02-03-2012
A trusted system with root's account locked (don't laugh!) can only be unlocked at the console...
10 More Discussions You Might Find Interesting
1. HP-UX
I was playing with sam and i turned on the Trusted System feature (UX11i).
Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen.
I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies
2. Solaris
hi i have created a pool using zpool command for my /dev/dsk/c1d0s3 disk.
The poolname is qwertyuiopasdfghjklmnbvcxzzxcvbnmasdfghjklqwertyuiopoiuytrewqasdfghjklkjhgfdsazxcvbnmmnbnbcxczxzassd
ddddvfhfghgjjgjhgkhkljfjlhohihiuyuioyguioyguiowyuiogwyuigwrigywuigyguiyuiogyugiyguioyuyguiowygiuygui... (1 Reply)
Discussion started by: SankarV
1 Replies
3. HP-UX
Is it possible to have shadowed password file without implementing a Trusted System? (3 Replies)
Discussion started by: linuxdude
3 Replies
4. Emergency UNIX and Linux Support
Instead of importing a project/folder as
svn import vlsms/ file:///home/repo/vlsms -m "Initial Upload"
I did
svn import vlsms/ file:///home/repo -m "Initial Upload"
How to undo this import (in a clean way,without trace?)
---------- Post updated at 03:10 AM ---------- Previous update was at... (0 Replies)
Discussion started by: johnbach
0 Replies
5. HP-UX
I have a new box that was set up for me and I want to allow telnet to the box as root. I know that it's not secure but due to the nature of what I test I need an easy and reliable way back in if I've messed up the other connection methods(SSH). This is in a protected lab environment. Eventually... (17 Replies)
Discussion started by: gctaylor
17 Replies
6. Linux
Long story short, there was some sort of corruption with my ide and the script I was working on has been over written with nothing (the file is blank now). The IDE doesn't store a back up from what I know (I'm using notepadd++ in wine lol I know I know I'm addictted to the nppftp sidebar and geany... (1 Reply)
Discussion started by: noPermissions
1 Replies
7. UNIX for Advanced & Expert Users
I thought I would share gmail revert to old look permanently. I am sure I am not the only one annoyed by the new look.
Install Stylish extension
Choose the Stylish UserStyle that you want.
I know The Return of Old Gmail and gmail-b2b both work but I prefer gmail-b2b since I think it looks... (0 Replies)
Discussion started by: cokedude
0 Replies
8. UNIX for Advanced & Expert Users
Hi,
I have deleted a file and commited in CVS.
So, is there any CVS command to revert back that deleted file with existing log messages.
--Thanks in advance
Madhu (1 Reply)
Discussion started by: madhuti
1 Replies
9. UNIX for Dummies Questions & Answers
I have given as:
PS1="Karthick>" in linux.
Now the prompt changed as:
Karthick>
Now I need to get back the default prompt .
How to achieve this?
Thanks in advance (13 Replies)
Discussion started by: karthick nath
13 Replies
10. UNIX for Advanced & Expert Users
Hi,
I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted.
I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error :
The attempt to convert this system to a trusted system failed.
The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies
ttys(4) Kernel Interfaces Manual ttys(4)
NAME
ttys - terminal control database file for trusted systems
SYNOPSIS
DESCRIPTION
The system supports a single terminal control database containing entries for each local terminal that can log into the system. Authentica-
tion programs use information contained in the terminal control database to determine if login from the terminal is permitted. Additional
fields are maintained for informational purposes.
The format of the terminal control database file is identical to other system authentication database files. For more information on the
file format, see authcap(4). The file consists of keyword field identifiers and values for those fields. The keyword identifiers supported
and their use include:
This field defines the terminal device name for the entry. The terminal device
is expected to be contained in the directory, therefore this prefix should not be specified. If the terminal entry
describes the device, the field should contain
This field records the user id of the last user to successfully login using
the terminal device.
This field records the last successful login time to the terminal device.
This field records the last unsuccessful login time to the terminal device.
This field records the number of consecutive unsuccessful login attempts to
the terminal device.
This field specifies the maximum number of consecutive unsuccessful login
attempts permitted using the terminal before the terminal is locked. Once the terminal is locked, it must be unlocked by
an authorized administrator.
This field specifies the login timeout value (sec).
This field specifies the delay between login tries (sec).
This flag field indicates whether the terminal device has been administratively
locked or not. This field is manipulated by authorized administrators only.
EXAMPLES
The following is an example of a terminal control database entry:
This entry is for the system console device, The most recent successful login session was for the user The entry records the system time
for the current successful login and the time of the most recent unsuccessful login attempt.
WARNINGS
Remote terminals (ptys) should not be added to the or databases. Device name formats treated as ptys by login are:
where x is a letter, and y is a hex number
where x is a letter, and y is a hex number
HP-UX 11i Version 3 is the last release to support
trusted systems functionality.
AUTHOR
was developed by HP.
FILES
Terminal control database file
SEE ALSO
login(1), getprtcent(3), devassign(4), authcap(4), default(4).
TO BE OBSOLETED ttys(4)