Sponsored Content
Operating Systems HP-UX Enable telnet as root to 11.31 non-trusted system? Post 302573749 by gctaylor on Tuesday 15th of November 2011 11:24:27 AM
Old 11-15-2011
I need to be able to connect via telnet from a remote workstation and login as root. Period. Moving /etc/hosts.allow and /etc/hosts.deny unfortunately didn't help.
 

9 More Discussions You Might Find Interesting

1. Linux

ftp telnet enable

hi , i have jsut installed linux 9.0 , but i can not ftp or telnet to the system . i have installed the ftp and the telnet server during installation . i have also configured the files to enable the ftp and telnet , the ftp and the telnet daemons are running , but when i do ftp : ftp... (1 Reply)
Discussion started by: ppass
1 Replies

2. Cybersecurity

lost root password using (SAM) trusted security

I have used the system administration management trusted security system and in the process the root password have been changed or lost. Is there any possible way to recover root status after this incident:( (5 Replies)
Discussion started by: jordanrt
5 Replies

3. HP-UX

Re-enabling a locked root account on Trusted HP-UX

I knew I had had seen this somewhere:Q: How can I re-enable my root account when I typed in my password wrong 3 times and the account got disabled? A: When your HP-UX system is in the more secure "trusted system" mode, your account is automatically disabled after you have entered your password... (0 Replies)
Discussion started by: Perderabo
0 Replies

4. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies

5. Linux

How to Enable TELNET for root user

How to Enable TELNET for root user in Linux. (3 Replies)
Discussion started by: sakthi_13
3 Replies

6. HP-UX

shadowed password file on non-trusted system?

Is it possible to have shadowed password file without implementing a Trusted System? (3 Replies)
Discussion started by: linuxdude
3 Replies

7. Solaris

SSH enable, Telnet disable ...

Hi... How do I enable SSH and disable telnet.. Also - is there anything special I need to do to ensure that a new user can use ssh and su but not telnet? Adel (15 Replies)
Discussion started by: ArabOracle.com
15 Replies

8. HP-UX

HP-UX revert from trusted system to default

All, I have inherited some software that is running on HP-HX 11.11. The software ofers a GUI login and the user passwords can be either internal to the software, user defined or based on the matching unix account. The problem I have is that the server has been converted to 'trusted' years... (7 Replies)
Discussion started by: rbatte1
7 Replies

9. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies
rhosts(4)						     Kernel Interfaces Manual							 rhosts(4)

NAME
rhosts, .rhosts - Specifies remote users that can use a local user account SYNOPSIS
$HOME/.rhosts DESCRIPTION
The .rhosts file contains a list of remote users who are not required to supply a login password when they execute the rcp, rlogin, and rsh commands using a local user account. The .rhosts file is a hidden file in your home directory. It must be owned by you or the root user and it must not be writable by group or world, otherwise, it is not used. Moreover, although it is not required, it is sensible to set the permissions of the file to 600, so the file is not readable by group or world. Each entry in the file is of the following form: host [user] where: The name of the remote host. If the remote host is in a different domain than the local host, the full domain name must be speci- fied. The login name of the remote user. This field is optional. If this field is not specified, any user on the specified remote host is exempt from providing a password, and is assumed to have the same username on both the local and remote hosts. Optionally, an NIS netgroup name can be specified for the host name, user name, or both. Entries in the .rhosts file are either positive or negative. Positive entries allow access; negative entries deny access. The following entries are positive: hostname username +@netgroup In addition, the plus sign (+) can be used in place of the hostname or username. In place of the hostname, it means any remote host. In place of the username, it means any user. The following entries are negative: -hostname -username -@netgroup EXAMPLES
The following sample entries in the /u/chen/.rhosts file on host zeus allow users moshe and pierre at remote host venus and user robert at the hosts specified in the NIS netgroup chicago to log in to user chen's home directory on host zeus: venus moshe venus pierre +@chicago robert FILES
Specifies remote users who can use a local user account. RELATED INFORMATION
Commands: rcp(1), rlogin(1), rsh(1). Functions: ruserok(3). Files: hosts.equiv(4), netgroup(4). Functions: rcmd(3). delim off rhosts(4)
All times are GMT -4. The time now is 03:41 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy