09-04-2012
What's your system?
Telnet is pretty archaic these days and often disabled or just never present in the first place.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All,
I am very new to Unix and already have a problem... My predecessor didn't note down the username and password to login to the console of an HP D Class 9000 enterprise server we have. I was wondering whether there is any way to bypass this console login screen in Unix... If not is there... (1 Reply)
Discussion started by: RMadjitey
1 Replies
2. UNIX for Advanced & Expert Users
Just took over a UNIX Server from someone who left our company.
Having problems with access by some existing users as well as new users.
I get the following message from telnet sessions, when attempting access at the "Login:" prompt:
"UX:in.login:ERRO: Login incorrect"
"telnetd:Unable to... (2 Replies)
Discussion started by: Vincent Garcia
2 Replies
3. UNIX for Advanced & Expert Users
Hello,
One of the customers I suppport has a interesting problem I've never seen. I've searched the forums and found nothing relevant, so I'm hoping somebody can point me in the right direction.
He is running Redhat Enterprise Linux 3 on a Dell PC. He also uses Sun workstations. He has a... (1 Reply)
Discussion started by: rhfrommn
1 Replies
4. HP-UX
Hi friend,
I'm facing a problem to access the console and telnet to the HP ux 11 server due to the system file is full. How to access this server via single mode and how to mount the folder / and folder /var?
thanks.
vestro (1 Reply)
Discussion started by: vestro
1 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I need to connect as CONSOLE from my WinXP PC to a Solaris server (Solaris 9 SPARC) using telnet. I cannot use HyperTerminal as there is no direct link between my PC and the server (it is a remote server). How to do this?
Regards.
M. (3 Replies)
Discussion started by: mahatma
3 Replies
6. AIX
I have installed aix 5.2 on aix box through serial console connected to COM 1 . I even get a login prompt after the fresh installation . But as soon as i give a root & enter i again get a login prompt.i..e I am not able to logon after a fresh installation.
and even i configured IP configuration... (0 Replies)
Discussion started by: linuxnightowl84
0 Replies
7. AIX
Hi ,
I am having problem,users are not able to login through ssh or telnet.Only we can login as root user in console.
Restarted telnet and sshd ,no luck. Any ideas.
AIX -- 5.2 ML 07
Thanks,
MNK (1 Reply)
Discussion started by: mnkfre
1 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I was writing one script which includes to switch to the another telnet automatically from the present telnet server. I was using rlogin but firstly it takes the same user name of the present telnet and secondly it is prompting for the password.
But i want to switch to the another telnet... (2 Replies)
Discussion started by: Prateek
2 Replies
9. HP-UX
why I can login by telnet using root account
but when i use login by ssh using root account
it is not successful ,is it different password
i am sure ssh service is started (2 Replies)
Discussion started by: alert0919
2 Replies
10. AIX
Hi,
i am able to login to AX server thru console but not able to login directly thru server.
also the server is not ping-able with other server.
filesystem is fine. and OS version is AIX 5.3.
please let me know if you need any specific log.
thx in advance.
Scriptor (2 Replies)
Discussion started by: scriptor
2 Replies
LEARN ABOUT REDHAT
getspnam
SHADOW(3) Library Functions Manual SHADOW(3)
NAME
shadow - encrypted password file routines
SYNTAX
#include <shadow.h>
struct spwd *getspent();
struct spwd *getspnam(char *name);
void setspent();
void endspent();
struct spwd *fgetspent(FILE *fp);
struct spwd *sgetspent(char *cp);
int putspent(struct spwd *p, FILE *fp);
int lckpwdf();
int ulckpwdf();
DESCRIPTION
shadow manipulates the contents of the shadow password file, /etc/shadow. The structure in the #include file is
struct spwd {
char *sp_namp; /* user login name */
char *sp_pwdp; /* encrypted password */
long sp_lstchg; /* last password change */
int sp_min; /* days until change allowed. */
int sp_max; /* days before change required */
int sp_warn; /* days warning for expiration */
int sp_inact; /* days before account inactive */
int sp_expire; /* date when account expires */
int sp_flag; /* reserved for future use */
}
The meanings of each field are
sp_namp - pointer to null-terminated user name.
sp_pwdp - pointer to null-terminated password.
sp_lstchg - days since Jan 1, 1970 password was last changed.
sp_min - days before which password may not be changed.
sp_max - days after which password must be changed.
sp_warn - days before password is to expire that user is warned of pending password expiration.
sp_inact - days after password expires that account is considered inactive and disabled.
sp_expire - days since Jan 1, 1970 when account will be disabled.
sp_flag - reserved for future use.
DESCRIPTION
getspent, getspname, fgetspent, and sgetspent each return a pointer to a struct spwd. getspent returns the next entry from the file, and
fgetspent returns the next entry from the given stream, which is assumed to be a file of the proper format. sgetspent returns a pointer to
a struct spwd using the provided string as input. getspnam searches from the current position in the file for an entry matching name.
setspent and endspent may be used to begin and end, respectively, access to the shadow password file.
The lckpwdf and ulckpwdf routines should be used to insure exclusive access to the /etc/shadow file. lckpwdf attempts to acquire a lock
using pw_lock for up to 15 seconds. It continues by attempting to acquire a second lock using spw_lock for the remainder of the initial 15
seconds. Should either attempt fail after a total of 15 seconds, lckpwdf returns -1. When both locks are acquired 0 is returned.
DIAGNOSTICS
Routines return NULL if no more entries are available or if an error occurs during processing. Routines which have int as the return value
return 0 for success and -1 for failure.
CAVEATS
These routines may only be used by the super user as access to the shadow password file is restricted.
FILES
/etc/shadow - encrypted user passwords
SEE ALSO
getpwent(3), shadow(5)
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
SHADOW(3)