02-27-2014
Furthermore to scrutinizer's post, you should then create a /etc/securetty fille with 644 perms and containing only authorised consoles usually its just console if this blocks most cases Im not sure about xdmcp though...
HP had their own su soft called su2 but cant remember where to download the source, it had compared to standard su a super-users file where you put thoses allowed to use it but now there is a good sudo and I suppose su2 is obsoleted...
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi guys...
how can a root assign a user all or most of the root privileges?
is sudoer comand enough 4 this?
thx alot.. (2 Replies)
Discussion started by: blue_7
2 Replies
2. Programming
Hi
I have make a program that needs root privleges but any user can try to run it, so what I want it is, when any user tries( other than root ) to run the program, an input prompt would open to enter root password ( if user knows ) and program will run ( otherwise exit ), and after completing... (21 Replies)
Discussion started by: sumsin
21 Replies
3. Solaris
Hi, I've just managed to install openssh in my home directory on a server I have access to by using --prefix=$HOME/local after ./configure. Another thing I was having trouble with without root access was privilege separation, so I disabled that in my sshd_config. However, when I run... (10 Replies)
Discussion started by: sayeo
10 Replies
4. UNIX for Dummies Questions & Answers
Hello,
As admin with root rights, to execute any command from another user without password-ask, I do : su - <user> -c "<cmd>"
But how can I do to give the same rights to another physical user without using root user ? :confused:
I've try to create another user "toor" with the same primary... (4 Replies)
Discussion started by: madmat
4 Replies
5. Linux
Hi,
Is it possible to grant root privileges to an ordinary user?
Other than 'sudo', is there some way under Users/Groups configuration?
I want ordinary user to be able to mount, umount and use command mt.
/Brendan (4 Replies)
Discussion started by: brendan76
4 Replies
6. Shell Programming and Scripting
I have written a small web server in Python, and now I would like to run it on port 80, but in order to be able to bind to a port below 1024 I need to have root privileges. I don't want to run the server as root, though. How can I bind to port 80 as root and then drop root privileges?
Thankful... (0 Replies)
Discussion started by: Ilja
0 Replies
7. Shell Programming and Scripting
My English is no very good.
I must make a bash scripting sh create like a backdoor, and when execute the script a user without privileges convert in super user or root, whithout introducing the password.
In Spanish:
Crear un script que sirva como puerta trasera al sistema, de manera que al... (1 Reply)
Discussion started by: kitievbr
1 Replies
8. Solaris
Hello
I am a new (and only) administrator of a Solaris 10 environment. The previous admin gave me a use (say user123) that is supposed to have administrative privileges.
Now the problem is, the user does not have this privilege! Here is what i tried so far:
$ id
uid=109(user123) gid=1(other)... (3 Replies)
Discussion started by: abohmeed
3 Replies
9. UNIX for Dummies Questions & Answers
I had a question in my test which asked where suppose user B has a program with 's' bit set. Can user A run this program and gain root privileges in any way?
I suppose not as the suid program run with privileges of owner and this program will run with B's privileges and not root. (1 Reply)
Discussion started by: syncmaster
1 Replies
10. Infrastructure Monitoring
Hi guys,
I am currently managing an application running on around 150 servers.
I only have application usage rights on those servers and do not have any root privileges.
I have an external node that can connect to those servers and I have root privileges on that one box.
I want to setup... (2 Replies)
Discussion started by: Junaid Subhani
2 Replies
LEARN ABOUT CENTOS
console.perms
console.perms(5) System Administrator's Manual console.perms(5)
NAME
console.perms - permissions control file for users at the system console
DESCRIPTION
/etc/security/console.perms and .perms files in the /etc/security/console.perms.d directory determine the permissions that will be given to
priviledged users of the console at login time, and the permissions to which to revert when the users log out. They are read by the
pam_console_apply helper executable.
The format is:
<class>=space-separated list of words
login-regexp|<login-class> perm dev-glob|<dev-class>
revert-mode revert-owner[.revert-group]
The revert-mode, revert-owner, and revert-group fields are optional, and default to 0600, root, and root, respectively.
The words in a class definition are evaluated as globs if they refer to files, but as regular expressions if they apply to a console defi-
nition. Do not mix them.
Any line can be broken and continued on the next line by using a character as the last character on the line.
The login-class class and the login-regexp word are evaluated as regular expressions. The dev-class and the dev-glob word are evaluated as
shell-style globs. If a name given corresponds to a directory, and if it is a mount point listed in /etc/fstab, the device node associated
with the filesystem mounted at that point will be substituted in its place.
Classes are denoted by being contained in < angle bracket > characters; a lack of < angle brackets > indicates that the string is to be
taken literally as a login-regexp or a dev-glob, depending on its input position.
SEE ALSO
pam_console(8)
pam_console_apply(8)
console.apps(5)
AUTHOR
Michael K. Johnson <johnsonm@redhat.com>
Red Hat Software 2005/5/2 console.perms(5)