Sponsored Content
Operating Systems Solaris Solaris logs - Tracking failed attempts from my host Post 302592340 by MaindotC on Monday 23rd of January 2012 02:35:37 PM
Old 01-23-2012
I'll see what I can do. Thank you so much for replying - this really looks good. Unfortunately I don't have root access and I have to open a ticket in order to have the SA do that and I'm not even sure why I needed this in the first place so I'm not sure I can justify this request or if they'll even run it. I tried myself - here is the contents of nohup.out Smilie

dtrace: failed to initialize dtrace: DTrace requires additional privileges

I'll see if I can get in touch with an SA and see if I can get a glimpse of a sample. In any event I appreciate your help as I had never heard of the dtrace programme until now - and I see there's even a long google video on it.

One other thing...a similar command for Linux ? Also, is this dtrace feature realtime or can you search past logs?

Last edited by MaindotC; 01-23-2012 at 04:02 PM..
 

8 More Discussions You Might Find Interesting

1. AIX

Denying IPaddress for Multiple Failed Login Attempts

Hi. I would like to be able to deny IP address for too many failed login attemps (either from ssh, sftp, ftp, etc). The system I wish this to work on is an AIX 5.1 system. I'm new to AIX but I'm a linux user. There is a program for linux called fail2ban which reads from the log files and see if... (1 Reply)
Discussion started by: metzgerh
1 Replies

2. AIX

ftp check for failed attempts

Hi, I have created the below ftp script to put files over to our capacity server, the check at the end works if ftp fails to run however if the script cannot login or the transfer itself failed there is no warnings. Does anyone know the syntax to trap the erorr codes or to put a check within... (3 Replies)
Discussion started by: chlawren
3 Replies

3. Shell Programming and Scripting

Create a script that executes when a user attempts to delete history logs

Hi, I have a linux redhat 9 server and I am concerned about the security on that server. I would like to be able to write a script that records all the commands that were typed at the command prompt before the user calls the 'history -c' command and deletes all the history. I was thinking about... (4 Replies)
Discussion started by: mishkamima
4 Replies

4. Shell Programming and Scripting

Another question for tracking failed logins via script

Hello Experts, I have this initial shell script that tracks failed login attempts: #!/bin/bash #Fetch failed user logins to file failed-logins.txt grep -i failed /var/log/secure | awk '{ print $1, $2" ", $3" ", $9" ", $11 }' > failed-logins.txt #Splitting the failed-logins in... (10 Replies)
Discussion started by: linuxgeek
10 Replies

5. UNIX for Dummies Questions & Answers

TCP failed connection attempts from netstat -s

Dear experts, I am seeing a lot of TCP failed connection attempts from "netstat -s" on one of our servers. How can I pin point what connection failed and what are the ports involved? Any tools/commands I can dig in deeper to diag. what went wrong on these "failed connection attempts"? ... (2 Replies)
Discussion started by: cache51
2 Replies

6. Shell Programming and Scripting

Job tracking in logs

I have two log files from two different days and some jobs start on one day and finish on the next. I also have jobs that start and then don't finish until other jobs start and finish. I'm trying to create a csv file with job name, start time and end time in the order that the jobs started. ... (2 Replies)
Discussion started by: wawa
2 Replies

7. Solaris

Need to recover/move diskgroup from failed host to another host

Hi All I am having VxVm on two Solaris hosts. host1 is using disk group dgHR. right now this server went down due to hardware fault. Not I need to import this dgHR into host2 server. Please let me know the procedure for the same. (1 Reply)
Discussion started by: amity
1 Replies

8. Cybersecurity

Failed SSHD Login Attempts (15,000 per day) - Is that a lot compared to your server?

The purpose of this thread is for everyone to follow the same methodology so we can create a future table, for the benefit of all, that shows how many failed login attempts (hacking) per day per server (and per minute) are happening. This is not a thread on writing scripts or creating... (10 Replies)
Discussion started by: Neo
10 Replies
rcp(1)							      General Commands Manual							    rcp(1)

NAME
rcp - Copies files between a local and a remote host or between two remote hosts SYNOPSIS
rcp [-pr] source destination The remote copy command (rcp) is used to copy one or more files between the local host and a remote host, between two remote hosts, or between files at the same remote host. OPTIONS
Preserves the modification times and modes of the source files in the copies sent to the destination; extended file attributes (property list), including the access control list (ACL), if any, are not copied. Without this option, the umask command at the destination modifies the mode of the destination file, and the modification time of the destination file is set to the time the file is received. Copies recur- sively, for directories only, each file and subdirectory in the source directory into the destination directory. DESCRIPTION
By default, the mode and owner of an existing destination file are preserved. Normally, if a destination file does not exist, the mode of the destination file is equal to the mode of the source file as modified by the umask command at the destination host. If the -p option is set, the modification time and mode of source files are preserved at the destination host. If the file has extended file attributes (prop- erty list), including the access control list (ACL), they are not copied and rcp returns the rcp: filename: proplist not copied message. If a remote hostname is not specified for either the source or the destination, rcp is equivalent to the cp command. When copying files to or from a remote host, any remote filename or directory name must be prefixed by the name of the remote host and a : (colon). Local filenames and directory names do not need to have a host specified. However, since rcp assumes that a colon terminates a hostname, local filenames or directory names must have a (backslash) inserted before any colons embedded in the name. If you want to specify an IPv6 address for source or destination, you must prefix the address with the [ (backslash, left bracket) charac- ters and terminate the address with the ] (backslash, right bracket) characters. Because the bracket characters are shell metacharacters, you must precede them with the backslash character. The username entered for the remote host determines the file access privileges rcp uses at that host. Additionally, the username given to a destination host determines the ownership and access modes of the resulting destination file or files. If a hostname is not prefixed by user@, the local username is used at the remote host. If a username is entered, that name is used. In either case, the remote host allows access if one of the following conditions is satisfied: The local host is included in the remote host's /etc/hosts.equiv file and the remote user is not the superuser. The local host and username is included in a $HOME/.rhosts file in the home directory of the remote user account. For security reasons, any $HOME/.rhosts file must be owned by either the remote user or the root user and should have permissions set to 600 (read and write by owner only). In addition to the preceding conditions, rcp also allows access to the remote host if the remote user account does not have a password defined. However, for security reasons, use of a password on all user accounts is recommended. If the path for a file or directory on a remote host is not specified or is not fully qualified, the path is interpreted as beginning at the home directory for the remote user account. Additionally, any metacharacters that must be interpreted at a remote host must be quoted using (backslash), " " (double quotes), or ' ' (single quotes). RESTRICTIONS
The rcp command is confused by output generated by commands in a file on the remote host. In particular, the messages, where are you? and stty: Can't assign requested address can result if output is generated by the startup file. EXAMPLES
To copy a file named localfile from the local host to a remote host named host2, enter: rcp localfile host2:/u/eng/fred To copy a remote file named newplan from one remote host, host1, to another remote host, host2, enter: rcp host1:/u/eng/fred/newplan host2:/u/eng/mary To send a directory subtree report from the local host to the home directory of a user named fred at a remote host named host2, and preserve all modes and modification times, enter: rcp -p -r report fred@host2:report The remote file /u/fred/.rhosts includes an entry specifying the local host and username. FILES
Specifies remote hosts from which users can execute commands on the local host (provided these users have an account on the local host). Specifies remote users who can use a local user account. SEE ALSO
Commands: rsh(1), rlogin(1), rshd(8) Files: rhosts(4) rcp(1)
All times are GMT -4. The time now is 02:05 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy