Sponsored Content
Special Forums Cybersecurity Locked out of my own server by denyhosts Post 302378512 by dheian on Tuesday 8th of December 2009 04:25:57 AM
Old 12-08-2009
After pulling my hair out tonight, I realized that I can just head to a coffee shop tomorrow and SSH in from there to do the file edits. Still, the wait's killing me.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

root locked out

Hello all. I think I have a big problem. the /etc/passwd file got overwritten and now I can't su as root when I telnet into this machine. I am running yp on a different machine and tried to push the passwd file out to all machines, but it didn't help. I noticed that there is a passwd file in... (12 Replies)
Discussion started by: Moca4444
12 Replies

2. UNIX for Dummies Questions & Answers

OpenWin Locked up

I have a server that is on solaris 9 and openwin is locked. The mouse won't respond and I can't seem to kill the openwin pid on the server.. Is there a command line to kill openwin from the server side? (2 Replies)
Discussion started by: jphorton
2 Replies

3. UNIX for Dummies Questions & Answers

Users locked out of Server

hiya all, I have Fedora core 3 installed - as a server - onto an old PC. Root u/n and psw lets me in However, all the other accounts no longer worked. They use to work until yesterday... I now get the error at the login screen: "AUTHENTICATIONFAILED" I hope this is a common... (12 Replies)
Discussion started by: marty 600
12 Replies

4. HP-UX

locked out!

:confused: I have an K580 HP server. All I did was change the IP address on the NIC and now I can't telnet into it. I can ping, but no telnet. Also, it won't boot if the console monitor is plugged in. ANY IDEAS??? (1 Reply)
Discussion started by: ncmurf00
1 Replies

5. AIX

account is always locked out

we have a user name "Test1" that account is alwyas locked out. The user has been used to many servers to ftp a file from the main server. i already increase the MaxStartups to 99. And still after how many days account will locked. (3 Replies)
Discussion started by: invinzin21
3 Replies

6. Solaris

Server Locked

Hi i was changing the entry in the /etc/passwd file for the root user. i was changing the shell from sh to bash . I changed the file and rebooted the server.Now it is saying that invalid shell. I think i have misspelt bash. now the machine is set to boot in maultiuser mode so there is no... (5 Replies)
Discussion started by: asalman.qazi
5 Replies

7. UNIX for Advanced & Expert Users

Who locked my id?

I am running Solaris 10. Occasionally, my id gets loked. I want to know who/which rougue process locked it. How do I find out? Thanks, KNK (9 Replies)
Discussion started by: nkamatam
9 Replies

8. UNIX for Dummies Questions & Answers

Denyhosts displaying warning message for users blocked

Hi, I have a dilemma.I am running denyhosts on one of our servers and it monitors illegal ssh/ftp loggins. I am running vsftpd. My manager though has put an additional requirement on me. When someone is blocked my denyhosts he want an error message to be displayed: " YOUR ACCOUNT HAS BEEN... (0 Replies)
Discussion started by: mojoman
0 Replies

9. UNIX for Dummies Questions & Answers

I have files that are locked up...

Here's the story: I had an LaCie Internet Space (1TB)... Recently the network (or software) functions of the device just died... I tried to access it via different routers, checking UTP, tried everything possible to rule out physical damage to components. Then i got the disk out of its... (2 Replies)
Discussion started by: SentinelX
2 Replies

10. Solaris

Locked out of server due to utmp growing out of control

:(Dear Solaris Experts, The file /var/adm/utmpx is steadily growing on our standbye Sun Sparc T5220 Solaris 10 server. I have tried everything such as the following steps without success: root@rainbow # uname -a SunOS rainbow 5.10 Generic_141444-09 sun4v sparc... (2 Replies)
Discussion started by: gjackson123
2 Replies
denyhosts_selinux(8)					     SELinux Policy denyhosts					      denyhosts_selinux(8)

