Sponsored Content
Operating Systems HP-UX How to open 6000 port for XDMCP? Post 302652253 by purushottamaher on Thursday 7th of June 2012 12:02:39 AM
Old 06-07-2012
After doing this its also not showing anything regarding dtlogin in /etc/rc.log.
 

10 More Discussions You Might Find Interesting

1. Solaris

Solaris 8 to many open port

hi all, My OS is solaris 8 with core system installation only. so far everything works fine. by i do some testing from my xp pc as client to nmap and scan opening port to my solaris. the result as below: Initiating SYN Stealth Scan against 10.10.10.10 at 16:25 Discovered open port 21/tcp on... (3 Replies)
Discussion started by: hezry79
3 Replies

2. UNIX for Dummies Questions & Answers

Closing port 6000

Hi I am on solaris 8. And using xdm Xsun for X windows capabilities. Is it possible to close port 6000 and still have xdm Xsun for X windows capabilities. I came across http://www.sunmanagers.org/pipermail/summaries/2004-May/005208.html and neither i can close off port 6000 Rgds (2 Replies)
Discussion started by: yls177
2 Replies

3. Linux

open port

How can I open a port on linux machine ??? (5 Replies)
Discussion started by: mm00123
5 Replies

4. AIX

Get CDE/dtlogin to stop listening on port 6000

Hi all, can anyone help me with this? I'm running AIX 5L v5.3 base and installed CDE is 1.0. I've seen recommendations to add "-nolisten tcp" to the args for X but anytime I try that it simply fails to start. I've tried adding it as an arg to /usr/dt/config/Xservers as well as trying to add it... (0 Replies)
Discussion started by: AIXNewbie
0 Replies

5. IP Networking

Unknown open port: "6881/tcp open bittorrent-tracker" found with nmap

Hi. I ran nmap on my server, and I get the following: Starting Nmap 4.76 ( http://nmap.org ) at 2009-03-19 16:33 EDT Interesting ports on -------- (-----): Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 6881/tcp open bittorrent-tracker The... (0 Replies)
Discussion started by: Rledley
0 Replies

6. Shell Programming and Scripting

find port greater than 6000

How to get the listening ports which is greater than 6000 using netstat ? (1 Reply)
Discussion started by: gsiva
1 Replies

7. Red Hat

Open port with iptables

Hi, What iptables command do I need to run in order to open up the following port for incomming traffic on the following server: # telnet 127.0.0.1 1521 Trying 127.0.0.1... telnet: connect to address 127.0.0.1: Connection refused telnet: Unable to connect to remote host: Connection... (3 Replies)
Discussion started by: Duffs22
3 Replies

8. IP Networking

Tcp ip port open but no such process (merged: Release A Port)

i want to kill a tcp connection by killing its pid with netstat -an i got the tcp ip connection on port 5914 but when i type ps -a or ps-e there is not such process running on port 5914 is it possible that because i do not log on with proper user account i can not see that process running? (30 Replies)
Discussion started by: alinamadchian
30 Replies

9. Solaris

Solaris 10: How to just open a port - nothing else

Hi there, I tried just open a port but I failed ;-( # telnet localhost 9876 That should work so I did ... # vi /etc/services myport 9876/tcp # my port # svcadm restart inetd -> New pid, see ps - ef | grep inet # netstat -an | grep 9876 No port 9876 is waiting ;( #... (4 Replies)
Discussion started by: System
4 Replies

10. UNIX for Beginners Questions & Answers

Script for port is open or not

I need a script on which if i will pass the port number and the host name as external parameter then it should respond me if the port is open or not thread moved (0 Replies)
Discussion started by: patitapaban
0 Replies
bsmrecord(1M)						  System Administration Commands					     bsmrecord(1M)

NAME
bsmrecord - display Solaris audit record formats SYNOPSIS
/usr/sbin/bsmrecord [-d] [ [-a] | [-e string] | [-c class] | [-i id] | [-p programname] | [-s systemcall] | [-h]] DESCRIPTION
The bsmrecord utility displays the event ID, audit class and selection mask, and record format for audit record event types defined in audit_event(4). You can use bsmrecord to generate a list of all audit record formats, or to select audit record formats based on event class, event name, generating program name, system call name, or event ID. There are two output formats. The default format is intended for display in a terminal window; the optional HTML format is intended for viewing with a web browser. Tokens contained in square brackets ( [ ] ) are optional and might not be present in every record. OPTIONS
The following options are supported: -a List all audit records. -c class List all audit records selected by class. class is one of the two-character class codes from the file /etc/security/audit_class. -d Debug mode. Display number of audit records that are defined in audit_event, the number of classes defined in audit_class, any mis- matches between the two files, and report which defined events do not have format information available to bsmrecord. -e string List all audit records for which the event ID label contains the string string. The match is case insensitive. -h Generate the output in HTML format. -i id List the audit records having the numeric event ID id. -p programname List all audit records generated by the program programname, for example, audit records generated by a user-space program. -s systemcall List all audit records generated by the system call systemcall, for example, audit records generated by a system call. The -p and -s options are different names for the same thing and are mutually exclusive. The -a option is ignored if any of -c, -e, -i, -p, or -s are given. Combinations of -c, -e, -i, and either -p or -s are ANDed together. EXAMPLES
Example 1 Displaying an Audit Record with a Specified Event ID The following example shows how to display the contents of a specified audit record. % bsmrecord -i 6152 terminal login program /usr/sbin/login see login(1) /usr/dt/bin/dtlogin See dtlogin event ID 6152 AUE_login class lo(0x00001000) header subject [text] error message return Example 2 Displaying an Audit Record with an Event ID Label that Contains a Specified String The following example shows how to display the contents of a audit record with an event ID label that contains the string login. # bsmrecord -e login terminal login program /usr/sbin/login see login(1) /usr/dt/bin/dtlogin See dtlogin event ID 6152 AUE_login class lo(0x00001000) header subject [text] error message return rlogin program /usr/sbin/login see login(1) - rlogin event ID 6155 AUE_rlogin class lo(0x00001000) header subject [text] error message return EXIT STATUS
0 Successful operation non-zero Error FILES
/etc/security/audit_class Provides the list of valid classes and the associated audit mask. /etc/security/audit_event Provides the numeric event ID, the literal event name, and the name of the associated system call or program. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsr | +-----------------------------+-----------------------------+ |CSI |Enabled | +-----------------------------+-----------------------------+ |Interface Stability |Obsolete Uncommitted | +-----------------------------+-----------------------------+ SEE ALSO
auditconfig(1M), praudit(1M), audit.log(4), audit_class(4), audit_event(4), attributes(5) See the section on Solaris Auditing in System Administration Guide: Security Services. DIAGNOSTICS
If unable to read either of its input files or to write its output file, bsmrecord shows the name of the file on which it failed and exits with a non-zero return. If no options are provided, if an invalid option is provided, or if both -s and -p are provided, an error message is displayed and bsm- record displays a usage message then exits with a non-zero return. NOTES
This command is Obsolete and may be removed and replaced with equivalent functionality in a future release of Solaris. If /etc/security/audit_event has been modified to add user-defined audit events, bsmrecord displays the record format as undefined. The audit records displayed by bsmrecord are the core of the record that can be produced. Various audit policies and optional tokens, such as those shown below, might also be present. The following is a list of praudit(1M) token names with their descriptions. group Present if the group audit policy is set. sensitivity label Present when Trusted Extensions is enabled and represents the label of the subject or object with which it is associated. The manda- tory_label token is noted in the basic audit record where a label is explicitly part of the record. sequence Present when the seq audit policy is set. trailer Present when the trail audit policy is set. zone The name of the zone generating the record when the zonename audit policy is set. The zonename token is noted in the basic audit record where a zone name is explicitly part of the record. SunOS 5.11 20 Jan 2009 bsmrecord(1M)
All times are GMT -4. The time now is 06:06 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy