Sponsored Content
Full Discussion: Access Denied
Top Forums UNIX for Dummies Questions & Answers Access Denied Post 302806729 by gkelly1117 on Monday 13th of May 2013 02:04:08 PM
Old 05-13-2013
Access Denied

I login to a server and get a Access Denied Prompt but I clearly lets me into the prompt with Putty.
I do a sudo -s enter my password tells me Access Denied but I am clearly now Root
Just wondering why this is so? what is misconfigured? I mean its not prohibiting me from anything, this is more just a question out of curiousoty.

Code:
 
[cmap:emmanueli]/home/emmanueli$ sudo -s
Password:
Access denied
Access denied
[cmap:emmanueli]/home/emmanueli$ id
uid=0(root) gid=0(root) groups=1(other),2(bin),3(sys),4(adm),5(uucp),6(mail),7(tty),8(lp),9(nuucp),12(daemon)

 

10 More Discussions You Might Find Interesting

1. Solaris

Ftp access denied

Hello,I must share file from Linux machine to Solaris.I've enabled ftp with svcadm enable ftp,when I connect from Linux box I have this "Name (192.168.1.4:root): anonymous 331 Guest login ok,send your complete e-mail address as password Password : (I give my e-mail address) 530 Login incorrect... (3 Replies)
Discussion started by: bgf0
3 Replies

2. Red Hat

New RH User - Access Denied

Hi, We were just recently given a new VM instance with Red Hat linux. The only user account that can log in successfully is the root account. I made sure that the user z021407 has access to their directory and the account can read the home directory, but I can't log in with the new account... (2 Replies)
Discussion started by: edrichard
2 Replies

3. SuSE

"scp" access denied:/etc/security/access.conf

Guys i have 2 SUSE Linux Enterprise Server 10 SP1 (i586) boxes.if i take a look into /etc/security/access.conf ,i see following lines at the eof # All other users should be denied to get access from all sources. #- : ALL : ALL - : myID : ALL now earlier i had written scripts where files... (1 Reply)
Discussion started by: ak835
1 Replies

4. Solaris

root access denied

Hi, I have installed solaris 10 on my local system. i want to connect with remotely using putty. it works when i connect remotely with telnet. but when i connect using ssh. it gives access denied error. i have comment the CONSOLE=/dev/console in /etc/default/login but it still don't work Plz... (4 Replies)
Discussion started by: malikshahid85
4 Replies

5. Programming

Access denied for user at localhost

Hi guys. We can can connect to mysql server from command line with some user. but when using mysql_connect() it says: access is denied for user 'someuser'@'localhost' (using password: YES) what should i do? (6 Replies)
Discussion started by: majid.merkava
6 Replies

6. AIX

Why access to the servers is denied?

There is one aix server, IP is 152.240.28.14, the user IP is 152.240.88.64, The user is able to get access briefly then all access is denied from the whole subnet 152.240.88.0. a short while later access is granted and the same thing happens all over again. The customer is able to... (7 Replies)
Discussion started by: rainbow_bean
7 Replies

7. Red Hat

Adduser -> Access denied

hi, I have a problem with any user i created on a linux server RH. With the user root i did: adduser toto passwd toto (to give it a password - message : "all authentication tokens updated successfully") I can do a "su - toto", but when I try to connect it directly by ssh i have the message... (3 Replies)
Discussion started by: Castelior
3 Replies

8. Windows & DOS: Issues & Discussions

seteuid access denied - openSSH installation

Hi, I have installed openssh in one of my windows servers following SUA community guidelines. I can successfully install and generate RSA DSA keys. But I cannot SSH to server from my Solaris machine. Below is the output from ssh -v <server>. Also I tried to SSH from the K-shell to localhost... (0 Replies)
Discussion started by: vkk
0 Replies

9. Solaris

Access Denied

Hi All, I have a root access for one of the server. But, when i try to cd one particular directory i will get the access denied message. Even though that particular directory is created under root. What would be the cause for this? I really wonder if any one have answer for my... (20 Replies)
Discussion started by: Sricharan21
20 Replies

10. UNIX for Advanced & Expert Users

X-Server access is denied on host

The situation is: I have a RHEL 7.3 VM that I am able to access via both ssh and VM console. I am able to run all of the standard commands for verifying that X11 forwarding/xhost permissions are working (xclock, nautilus, firefox, etc.) i can also run the runInstaller for Oracle client, No problems... (1 Reply)
Discussion started by: melghaze
1 Replies
passwd(4)						     Kernel Interfaces Manual							 passwd(4)

NAME
passwd - Password files DESCRIPTION
A passwd file is a file consisting of records separated by newline characters, one record per user, containing seven colon (:) separated fields. These fields are as follows: User's login name. The default length is 8 characters. User's encrypted password. User's ID User's login group ID General information about the user User's home directory User's login shell The name field is the login used to access the computer account, and the uid field is the number associated with it. They should both be unique across the system (and often across a group of systems) since they control file access. While it is possible to have multiple entries with identical login names and/or identical user gid's, it is usually a mistake to do so. Routines that manipulate these files will often return only one of the multiple entries, and that one by random selection. The login name must never begin with a hyphen (-); also, it is strongly suggested that neither uppercase characters or dots (.) be part of the name, as this tends to confuse mailers. No field may contain a colon (:) as this has been used historically to separate the fields in the user database. The password field is the encrypted form of the password. If the password field is empty, no password is required to gain access to the machine. Because these files contain the encrypted user passwords, they should not be readable by anyone without appropriate privileges. Use the command to edit password entries. This ensures that the hashed password database is rebuilt. If you have enhanced security installed on your system, the password field contains an asterisk (*). The encrypted password is stored in the user's protected password database. The gid field is the group that the user will be placed in upon login. Since the operating system supports multiple groups (see the groups command) this field currently has little special meaning. The gecos field normally contains comma (,) separated subfields as follows: User's full name User's office number User's work phone number User's home phone number This information is used by the finger command. The user's home directory is the full UNIX pathname where the user will be placed on login. The shell field is the command interpreter the user prefers. If the shell field is empty, the Bourne shell (/bin/sh) is assumed. The allowable values for the UID are unsigned numbers from 0 to 65535. The command pwck can be used to verify the accuracy of data entered in the passwd file. EXAMPLES
root:TZVtfX5VbS3KY:0:1:System PRIVILEGED Account,,,:/:/bin/sh adm:*:5:16:Admin Login:/usr/adm:/bin/sh operator:HdgoklKwZOlvU:25:28:System PRIVILEGED Account,,,:/etc/operator: guest:Nologin:-2:-2:anonymous NFS user:/:/bin/date osfuser:If2eoZ6gmghJo:50002:15:Osf User:/usr/users/osfuser:/bin/csh marcy:*:201:20:Marcy Swanson,dev,x1234:/usr/users/marcy:/bin/sh RELATED INFORMATION
Functions: getpwent(3) Commands: login(1), passwd(1), pwck(8), vipw(8) Files: prpasswd(4) delim off passwd(4)
All times are GMT -4. The time now is 09:27 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy