11-10-2010
As I understand it, you're trying to login with a password noninteractively? These commands read from /dev/tty as a security feature, to prevent people from being able to login with stored plaintext passwords. In other words, a less-than-subtle hint that you're not supposed to be using stored passwords to login.
Would it be possible to use ssh for this? It supports noninteractive login methods such as keys. Or configure your system to let you and only you login to one and only one specific thing without a password via the sudo utility.
Worst case, if you absolutely must, you might be able to fool it with things like the expect tool, but this is convoluted and very hard to make secure.
This User Gave Thanks to Corona688 For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
When it proccesing the backup with cpio report this message: Cannot open "/dev/tty" and cancel de backup.
Cuando se procesa la tarea del backup reporta el error: Cannot open "/dev/tty" y cancela el backup y no termina correctamente, a que se devera esta advertencia.
Gracias.
Thacks.... (3 Replies)
Discussion started by: cmr88
3 Replies
2. Solaris
Hi, Anyone can help
My solaris 8 system has the following
/dev/null , /dev/tty and /dev/console
All permission are lrwxrwxrwx
Can this be change to a non-world write ??
any impact ?? (12 Replies)
Discussion started by: civic2005
12 Replies
3. Programming
hello all,
Being root, I would like to log user activity (also multiple root activity), i don't really like
history file based logging, lets assume that users have access to their .profile.
I would like to write a monitoring daemon in C that would capture /dev/ttys,
so I need to do a... (0 Replies)
Discussion started by: wayward
0 Replies
4. SCO
Hi,
I'm new here, so please dont shoot me if I forgot something :)
Some SCO box we've (our company) got recently from a new customer runs an app that hangs the entire box every once in a while.
Today when an admin tried to start the db we got this error:
$ dbstart
dbstart: line 22: cannot... (6 Replies)
Discussion started by: necron
6 Replies
5. Programming
Since the existence of /dev/tty is not guaranteed, what happens when an attempt is made to open /dev/tty and there's no controlling terminal?
Will it fail, or open /dev/null instead? Or do something else?
So is checking for NULL in the code below a safe way of checking whether opening... (2 Replies)
Discussion started by: gencon
2 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I need to provide more than one character to "> /dev/tty" through terminal/keyboard input, I have this:
ok=false
while
do
echo " Enter r1 to reformat "
> /dev/tty
read choice
case $choice in
)
echo " bla bla bla "
;;
done
However, in this way,... (3 Replies)
Discussion started by: Gery
3 Replies
7. UNIX for Dummies Questions & Answers
what can I use to find the last modified time of a /dev/tty ? (4 Replies)
Discussion started by: l flipboi l
4 Replies
8. Solaris
Hi
i need to install a software into a zone, and this kind of software needs to have a file who is linked into /dev.
But it is not possible to create a link into /dev nor create a file into it.
-bash-3.00# ln -s /tmp/testfile /dev/
ln: cannot create /dev//testfile: Permission denied... (2 Replies)
Discussion started by: beta17
2 Replies
9. UNIX for Dummies Questions & Answers
hi,
From the below script:
##########################################pwd_auth.sh########################################################################################
#Author: Pandeeswaran Bhoopathy
#Written on:26th Jan 2012 2:00PM
#This script describes the feature of stty and illustrates... (3 Replies)
Discussion started by: pandeesh
3 Replies
10. Shell Programming and Scripting
Suppose another person wrote the following one-line shell script:
echo $RANDOM > /dev/tty
QUESTION #1: How can the random number, which is output to the terminal by this script, be captured in a variable?
QUESTION #2: How can this be done in a cron job?
Specific code, whether in ksh or... (1 Reply)
Discussion started by: Paul R
1 Replies
dialups(4) Kernel Interfaces Manual dialups(4)
NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO
login(1), passwd(4).
dialups(4)