authorization names in tester01.
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
FILES
/etc/user_attr
/etc/security/auth_attr
/etc/security/policy.conf
/etc/security/prof_attr
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO profiles(1), roles(1), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5)SunOS 5.10 25 Mar 2004 auths(1)