Please post the exact complete and total statement from your stated source and state the exact and complete and total list of relevant software you are running in this context and describe in exact and complete and total detail regarding which software is under the spotlight in today's "server hardening" exercise.
Please, please, please do not relay your own understanding of this issue but the complete and total detail of this issue.
Can you please elaborate in simple statement?Which software you are talking about.
I m doing linux server hardening regardless of any document but online stuff.
As i m new to linux i m posting it under linux newbie section.Please give me some time to fully understand the environment.
However as you can see i have done something to make it work and here just evaluating whether it is correct or not?
---------- Post updated at 07:07 AM ---------- Previous update was at 07:04 AM ----------
Quote:
Originally Posted by thegeek
Frame the find command, as u require.
Everywhere
Only directories ( if both files dont mention )
root owned files
permission bits
Thanks that was very helpful i will keep this in mind.
I am trying to write a CGI program which accesses UNIX configuration files and changes them as required.
The thing is, I don't want the CGI program to be "root" owned - it's Perl based! Is there any way that the Perl CGI program can request a username and password - and then use this to... (1 Reply)
Hi Group,
Could someone tell me how to find world writable files on my server? I can use find command in conjuction with -perm option and I will get an output. But what I need is an output which looks similar to ls -l output. Meaning, it should give me the full path of the file along with the... (1 Reply)
Hello,
i just wanted to know how do i find out the list of users whose terminal is writable?i mean i used
who -T
but this gives a list of all users whose terminal is writable or blocked and not writable. So how do i do this?I am new to Unix. (2 Replies)
I've tried to figure this out.
I'm only about 6 mos into my AIX admin duties, but I've got a "security" problem I can't figure out.
I've created a sub directory as follows:
drwx------ 2 root system 256 Apr 13 16:02 mike
I've logged in another session with the following user:
$ id... (2 Replies)
Hi,
I want to know if the is a way I can list the directories owned by a given user. Say i am logged in as that user.
I found out the find command lists the files owned by a certain user/group
but i want to know only the directories and if possible the permissions associated with these... (6 Replies)
Good day. I was looking at implementing a chroot environment using openssh. I know I can use the sshd_config file and dictate that it is to use chroot for a specific directory for a user/group. However, the issue with this is that it is has to be root owned. To my knowledge, there is no mount... (0 Replies)
Hi
I'm logged in to an AIX box now and we need to do an audit on this box.
cbssapr01:# pwd
/
Which command will show all the files and directories owned by root user with permissions as 777 ? (8 Replies)
Hello.
On my family laptop, I have a directory named /local.
It is owned by root.
I want to create a sub-directory named documents ( /local/documents ).
I want to exclude exec for every body in that directory
I want every authenticated linux user can create a sub directory ( ie :... (7 Replies)
what is wrong with this script?
I get:
./perm.sh: command substitution: line 21: unexpected EOF while looking for matching `"'
./perm.sh: command substitution: line 22: syntax error: unexpected end of file
Script:
#!/bin/bash
for dir in `/bin/cat /etc/passwd | /bin/egrep -v... (4 Replies)
I want to zip up my fstab file for backup purposes.
This does not work because of permission issues.
cd /etc/
zip -u fstab.zip fstab
Can I use this with zip?
echo xxx | sudo -S
or change fstab owner to me? (3 Replies)
Discussion started by: drew77
3 Replies
LEARN ABOUT LINUX
pam_securetty
PAM_SECURETTY(8) Linux-PAM Manual PAM_SECURETTY(8)NAME
pam_securetty - Limit root login to special devices
SYNOPSIS
pam_securetty.so [debug]
DESCRIPTION
pam_securetty is a PAM module that allows root logins only if the user is logging in on a "secure" tty, as defined by the listing in
/etc/securetty. pam_securetty also checks to make sure that /etc/securetty is a plain file and not world writable.
This module has no effect on non-root users and requires that the application fills in the PAM_TTY item correctly.
For canonical usage, should be listed as a required authentication method before any sufficient authentication methods.
OPTIONS
debug
Print debug information.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_SUCCESS
The user is allowed to continue authentication. Either the user is not root, or the root user is trying to log in on an acceptable
device.
PAM_AUTH_ERR
Authentication is rejected. Either root is attempting to log in via an unacceptable device, or the /etc/securetty file is world
writable or not a normal file.
PAM_INCOMPLETE
An application error occurred. pam_securetty was not able to get information it required from the application that called it.
PAM_SERVICE_ERR
An error occurred while the module was determining the user's name or tty, or the module could not open /etc/securetty.
PAM_USER_UNKNOWN
The module could not find the user name in the /etc/passwd file to verify whether the user had a UID of 0. Therefore, the results of
running this module are ignored.
EXAMPLES
auth required pam_securetty.so
auth required pam_unix.so
SEE ALSO securetty(5), pam.conf(5), pam.d(5), pam(7)AUTHOR
pam_securetty was written by Elliot Lee <sopwith@cuc.edu>.
Linux-PAM Manual 06/04/2011 PAM_SECURETTY(8)