Sponsored Content
Top Forums Shell Programming and Scripting Help Needed with 1 liner AWK statement Post 302338925 by jroberson on Wednesday 29th of July 2009 09:33:24 AM
Old 07-29-2009
An example would be the following:

> Policy Category: Access Control
> Check Name: Access server unrestricted
> Risk Level: Low
> CVE Reference: CVE-NO-MATCH
> Description: Verify that the "Access server" field has been restricted to specific groups and users that should have access to the server.
> Summary: The Access server field specifies which names have specifically been given access to communicate to the server. When the list of names in the Access server field is empty, the server assumes any user not in the deny list is granted access.
> Overview: The "Access server" list specifies which names have specifically been given access to communicate to the server. When the server access list is empty, the server assumes any user not in the deny list is granted access. The server access list works hand in hand with the "Not access server" list and the "Only Allow Access to Users in Directory" (OAAUD) option.

The "Not access server" list will override the "Access server" list. Any user or group listed will be denied access regardless of whether it is also in the "Access server" list.

The "Access server" list will override the OAAUD option. Thus , if the OAAUD option is set, even if a remote server is not listed in the server's directory, if that server is in the "Access server" list it will still be granted access.

Although it is not always necessary, it is recommended that the "Access server" list not be left to allow all user to access the server, but rather be filled out to specify all groups and servers that should have access to the server. This will prevent certain user administration errors from causing an unauthorized user to gain access to the server.
> Recommendation/Fix: To restrict the names allowed access to the server, perform the following steps:

1) Open the Domino Administrator client.
2) Select the menu item "File->Open Server" to access the server to edit.
3) Within the "Configuration" tab click on the "Server" option on the left side of the screen.
4) Under "Server" click on "Current Server Document".
5) Click on the "Security" tab within the server document.
6) Find the "Access Server" list under the "Server Access" section.
7) Enter the groups and servers allowed to access the server.
8) Save the document changes.

As part of a complete database security and compliance program, industry best practices recommend monitoring for known vulnerabilities. Commonly referred to as a compensating control, real-time activity monitoring ensures that databases are protected during the gap in time between discovery of a vulnerability and mitigation of that vulnerability. It is recommended that organizations deploy DbProtect's activity monitoring functionality to ensure the highest level of database security.
> Reference: IBM Search results - United States
> Version Affected: All versions of Domino Server

The output should be the following:

Policy Cat Risk Level Description Summary Recommendation
======== ======= ======== ======= ============


I plan to import the results in an excel spreadsheet.

Thanks!
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

awk one liner

input a 100 200 300 b 400 10 output a 100 a 200 a 300 b 400 b 10 Thanx (6 Replies)
Discussion started by: repinementer
6 Replies

2. UNIX for Advanced & Expert Users

one liner needed

Hi I have a file say (a.txt) which has following a.txt ---- $$var1=Tom $$var2=Kim I need a one liner which searches the file(a.txt) for $$var1 and returns the value in it(Tom). Thanks in advance Ammu (7 Replies)
Discussion started by: ammu
7 Replies

3. UNIX for Dummies Questions & Answers

awk one liner

I need a one liner to" find /pattern/ print from x lines before "pattern" to y lines after "pattern" (3 Replies)
Discussion started by: kenneth.mcbride
3 Replies

4. Shell Programming and Scripting

combine 2 awks statement into 1 liner

Using these 2 comands to concatenate both outputs into single file: cat testdata | awk 'BEGIN { FS="\n"; RS=""; } /<pattern1>/ {print}' > testdata1 cat testdata| awk '/<pattern2>/,EOF' >> testdata1 is it possible to combine both "awk" into 1-liner? pls advise and thanks in advance. (5 Replies)
Discussion started by: ux4me
5 Replies

5. Shell Programming and Scripting

Clarification needed for a SED one liner

I want to use SED to replace all new line characters of a file, I googled and found this one liner sed '{:q;N;s/\n//g;t q}' infile what do :q;N; and t q mean in this script? (6 Replies)
Discussion started by: kevintse
6 Replies

6. UNIX for Dummies Questions & Answers

need an awk one liner

example input file: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 (3 Replies)
Discussion started by: kenneth.mcbride
3 Replies

7. Shell Programming and Scripting

Search & Replace regex Perl one liner to AWK one liner

Thanks for giving your time and effort to answer questions and helping newbies like me understand awk. I have a huge file, millions of lines, so perl takes quite a bit of time, I'd like to convert these perl one liners to awk. Basically I'd like all lines with ISA sandwiched between... (9 Replies)
Discussion started by: verge
9 Replies

8. Shell Programming and Scripting

HELP with AWK one-liner. Need to employ an If condition inside AWK to check for array variable ?

Hello experts, I'm stuck with this script for three days now. Here's what i need. I need to split a large delimited (,) file into 2 files based on the value present in the last field. Samp: Something.csv bca,adc,asdf,123,12C bca,adc,asdf,123,13C def,adc,asdf,123,12A I need this split... (6 Replies)
Discussion started by: shell_boy23
6 Replies

9. Shell Programming and Scripting

awk one liner

The below code is a simple modified sample from a file with millions of lines containing hundreds of extra columns xxx="yyy" ... <app addr="1.2.3.4" rem="1000" type="aaa" srv="server1" usr="user1"/> <app usr="user2" srv="server2" rem="1001" type="aab" addr="1.2.3.5"/>What's the most efficient awk... (2 Replies)
Discussion started by: cabrao
2 Replies

10. Shell Programming and Scripting

Convert Update statement into Insert statement in UNIX using awk, sed....

Hi folks, I have a scenario to convert the update statements into insert statements using shell script (awk, sed...) or in database using regex. I have a bunch of update statements with all columns in a file which I need to convert into insert statements. UPDATE TABLE_A SET COL1=1 WHERE... (0 Replies)
Discussion started by: dev123
0 Replies
XHOST(1)                                                      General Commands Manual                                                     XHOST(1)

NAME
xhost - server access control program for X SYNOPSIS
xhost [[+-]name ...] DESCRIPTION
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environ- ment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based mechanism or use the hooks in the protocol for passing other authentication data to the server. OPTIONS
Xhost accepts the following command line options described below. For security, the options that affect access control may only be run from the "controlling host". For workstations, this is the same machine as the server. For X terminals, it is the login host. -help Prints a usage message. [+]name The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a host name or a complete name (See NAMES for more details). -name The given name is removed from the list of allowed to connect to the server. The name can be a host name or a complete name (See NAMES for more details). Existing connections are not broken, but new connection attempts will be denied. Note that the current machine is allowed to be removed; however, further connections (including attempts to add it back) will not be permitted. Reset- ting the server (thereby breaking all connections) is the only way to allow local connections again. + Access is granted to everyone, even if they aren't on the list (i.e., access control is turned off). - Access is restricted to only those on the list (i.e., access control is turned on). nothing If no command line arguments are given, a message indicating whether or not access control is currently enabled is printed, fol- lowed by the list of those allowed to connect. This is the only option that may be used from machines other than the controlling host. NAMES
A complete name has the syntax ``family:name'' where the families are as follows: inet Internet host (IPv4) inet6 Internet host (IPv6) dnet DECnet host nis Secure RPC network name krb Kerberos V5 principal local contains only one name, the empty string si Server Interpreted The family is case insensitive. The format of the name varies with the family. When Secure RPC is being used, the network independent netname (e.g., "nis:unix.uid@domainname") can be specified, or a local user can be specified with just the username and a trailing at-sign (e.g., "nis:pat@"). For backward compatibility with pre-R6 xhost, names that contain an at-sign (@) are assumed to be in the nis family. Otherwise they are assumed to be Internet addresses. If compiled to support IPv6, then all IPv4 and IPv6 addresses returned by getaddrinfo(3) are added to the access list in the appropriate inet or inet6 family. The local family specifies all the local connections at once. However, the server interpreted address "si:localuser:username" can be used to specify a single local user. (See the Xsecurity(7) manual page for more details.) Server interpreted addresses consist of a case-sensitive type tag and a string representing a given value, separated by a colon. For exam- ple, "si:hostname:almas" is a server interpreted address of type hostname, with a value of almas. For more information on the available forms of server interpreted addresses, see the Xsecurity(7) manual page. The initial access control list for display number n may be set by the file /etc/Xn.hosts, where n is the display number of the server. See Xserver(1) for details. DIAGNOSTICS
For each name added to the access control list, a line of the form "name being added to access control list" is printed. For each name removed from the access control list, a line of the form "name being removed from access control list" is printed. SEE ALSO
X(7), Xsecurity(7), Xserver(1), xdm(1), xauth(1), getaddrinfo(3) ENVIRONMENT
DISPLAY to get the default host and display to use. BUGS
You can't specify a display on the command line because -display is a valid command line argument (indicating that you want to remove the machine named ``display'' from the access list). The X server stores network addresses, not host names, unless you use the server-interpreted hostname type address. If somehow you change a host's network address while the server is still running, and you are using a network-address based form of authentication, xhost must be used to add the new address and/or remove the old address. AUTHORS
Bob Scheifler, MIT Laboratory for Computer Science, Jim Gettys, MIT Project Athena (DEC). X Version 11 xhost 1.0.5 XHOST(1)
All times are GMT -4. The time now is 06:11 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy