10-10-2011
They log in as themsevles.
the issue is that with ntp ( which we are running) the change it too slow and is throughing things out of wack, is there a way to just lock it down
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I am the administrator for a large network of HP/UX servers, about 100, this will be growing to over 200 in the next 18 months, part of my duties are to change the root passwords on these machines once month... which is a pain. I have written a script that will generate random passwords for me and... (3 Replies)
Discussion started by: PJolliffe
3 Replies
2. Shell Programming and Scripting
Hi,
This question has been asked before in the forums but I have not seen an appropriate answer.
I need a script to change user, perform a command then revert to the original user without anyone having to input a password on the screen. Neither user is root. I am using HP-UX11 and scripting... (2 Replies)
Discussion started by: Bab00shka
2 Replies
3. AIX
Morning, All.
Does anyone know how to stop qdaemon from emailing users when print jobs fail?
This is causing a problem as the application that we use is mail-aware; users get a prompt onscreen when they have unread mail in their UNIX account, however they don't all have access to the part of... (2 Replies)
Discussion started by: alexop
2 Replies
4. UNIX for Advanced & Expert Users
Hi ,
I have one question, suppose i am a normal user and when i use 'w' command , it shows who is logged on and what they are doing .
Now i want to stop others users to know what i am doing accept the root ?
can i do this ?
thanks (5 Replies)
Discussion started by: mobile01
5 Replies
5. UNIX for Advanced & Expert Users
Hi,
greetings. I have installed OS 10 on sunfire 240. FOr now let dhcp to give IP address but it keeps chaning hostname. How do I stop this?
thanks
Jaya (3 Replies)
Discussion started by: vr76413
3 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I am writing somescripts to shut down some services in Korn Shell. Some of the services are under different owners. For example when I want to shutdown NXserver I need to be "root", but when I shut down the webserver I need to be under a different user.
Manual I would use "su root" and... (1 Reply)
Discussion started by: bonekrusher
1 Replies
7. Shell Programming and Scripting
Hi All,
My question is how can i stop my users on system from deleting their history.
How can i stop the users from running 'history -c'.
I have searched thoroughly on the forum but didn't find any satisfactory solution to the problem.
kindly help if you any suggestions
Thanx in... (3 Replies)
Discussion started by: xander
3 Replies
8. Web Development
Hi,
I have the user who runs tomcat: tomcat:tomcats
I want to have another user who will be able to start and stop tomcat process.
Is this possible?
Thanks,
Bianca (1 Reply)
Discussion started by: potro
1 Replies
LEARN ABOUT MINIX
ntp.keys
ntp.keys(5) File Formats ntp.keys(5)
NAME
ntp.keys - NTP symmetric key file format configuration file
SYNOPSIS
[--option-name] [--option-name value]
All arguments must be options.
DESCRIPTION
This document describes the format of an NTP symmetric key file. For a description of the use of this type of file, see the "Authentica-
tion Support" section of the ntp.conf(5) page.
ntpd(8) reads its keys from a file specified using the -k command line option or the keys statement in the configuration file. While key
number 0 is fixed by the NTP standard (as 56 zero bits) and may not be changed, one or more keys numbered between 1 and 65535 may be arbi-
trarily set in the keys file.
The key file uses the same comment conventions as the configuration file. Key entries use a fixed format of the form
keyno type key opt_IP_list
where keyno is a positive integer (between 1 and 65535), type is the message digest algorithm, key is the key itself, and opt_IP_list is an
optional comma-separated list of IPs where the keyno should be trusted. that are allowed to serve time. Each IP in opt_IP_list may con-
tain an optional /subnetbits specification which identifies the number of bits for the desired subnet of trust. If opt_IP_list is empty,
any properly-authenticated message will be accepted.
The key may be given in a format controlled by the type field. The type MD5 is always supported. If ntpd was built with the OpenSSL
library then any digest library supported by that library may be specified. However, if compliance with FIPS 140-2 is required the type
must be either SHA or SHA1.
What follows are some key types, and corresponding formats:
MD5 The key is 1 to 16 printable characters terminated by an EOL, whitespace, or a # (which is the "start of comment" character).
SHA
SHA1
RMD160 The key is a hex-encoded ASCII string of 40 characters, which is truncated as necessary.
Note that the keys used by the ntpq(8) and ntpdc(8) programs are checked against passwords requested by the programs and entered by hand,
so it is generally appropriate to specify these keys in ASCII format.
FILES
/etc/ntp.keys the default name of the configuration file
SEE ALSO
ntp.conf(5), ntpd(1), ntpdate(1), ntpdc(1), sntp(1)
AUTHORS
The University of Delaware and Network Time Foundation
COPYRIGHT
Copyright (C) 1992-2017 The University of Delaware and Network Time Foundation all rights reserved. This program is released under the
terms of the NTP license, <http://ntp.org/license>.
BUGS
Please send bug reports to: http://bugs.ntp.org, bugs@ntp.org
NOTES
This document was derived from FreeBSD.
This manual page was AutoGen-erated from the ntp.keys option definitions.
4.2.8p13 20 Feb 2019 ntp.keys(5)