Sponsored Content
Full Discussion: Su root or login root
Operating Systems Linux Red Hat Su root or login root Post 302895197 by Perderabo on Saturday 29th of March 2014 08:16:14 AM
Old 03-29-2014
I have a hard time believing that what you say is true. But if it is true the most probably source of the strange behavior is the file /etc/pam.d/su and this is a text file that you can examine and modify with an editor. Compare the file on the strange OS with the file on the normal OS. If they are different try copying the file from the strange to the normal.

If this works please post the contents of the file. It will only be a few lines.
 

10 More Discussions You Might Find Interesting

1. IP Networking

root login password

Hello Guys, We are using Sco Unix 5.0 While we was changing root password from scoadmin, It did not change the password and hang in between. Now, I am unable to login as root user pls. do suggest me how can i skip root password and how can i goto root to change the password again. Or if... (4 Replies)
Discussion started by: subho77
4 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. AIX

root login

How do I make it so user "root" can not log directly into an AIX server? I want a user to be able to SU to it but not log into it to keep a log (2 Replies)
Discussion started by: breigner
2 Replies

4. UNIX for Dummies Questions & Answers

Run non-root script as root with non-root environment

All, I want to run a non-root script as the root user with non-root environment variables with crontab. The non-root user would have environment variables for database access such as Oracle or Sybase. The root user does not have the Oracle or Sybase enviroment variables. I thought you could do... (2 Replies)
Discussion started by: bubba112557
2 Replies

5. Solaris

Root login password

Hello all, I've a problem with root login password in Solaris. After I installed a patch the root password became empty, so to login as root I don't have to type any password, just username: root. I've tried the passwd command but it still doesn't work... Does anyone knows how can I solve this?... (1 Reply)
Discussion started by: pmpx
1 Replies

6. Solaris

How to allow root login from a specified terminal ?

I want to enable root login just from one terminal machine, can i do that via /etc/default/login in console=/dev/console line ? and if so what i have to type exactly, another question is it normal to edit the files inside defaults directly ? or i can copy it to /etc/ and edit it there and its... (3 Replies)
Discussion started by: XP_2600
3 Replies

7. AIX

Can't login root account due to can't find root shell

Hi, yesterday, I changed root's shell in /etc/passwd, cause a mistake then I can not log in root account (can't find correct shell). I attempted to log in single-mode, however, it prompted for single-mode's password then I type root's password but still can not log in. I'm using AIX 5L version 5.2... (2 Replies)
Discussion started by: neikel
2 Replies

8. HP-UX

Cannot login root

With my SSH, my HP-UX cannot login to root. It will come out a message su: unknown id: root. But I can login by user oracle. I also cannot login to console either by using root or oracle anymore. What shall I do. (5 Replies)
Discussion started by: surizan
5 Replies

9. AIX

why I cannot login by root

I can use sudo su to root from my user id through ssh. Also can change root password. However, I cannnot login by root from ssh. Does any body know why? (10 Replies)
Discussion started by: rainbow_bean
10 Replies

10. Solaris

Migration of system having UFS root FS with zones root to ZFS root FS

Hi All After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies
crypt(1)						      General Commands Manual							  crypt(1)

NAME
crypt - encode and decode files SYNOPSIS
[password] DESCRIPTION
reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no pass- word is given, demands a key from the terminal and turns off printing while the key is being typed in. encrypts and decrypts with the same key: The latter command decrypts the file and prints the clear version. Files encrypted by are compatible with those treated by the editor in encryption mode (see ed(1)). Security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space must be infeasible; "sneak paths" by which keys or clear text can become visible must be minimized. implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on such machines are widely known; thus provides minimal security. The transformation of a key into the internal settings of the machine is deliberately designed to be expensive; that is, to take a substan- tial fraction of a second to compute. However, if keys are restricted to, for example, three lowercase letters, then encrypted files can be read by expending only a substantial fraction of five minutes of machine time. Since the key is an argument to the command, it is potentially visible to users executing the or a derivative (see ps(1)). The choice of keys and key security are the most vulnerable aspect of EXAMPLES
The following example demonstrates the use of to edit a file that the user wants to keep strictly confidential: ... ... ... Note that the option is the encryption mode of and prompts the user for the same key with which the file was encrypted. WARNINGS
If output is piped to and the encryption key is given on the command line, can leave terminal modes in a strange state (see nroff(1) and stty(1)). If two or more files encrypted with the same key are concatenated and an attempt is made to decrypt the result, only the the first of the original files is decrypted correctly. FILES
for typed key SEE ALSO
ed(1), makekey(1), stty(1). crypt(1)
All times are GMT -4. The time now is 07:25 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy