Sponsored Content
Full Discussion: ssh login isue.
Operating Systems Solaris ssh login isue. Post 302348430 by bullz26 on Friday 28th of August 2009 08:04:33 AM
Old 08-28-2009
ssh login isue.

Hello Gurus,

In Solaris 8.

I am unable to login via ssh, but i could able to login via telnet without any issues.
I am geting the below error whenever i am trying to login via ssh

[ID 800047 auth.error] error: Could not get shadow information for NOUSER
sshd[4472]: [ID 800047 auth.error] error: Could not get shadow information for NOUSER
sshd[4477]: [ID 800047 auth.error] error: Could not get shadow information for NOUSER
sshd[5055]: [ID 800047 auth.error] error: Could not get shadow information for NOUSER
sshd[5174]: [ID 800047 auth.error] error: Could not get shadow information for NOUSER
 

10 More Discussions You Might Find Interesting

1. IP Networking

Home Network Netscape Isue on Sun Blade

I just got done configuring a Linksys Wireless - G Broadband Router. Model WRT54G. My PC is running XP and I have a Sun Blade 100 running Solaris 9 connected to the router. My PC is obviously getting out to the net :cool: , but I cant get my Solaris Netscape on the Sun Blade to get out on the... (3 Replies)
Discussion started by: BrewDudeBob
3 Replies

2. Shell Programming and Scripting

SSH login verification

I need to write a script that check users authenting to a particular server ssh -l if sucessfull echo loggin sucess else echo login invalid Any Suggestions ? (4 Replies)
Discussion started by: sriram003
4 Replies

3. UNIX for Dummies Questions & Answers

help with ssh login

hi, i have red hat RHEL-5 on my machine, i ma trying to ssh login on remote machine root@localhost~]# ssh ip_address(of remote machine) it works fine if i know the password, i use wireless network so the ip keeps on changing,so is there any way to access the machine with some unique name, which... (1 Reply)
Discussion started by: ankita tux
1 Replies

4. Red Hat

help with ssh login

hi, to ssh login i give the command.. root@localhost~] # ssh ip_add it allows me to login on a remote machine if i know the password, but i work on wireless network so the ip keeps on changing for the remote machine, how can i access that machine with some unique name , that does not changes.i... (3 Replies)
Discussion started by: ankita tux
3 Replies

5. Shell Programming and Scripting

ssh login help

I would like to login to host and once logged into host would like to run script. i.e "ssh hostname -l username /opt/share/scripts/vol" Can someone please have this run as script .. Many Thanks -sam (1 Reply)
Discussion started by: sam786
1 Replies

6. UNIX for Advanced & Expert Users

ssh and sudo login

Hi, I am trying to execute some command, via ssh and sudo. Here is what i want to do. ssh localhost | sudo su - ldaprole | ls -ltrh However, this command gives me listing of my home directory, and not of ldaprole. If I logic directly, when i perform sudo su - ldaprole, it... (5 Replies)
Discussion started by: john_prince
5 Replies

7. Ubuntu

ssh login cvs

Hello, I want to access a cvs server but I need to specify another user name i.e suppose that my user account is AAA and I can log on to the cvs server using another account BBB i.e AAA@local:~/Downloads$ ssh cvs Permission denied (publickey). But I can login to the system using... (1 Reply)
Discussion started by: fdc2suxs
1 Replies

8. HP-UX

telnet login successful ,but ssh can not login

why I can login by telnet using root account but when i use login by ssh using root account it is not successful ,is it different password i am sure ssh service is started (2 Replies)
Discussion started by: alert0919
2 Replies

9. Shell Programming and Scripting

ssh login

Hi, I am trying to login Server2 from server1 in a shell script and need to perfrom few commands, Below is the command i used to login to server2 from server1 ssh -l username server2 However everytime it executes it asking for password. How do write a script in such way it takes... (1 Reply)
Discussion started by: ch33ry
1 Replies

10. Shell Programming and Scripting

Getting ssh to try login only once

spawn ssh remotehost -l skysmart when the password is incorrect, this will attempt to log in 2 more times, before it exits. is there an option I can pass to ssh that'll make it try only once and will then abort immediately if the password is incorrect? something like: spawn ssh... (1 Reply)
Discussion started by: SkySmart
1 Replies
SYSTEM-AUTH-AC(5)						File Formats Manual						 SYSTEM-AUTH-AC(5)

NAME
system-auth-ac, password-auth-ac, smartcard-auth-ac, fingerprint-auth-ac, postlogin-ac - Common configuration files for PAMified services written by authconfig(8) SYNOPSIS
/etc/pam.d/system-auth-ac DESCRIPTION
The purpose of this configuration file is to provide common configuration file for all applications and service daemons calling PAM library. The system-auth configuration file is included from all individual service configuration files with the help of the include directive. When authconfig(8) writes the system PAM configuration file it replaces the default system-auth file with a symlink pointing to system-auth-ac and writes the configuration to this file. The symlink is not changed on subsequent configuration changes even if it points elsewhere. This allows system administrators to override the configuration written by authconfig. The authconfig now writes the authentication modules also into additional PAM configuration files /etc/pam.d/password-auth-ac, /etc/pam.d/smartcard-auth-ac, and /etc/pam.d/fingerprint-auth-ac. These configuration files contain only modules which perform authentica- tion with the respective kinds of authentication tokens. For example /etc/pam.d/smartcard-auth[-ac] will not contain pam_unix and pam_ldap modules and /etc/pam.d/password-auth[-ac] will not contain pam_pkcs11 and pam_fprintd modules. The file /etc/pam.d/postlogin-ac contains common services to be invoked after login. An example can be a module that encrypts an user's filesystem or user's keyring and is decrypted by his password. The PAM configuration files of services which are accessed by remote connections such as sshd or ftpd now include the /etc/pam.d/password- auth configuration file instead of /etc/pam.d/system-auth. EXAMPLE
Configure system to use pam_tally2 for configuration of maximum number of failed logins. Also call pam_access to verify if access is allowed. Make system-auth symlink point to system-auth-local which contains: auth requisite pam_access.so auth requisite pam_tally2.so deny=3 lock_time=30 unlock_time=3600 auth include system-auth-ac account required pam_tally2.so account include system-auth-ac password include system-auth-ac session include system-auth-ac BUGS
None known. SEE ALSO
authconfig(8), authconfig-gtk(8), pam(8), system-auth(5) Red Hat, Inc. 2010 March 31 SYSTEM-AUTH-AC(5)
All times are GMT -4. The time now is 07:46 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy