11-14-2011
[Solved] Enable telnet as root to 11.31 non-trusted system?
I have a new box that was set up for me and I want to allow telnet to the box as root. I know that it's not secure but due to the nature of what I test I need an easy and reliable way back in if I've messed up the other connection methods(SSH). This is in a protected lab environment. Eventually I'll get sudo setup but I'm not ready for that now.
I can telnet as a regular user and then su to root just fine.
I cannot "telnet remote_server" as root user.
I cannot "telnet localhost" as root user.
I did not have an /etc/securetty file. I tried creating one with "console" in it to see if I could then get in via localhost but it didn't help.
I tried "/usr/lbin/modprpw -k root" and got the message "System is not trusted".
hosts.allow and hosts.deny are both commented out.
Most of the search results I get are about how to disable telnet for root but I have the opposite problem. Where else can I look or what can I do?
9 More Discussions You Might Find Interesting
1. Linux
hi ,
i have jsut installed linux 9.0 , but i can not ftp or telnet to the system .
i have installed the ftp and the telnet server during installation .
i have also configured the files to enable the ftp and telnet , the ftp and the telnet daemons are running , but when i do ftp :
ftp... (1 Reply)
Discussion started by: ppass
1 Replies
2. Cybersecurity
I have used the system administration management trusted security system and in the process the root password have been changed or lost.
Is there any possible way to recover root status after this incident:( (5 Replies)
Discussion started by: jordanrt
5 Replies
3. HP-UX
I knew I had had seen this somewhere:Q: How can I re-enable my root account when I typed in my password wrong 3 times and the account got disabled?
A: When your HP-UX system is in the more secure "trusted system" mode, your account is automatically disabled after
you have entered your password... (0 Replies)
Discussion started by: Perderabo
0 Replies
4. HP-UX
I was playing with sam and i turned on the Trusted System feature (UX11i).
Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen.
I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies
5. Linux
How to Enable TELNET for root user in Linux. (3 Replies)
Discussion started by: sakthi_13
3 Replies
6. HP-UX
Is it possible to have shadowed password file without implementing a Trusted System? (3 Replies)
Discussion started by: linuxdude
3 Replies
7. Solaris
Hi...
How do I enable SSH and disable telnet..
Also - is there anything special I need to do to ensure that a new user can use ssh and su but not telnet?
Adel (15 Replies)
Discussion started by: ArabOracle.com
15 Replies
8. HP-UX
All,
I have inherited some software that is running on HP-HX 11.11. The software ofers a GUI login and the user passwords can be either internal to the software, user defined or based on the matching unix account. The problem I have is that the server has been converted to 'trusted' years... (7 Replies)
Discussion started by: rbatte1
7 Replies
9. UNIX for Advanced & Expert Users
Hi,
I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted.
I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error :
The attempt to convert this system to a trusted system failed.
The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies
LEARN ABOUT LINUX
k5login
.K5LOGIN(5) File Formats Manual .K5LOGIN(5)
NAME
.k5login - Kerberos V5 acl file for host access.
DESCRIPTION
The .k5login file, which resides in a user's home directory, contains a list of the Kerberos principals. Anyone with valid tickets for a
principal in the file is allowed host access with the UID of the user in whose home directory the file resides. One common use is to place
a .k5login file in root's home directory, thereby granting system administrators remote root access to the host via Kerberos.
EXAMPLES
Suppose the user "alice" had a .k5login file in her home directory containing the following line:
bob@FUBAR.ORG
This would allow "bob" to use any of the Kerberos network applications, such as telnet(1), rlogin(1), rsh(1), and rcp(1), to access alice's
account, using bob's Kerberos tickets.
Let us further suppose that "alice" is a system administrator. Alice and the other system administrators would have their principals in
root's .k5login file on each host:
alice@BLEEP.COM
joeadmin/root@BLEEP.COM
This would allow either system administrator to log in to these hosts using their Kerberos tickets instead of having to type the root pass-
word. Note that because "bob" retains the Kerberos tickets for his own principal, "bob@FUBAR.ORG", he would not have any of the privileges
that require alice's tickets, such as root access to any of the site's hosts, or the ability to change alice's password.
SEE ALSO
telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)
.K5LOGIN(5)