Sponsored Content
Operating Systems AIX /etc/security/limits value change Post 302721081 by funksen on Thursday 25th of October 2012 07:13:17 AM
Old 10-25-2012
you mean you see the old limits?

possible syntax error in the file

you can always change aix security files with chsec

Code:
chsec -f /etc/security/limits -s bin -a fsize=-1

for example
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

tar--limits ????

Hi! All, This is True64 Unix, 4.0.F patch kit 4 I have a 15GB Oracle dump file that I have to backup to tape. I am trying to use "tar" to dump it to tape, but tar complained that the file was too big and that it was truncating it!. I am compressing the file using the "compress" utility.... (3 Replies)
Discussion started by: sdharmap
3 Replies

2. UNIX for Dummies Questions & Answers

How do I change security on a file or directory?

What command(s) do I use to change the security on a file? I need to change the owner as well as read write end execute options. (5 Replies)
Discussion started by: ekkehard
5 Replies

3. UNIX for Advanced & Expert Users

/etc/security/limits.conf

HI, To restrict the number of files and number of processes used the user we use the following configuration in the file /etc/security/limits.conf. oracle soft nofile 65572 oracle hard nofile 65572 oracle soft noproc 16384 oracle soft noproc 16384 My question is what do the 'soft' and... (1 Reply)
Discussion started by: praveen_b744
1 Replies

4. Solaris

Solaris counterpart of /etc/security/limits.conf

Hi, How can we set per user core file size, etc in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf. TIA (0 Replies)
Discussion started by: slash_blog
0 Replies

5. UNIX for Dummies Questions & Answers

ulimit and /etc/security/limits file permission

Hi there, I am working on AIX and i dont have permission for /etc/security/limits file. In the man page of ulimit it is mentioned that it will get the limitations for me from /etc/security/limits file. the file permission for ulimit command is -r-xr-xr-x 15 bin bin ... (6 Replies)
Discussion started by: quintet
6 Replies

6. AIX

Security user Can't change the groups.

Dears Security users in AIX don’t have permission to change the group of the user thru Smitty Users When they try to change the group of the users to any group they'll get permission denied Security profile in Smitty : User... (10 Replies)
Discussion started by: ITHelper
10 Replies

7. Linux

/etc/security/limits.conf NIS netgroup support

Hi there, I am trying to set a ulimit max in the /etc/security/limits.conf against a NIS netgroup (which contains a whole bunch of users) instead of a local user or group. so I have a NIS netgroup called +@myusers , none of whose users are defined locally on the box. I want to ensure that... (2 Replies)
Discussion started by: rethink
2 Replies

8. Solaris

equivalent of linux /etc/security/limits

Hi, I would like to know, how can I set limits (noproc,fsize,core, data...) to users in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf Thanks!! (0 Replies)
Discussion started by: kiekurt
0 Replies

9. UNIX for Dummies Questions & Answers

Soft and hard limits for nproc value in /etc/security/limits.conf file (Linux )

OS version : RHEL 6.5 Below is an excerpt from /etc/security/limits.conf file for OS User named appusr in our server appusr soft nproc 2047 appusr hard nproc 16384 What will happen if appusr has already spawned 2047 processes and wants to spawn 2048th process ? I just want to know... (3 Replies)
Discussion started by: kraljic
3 Replies

10. Programming

Limits on 32 and 64 bit in C++ / C

Hi All, I am getting below run time error I checked the code and see the structure defined as below and using the file position variable typedef struct Get_file { char *current_pathname; unsigned int tot_bytes_io, physical_position; int... (2 Replies)
Discussion started by: arunkumar_mca
2 Replies
SMRSH(8)						      System Manager's Manual							  SMRSH(8)

NAME
smrsh - restricted shell for sendmail SYNOPSIS
smrsh -c command DESCRIPTION
The smrsh program is intended as a replacement for sh for use in the ``prog'' mailer in sendmail(8) configuration files. It sharply limits the commands that can be run using the ``|program'' syntax of sendmail in order to improve the over all security of your system. Briefly, even if a ``bad guy'' can get sendmail to run a program without going through an alias or forward file, smrsh limits the set of programs that he or she can execute. Briefly, smrsh limits programs to be in a single directory, by default /etc/smrsh, allowing the system administrator to choose the set of acceptable commands, and to the shell builtin commands ``exec'', ``exit'', and ``echo''. It also rejects any commands with the characters ``', `<', `>', `;', `$', `(', `)', ` ' (carriage return), or ` ' (newline) on the command line to prevent ``end run'' attacks. It allows ``||'' and ``&&'' to enable commands like: ``"|exec /usr/local/bin/procmail -f- /etc/procmailrcs/user || exit 75"'' Initial pathnames on programs are stripped, so forwarding to ``/usr/ucb/vacation'', ``/usr/bin/vacation'', ``/home/server/mydir/bin/vaca- tion'', and ``vacation'' all actually forward to ``/etc/smrsh/vacation''. System administrators should be conservative about populating the /etc/smrsh directory. Reasonable additions are vacation(1), procmail(1), and the like. No matter how brow-beaten you may be, never include any shell or shell-like program (such as perl(1)) in the /etc/smrsh directory. Note that this does not restrict the use of shell or perl scripts in the sm.bin directory (using the ``#!'' syntax); it simply disallows execution of arbitrary programs. FILES
/etc/smrsh - directory for restricted programs SEE ALSO
sendmail(8) $Date: 2002/04/25 13:33:40 $ SMRSH(8)
All times are GMT -4. The time now is 11:11 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy