02-25-2013
Hi Hari, first of all thank you. I tried checking the /var/log/secure file but it is having root privilages for read/write. I'm not a root user. I'm just an appln user. So how do i go further?
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a server that is on solaris 9 and openwin is locked. The mouse won't respond and I can't seem to kill the openwin pid on the server.. Is there a command line to kill openwin from the server side? (2 Replies)
Discussion started by: jphorton
2 Replies
2. AIX
good morning
just a confirmation, to lock a password for a user, we must to write 0 for password min age and password max age option ?
thank you (0 Replies)
Discussion started by: pascalbout
0 Replies
3. HP-UX
:confused:
I have an K580 HP server.
All I did was change the IP address on the NIC and now I can't telnet into it.
I can ping, but no telnet.
Also, it won't boot if the console monitor is plugged in.
ANY IDEAS??? (1 Reply)
Discussion started by: ncmurf00
1 Replies
4. Solaris
Hi Gurus,
i have ussers cannot change their passwords, neither can root change the user's password.
O.S. Solaris 8
up−to−date on security patchaes as far as I know.
Examples (names have been changed to protect the guilty):
User logged on:
$ passwd
passwd: Changing password for <user>... (8 Replies)
Discussion started by: raziayub
8 Replies
5. Programming
Hi,
I am working with sun solaris sparc 5.9 and I want to use the serial port in my application..when I am trying to use it.it is throwing the message--
So how can I check the serial port is locked or not and how can I unlock the port??
Thanks in advance. (1 Reply)
Discussion started by: smartgupta
1 Replies
6. UNIX for Advanced & Expert Users
I am running Solaris 10. Occasionally, my id gets loked. I want to know who/which rougue process locked it.
How do I find out?
Thanks,
KNK (9 Replies)
Discussion started by: nkamatam
9 Replies
7. Solaris
Hi Folks,
I have Solaris 10, latest release.
We have passwd aging set in /etc/defalut/passwd.
I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging.
When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies
8. AIX
Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies
9. Solaris
Hi all
In my system we have implemented user lockout feature after 3 failure attempt if he tries to login directly or if he run the any command through sudo and enter wrong password thrice. Now I have requirement in which particular user account shouldn't be locked when he run the command... (1 Reply)
Discussion started by: sb200
1 Replies
LEARN ABOUT LINUX
pam_securetty
PAM_SECURETTY(8) Linux-PAM Manual PAM_SECURETTY(8)
NAME
pam_securetty - Limit root login to special devices
SYNOPSIS
pam_securetty.so [debug]
DESCRIPTION
pam_securetty is a PAM module that allows root logins only if the user is logging in on a "secure" tty, as defined by the listing in
/etc/securetty. pam_securetty also checks to make sure that /etc/securetty is a plain file and not world writable.
This module has no effect on non-root users and requires that the application fills in the PAM_TTY item correctly.
For canonical usage, should be listed as a required authentication method before any sufficient authentication methods.
OPTIONS
debug
Print debug information.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_SUCCESS
The user is allowed to continue authentication. Either the user is not root, or the root user is trying to log in on an acceptable
device.
PAM_AUTH_ERR
Authentication is rejected. Either root is attempting to log in via an unacceptable device, or the /etc/securetty file is world
writable or not a normal file.
PAM_INCOMPLETE
An application error occurred. pam_securetty was not able to get information it required from the application that called it.
PAM_SERVICE_ERR
An error occurred while the module was determining the user's name or tty, or the module could not open /etc/securetty.
PAM_USER_UNKNOWN
The module could not find the user name in the /etc/passwd file to verify whether the user had a UID of 0. Therefore, the results of
running this module are ignored.
EXAMPLES
auth required pam_securetty.so
auth required pam_unix.so
SEE ALSO
securetty(5), pam.conf(5), pam.d(5), pam(7)
AUTHOR
pam_securetty was written by Elliot Lee <sopwith@cuc.edu>.
Linux-PAM Manual 06/04/2011 PAM_SECURETTY(8)