NAME
denyhosts_selinux - Security Enhanced Linux Policy for the denyhosts processes DESCRIPTION
Security-Enhanced Linux secures the denyhosts processes via flexible mandatory access control. The denyhosts processes execute with the denyhosts_t SELinux type. You can check if you have these processes running by executing the ps command with the -Z qualifier. For example: ps -eZ | grep denyhosts_t ENTRYPOINTS
The denyhosts_t SELinux type can be entered via the denyhosts_exec_t file type. The default entrypoint paths for the denyhosts_t domain are the following: /usr/bin/denyhosts.py PROCESS TYPES
SELinux defines process types (domains) for each process running on the system You can see the context of a process using the -Z option to ps Policy governs the access confined processes have to files. SELinux denyhosts policy is very flexible allowing users to setup their deny- hosts processes in as secure a method as possible. The following process types are defined for denyhosts: denyhosts_t Note: semanage permissive -a denyhosts_t can be used to make the process type denyhosts_t permissive. SELinux does not deny access to per- missive process types, but the AVC (SELinux denials) messages are still generated. BOOLEANS
SELinux policy is customizable based on least access required. denyhosts policy is extremely flexible and has several booleans that allow you to manipulate the policy and run denyhosts with the tightest access possible. If you want to allow users to resolve user passwd entries directly from ldap rather then using a sssd server, you must turn on the authlo- gin_nsswitch_use_ldap boolean. Disabled by default. setsebool -P authlogin_nsswitch_use_ldap 1 If you want to allow all daemons to write corefiles to /, you must turn on the daemons_dump_core boolean. Disabled by default. setsebool -P daemons_dump_core 1 If you want to enable cluster mode for daemons, you must turn on the daemons_enable_cluster_mode boolean. Enabled by default. setsebool -P daemons_enable_cluster_mode 1 If you want to allow all daemons to use tcp wrappers, you must turn on the daemons_use_tcp_wrapper boolean. Disabled by default. setsebool -P daemons_use_tcp_wrapper 1 If you want to allow all daemons the ability to read/write terminals, you must turn on the daemons_use_tty boolean. Disabled by default. setsebool -P daemons_use_tty 1 If you want to deny any process from ptracing or debugging any other processes, you must turn on the deny_ptrace boolean. Enabled by default. setsebool -P deny_ptrace 1 If you want to allow all domains to use other domains file descriptors, you must turn on the domain_fd_use boolean. Enabled by default. setsebool -P domain_fd_use 1 If you want to allow all domains to have the kernel load modules, you must turn on the domain_kernel_load_modules boolean. Disabled by default. setsebool -P domain_kernel_load_modules 1 If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default. setsebool -P fips_mode 1 If you want to enable reading of urandom for all domains, you must turn on the global_ssp boolean. Disabled by default. setsebool -P global_ssp 1 If you want to allow confined applications to run with kerberos, you must turn on the kerberos_enabled boolean. Enabled by default. setsebool -P kerberos_enabled 1 If you want to allow system to run with NIS, you must turn on the nis_enabled boolean. Disabled by default. setsebool -P nis_enabled 1 If you want to allow confined applications to use nscd shared memory, you must turn on the nscd_use_shm boolean. Disabled by default. setsebool -P nscd_use_shm 1 NSSWITCH DOMAIN
If you want to allow users to resolve user passwd entries directly from ldap rather then using a sssd server for the denyhosts_t, you must turn on the authlogin_nsswitch_use_ldap boolean. setsebool -P authlogin_nsswitch_use_ldap 1 If you want to allow confined applications to run with kerberos for the denyhosts_t, you must turn on the kerberos_enabled boolean. setsebool -P kerberos_enabled 1 MANAGED FILES
The SELinux process type denyhosts_t can manage files labeled with the following file types. The paths listed are the default paths for these file types. Note the processes UID still need to have DAC permissions. cluster_conf_t /etc/cluster(/.*)? cluster_var_lib_t /var/lib/pcsd(/.*)? /var/lib/cluster(/.*)? /var/lib/openais(/.*)? /var/lib/pengine(/.*)? /var/lib/corosync(/.*)? /usr/lib/heartbeat(/.*)? /var/lib/heartbeat(/.*)? /var/lib/pacemaker(/.*)? cluster_var_run_t /var/run/crm(/.*)? /var/run/cman_.* /var/run/rsctmp(/.*)? /var/run/aisexec.* /var/run/heartbeat(/.*)? /var/run/cpglockd.pid /var/run/corosync.pid /var/run/rgmanager.pid /var/run/cluster/rgmanager.sk denyhosts_var_lib_t /var/lib/denyhosts(/.*)? denyhosts_var_lock_t /var/lock/subsys/denyhosts net_conf_t /etc/hosts[^/]* /etc/yp.conf.* /etc/denyhosts.* /etc/hosts.deny.* /etc/resolv.conf.* /etc/sysconfig/networking(/.*)? /etc/sysconfig/network-scripts(/.*)? /etc/sysconfig/network-scripts/.*resolv.conf /etc/ethers /etc/ntp.conf root_t / /initrd FILE CONTEXTS
SELinux requires files to have an extended attribute to define the file type. You can see the context of a file using the -Z option to ls Policy governs the access confined processes have to these files. SELinux denyhosts policy is very flexible allowing users to setup their denyhosts processes in as secure a method as possible. STANDARD FILE CONTEXT SELinux defines the file context types for the denyhosts, if you wanted to store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. semanage fcontext -a -t denyhosts_exec_t '/srv/denyhosts/content(/.*)?' restorecon -R -v /srv/mydenyhosts_content Note: SELinux often uses regular expressions to specify labels that match multiple files. The following file types are defined for denyhosts: denyhosts_exec_t - Set files with the denyhosts_exec_t type, if you want to transition an executable to the denyhosts_t domain. denyhosts_initrc_exec_t - Set files with the denyhosts_initrc_exec_t type, if you want to transition an executable to the denyhosts_initrc_t domain. denyhosts_var_lib_t - Set files with the denyhosts_var_lib_t type, if you want to store the denyhosts files under the /var/lib directory. denyhosts_var_lock_t - Set files with the denyhosts_var_lock_t type, if you want to treat the files as denyhosts var lock data, stored under the /var/lock directory denyhosts_var_log_t - Set files with the denyhosts_var_log_t type, if you want to treat the data as denyhosts var log data, usually stored under the /var/log directory. Note: File context can be temporarily modified with the chcon command. If you want to permanently change the file context you need to use the semanage fcontext command. This will modify the SELinux labeling database. You will need to use restorecon to apply the labels. COMMANDS
semanage fcontext can also be used to manipulate default file context mappings. semanage permissive can also be used to manipulate whether or not a process type is permissive. semanage module can also be used to enable/disable/install/remove policy modules. semanage boolean can also be used to manipulate the booleans system-config-selinux is a GUI tool available to customize SELinux policy settings. AUTHOR
This manual page was auto-generated using sepolicy manpage . SEE ALSO
selinux(8), denyhosts(8), semanage(8), restorecon(8), chcon(1), sepolicy(8) , setsebool(8) denyhosts 14-06-10 denyhosts_selinux(8)
All times are GMT -4. The time now is 03:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy