Sponsored Content
Full Discussion: Telnet for AIX 5.3
Operating Systems AIX Telnet for AIX 5.3 Post 302547223 by shinnee on Sunday 14th of August 2011 09:24:18 PM
Old 08-14-2011
Hi h@foorsa.biz,

thanks for your advice. May I know what are the possible ways for me to access the Weblogic svr files so I can edit to enable the FTP and telnet. As for now, I can access my Oracle svr phyiscally and remotely. But for my Weblogic svr, I can't change the my display to Weblogic svr as the display is only for the Oracle svr. So I can say before all this issue happened, I accessed the Weblogic svr thru remote from my Windows Server using Putty. And also, SSH on the servers are not installed/configured. So I need to know are there any other possible ways to access that Weblogic svr. Currently what I know the Security Hardening script disable ftp, telnet, rlogin, shell, uucp. Thanks in advance.
 

10 More Discussions You Might Find Interesting

1. AIX

telnet problem in aix

Can somebody help me. Whenever I telnet to my server i received a message /dev/pts/0: 3004-004 You must "exec" login from the lowest login shell. Connection closed. pls help me (2 Replies)
Discussion started by: vjm
2 Replies

2. AIX

aix telnet disconnects

We're having problems getting disconnected from AIX with our telnet sessions. I can't ping the server when this happens, either. Other serves can be pinged at the same time. This happens both at unix and within the database. Database locks remain when editing files. unix logins remain after... (0 Replies)
Discussion started by: e1lyons
0 Replies

3. AIX

How to turn off telnet on AIX

Greetings. . .Can anyone out there explain how I would turn off the telnet service and close the telnet port on a AIX system? Thank you, outta. (2 Replies)
Discussion started by: outtacontrol
2 Replies

4. UNIX for Dummies Questions & Answers

how to stop telnet access to AIX box

how do I remove telnet access to my AIX (5.3) machine? I just want people (admins) to connect to the box using ssh? Thanks. (2 Replies)
Discussion started by: johnbrickell
2 Replies

5. UNIX for Dummies Questions & Answers

Telnet Session to AIX

Hello, I have AIX 5.3 at home connected to netgear router. Port Forwarding has been enabled on the router. Problem is that if I want to telnet, I have to try 2 or 3 times before I can get a logon prompt. It times out for first or second time (Connection to session <IP_Address> failed: Connection... (1 Reply)
Discussion started by: bluebee
1 Replies

6. AIX

AIX 4 and telnet

I have a very old IBM server running AIX 4 and it runs our old inventory management software. The system was working fine until we had a recent power outage. When the machine came back on, everything seems to work fine, except telnet. The machine pings fine, but telnet says connection is... (10 Replies)
Discussion started by: shudson105
10 Replies

7. AIX

xp to aix - telnet blank screen

hello, i am trying to test connection to a 5.3 box. from an xp machine, telnet connects but shows only a blank screen. cursor moves as i type, but no response back. have used telnet, putty and accuterm - all same result verified that telnet services are active in xp xp windoze firewall is... (10 Replies)
Discussion started by: allenhibbert
10 Replies

8. AIX

I am a NEW Dummy here(AIX telnet)

I work for a health care company part of my job is to run checks we use a telnet session that we use AIX 6 commands. I have almost no programming experience but i want to learn it, we have a programmer here but he has no time my question is,, Is there anything that allows you to program a GUI... (7 Replies)
Discussion started by: jtechie3
7 Replies

9. AIX

Can we secure telnet on AIX

Hi, I understand that, we can use SSH/SSL for encrypted/secure sessions. my question is " can we secure telnet on AIX " ? usually, we disable network services like ftp, telnet etc. and replace it with SFTP, SSH. is there a way to secure telnet without disabling it ? i found some... (3 Replies)
Discussion started by: system.engineer
3 Replies

10. UNIX for Beginners Questions & Answers

Telnet command on AIX

Hello, I need to verify whether I am able to make connection to a remote server from my AIX (os level : 7.1.0.0) host. The host has 2 Alias IP's how can I force an source Alias IP on the telnet command. I tried the below options but none of them worked. Is there any other command that... (6 Replies)
Discussion started by: rosebud123
6 Replies
HARDENING-CHECK(1)					User Contributed Perl Documentation					HARDENING-CHECK(1)

NAME
hardening-check - check binaries for security hardening features SYNOPSIS
hardening-check [options] [ELF ...] Examine a given set of ELF binaries and check for several security hardening features, failing if they are not all found. DESCRIPTION
This utility checks a given list of ELF binaries for several security hardening features that can be compiled into an executable. These features are: Position Independent Executable This indicates that the executable was built in such a way (PIE) that the "text" section of the program can be relocated in memory. To take full advantage of this feature, the executing kernel must support text Address Space Layout Randomization (ASLR). Stack Protected This indicates that there is evidence that the ELF was compiled with the gcc(1) option -fstack-protector (e.g. uses __stack_chk_fail). The program will be resistant to having its stack overflowed. When an executable was built without any character arrays being allocated on the stack, this check will lead to false alarms (since there is no use of __stack_chk_fail), even though it was compiled with the correct options. Fortify Source functions This indicates that the executable was compiled with -D_FORTIFY_SOURCE=2 and -O1 or higher. This causes certain unsafe glibc functions with their safer counterparts (e.g. strncpy instead of strcpy), or replaces calls that are verifiable at runtime with the runtime-check version (e.g. __memcpy_chk insteade of memcpy). When an executable was built such that the fortified versions of the glibc functions are not useful (e.g. use is verified as safe at compile time, or use cannot be verified at runtime), this check will lead to false alarms. In an effort to mitigate this, the check will pass if any fortified function is found, and will fail if only unfortified functions are found. Uncheckable conditions also pass (e.g. no functions that could be fortified are found, or not linked against glibc). Read-only relocations This indicates that the executable was build with -Wl,-z,relro to have ELF markings (RELRO) that ask the runtime linker to mark any regions of the relocation table as "read-only" if they were resolved before execution begins. This reduces the possible areas of memory in a program that can be used by an attacker that performs a successful memory corruption exploit. Immediate binding This indicates that the executable was built with -Wl,-z,now to have ELF markings (BIND_NOW) that ask the runtime linker to resolve all relocations before starting program execution. When combined with RELRO above, this further reduces the regions of memory available to memory corruption attacks. OPTIONS
--nopie, -p No not require that the checked binaries be built as PIE. --nostackprotector, -s No not require that the checked binaries be built with the stack protector. --nofortify, -f No not require that the checked binaries be built with Fority Source. --norelro, -r No not require that the checked binaries be built with RELRO. --nobindnow, -b No not require that the checked binaries be built with BIND_NOW. --quiet, -q Only report failures. --verbose Report verbosely on failures. --report-functions After the report, display all external functions needed by the ELF. --find-libc-functions Instead of the regular report, locate the libc for the first ELF on the command line and report all the known "fortified" functions exported by libc. --color Enable colorized status output. --lintian Switch reporting to lintian-check-parsable output. --debug Report some debugging during processing. --help, -h, -? Print a brief help message and exit. --man Print the manual page and exit. RETURN VALUE
When all checked binaries have all checkable hardening features detected, this program will finish with an exit code of 0. If any check fails, the exit code with be 1. Individual checks can be disabled via command line options. AUTHOR
Kees Cook <kees@debian.org> COPYRIGHT AND LICENSE
Copyright 2009-2012 Kees Cook <kees@debian.org>. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 or later. SEE ALSO
gcc(1), hardening-wrapper(1) perl v5.14.2 2012-06-14 HARDENING-CHECK(1)
All times are GMT -4. The time now is 10:15 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy