01-30-2015
ITYM most but not all ssh logins do work.
I don't know your OS, so here is a general hint for Unix systems:
Ensure your sshd_config has SyslogFacility auth,
then its standard log level is auth.info.
Enable this one in syslog.conf.
For even more info, you can change log level in syslog.conf to auth.debug.
This User Gave Thanks to MadeInGermany For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
On a sparc solaris 8 host running sunone webserver 6 I would like to limit the http requests that can be used when port 80 is accessed. We currently have http/1.0 enabled.
For example I would like to remove the http request DELETE.
Regards,
BLP (1 Reply)
Discussion started by: blp001
1 Replies
2. UNIX for Dummies Questions & Answers
Sun 5.8
Though I'd like to be using SSH, my client refuses to do so. So, I'm forced to use rsh/rexec for remote commands. My question is....when running a remote command via "rsh hostname <command>", do I need to have rexecd running, or just rshd on the remote server?
Thanks in advance for... (1 Reply)
Discussion started by: jalburger
1 Replies
3. Programming
My host environment is Linux and SCO systems talking to a remote SCO box. Authentication has been configured, I can do rcmd or rsh between the systems. I am trying to use rsh facility of remote unix box and I don't want to use system call to rsh or rcmd. Instead, I am trying to open 514 port... (3 Replies)
Discussion started by: migurus
3 Replies
4. UNIX for Dummies Questions & Answers
Hi there,
what is the meaning of this line:
SFTP subsystem requests: 5 Time(s)
in: /var/mail/root???
Tks in advance,
GB (0 Replies)
Discussion started by: Giordano Bruno
0 Replies
5. AIX
I am getting an error from one node in a set with RSH setup between them, node one will connect to node two every other time (consistently), however node to connects to node one every time without problem. Here is what I am seeing, makes no sense to me. Can anyone help?
sbhcprdb01<root>: rsh... (6 Replies)
Discussion started by: JodyTek
6 Replies
6. AIX
I am trying to run niminv on my nim master to collect info from my nim clients.
: / -> niminv -o invcon -a targets=<nimclient> -a location=/tmp/inventory
rshd: 0826-813 Permission is denied.
geninv: 0645-007 ATTENTION: gi_nim_standalone() returned an unexpected result.
Return Status: FAILURE... (4 Replies)
Discussion started by: nerradr
4 Replies
7. AIX
Guy's
I have two servers .. server1 and server2
I have configured the rshd and started the rshd demean in both servers by the below command .
startsrc -t shell
lssrc -t shell
Service Command Description Status
shell /usr/sbin/rshd rshd ... (4 Replies)
Discussion started by: Mr.AIX
4 Replies
8. HP-UX
Hi All
I have a blade BL860c running on a C7000 chassis, in which is connected to a NetApp, so lately I am having I/O issues, and dmesg as well as syslog.log is reporting the following:
/dev/vg01/lvol2 file system file data error in dev/block 0/55892768
Page I/O error occurred while paging... (2 Replies)
Discussion started by: fretagi
2 Replies
9. Shell Programming and Scripting
Hi there,
I setup a dhcp server on a debian.
It is designed to only assign ip addresses to a list of known hosts.
The config file looks like :
log-facility local6;
ignore unknown-clients;
subnet 172.16.0.0 netmask 255.255.0.0 { }
host 1 { hardware ethernet 00:03:2d:xx:xx:xx; fixed-address... (3 Replies)
Discussion started by: chebarbudo
3 Replies
10. Linux
When unlocking a Linux server's console there's no event indicating successful logging
Is there a way I can fix this ?
I have the following in my rsyslog.conf
auth.info /var/log/secure
authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
LEARN ABOUT OSF1
syslog.auth
syslog.auth(4) Kernel Interfaces Manual syslog.auth(4)
NAME
syslog.auth - authorization file for accepting remote syslog messages
SYNOPSIS
# format: Each fully qualified host name on a separate line hostname.domain_name
DESCRIPTION
The /etc/syslog.auth file specifies which remote hosts are allowed to forward syslog messages to the local host. For the sake of security,
only messages coming from remote hosts listed in the local /etc/syslog.auth file will be logged by the syslogd daemon.
If the /etc/syslog.auth file does not exist, then messages coming from any host will be accepted.
Each remote host name should appear in a separate line in /etc/syslog.auth. A line started with the # character is considered as a comment
and is thus ignored.
A host name must be a complete domain name such as trout.zk3.dec.com. If a domain host name is given, it must either appear in the local
/etc/hosts file or be able to be resolved by the local name server (BIND).
Note that a host name can have at most as many characters as defined by the MAXHOSTNAMELEN constant in <sys/param.h>, although each line
in the /etc/syslog.auth file can have up to 512 characters.
The /etc/syslog.auth file must be owned by root and has a permission of 0600.
To invoke a new version of the /etc/syslog.auth file, run the following command (as the super user) to initialize the syslogd daemon: kill
-HUP `cat /var/run/syslog.pid`
EXAMPLES
The following example provides a typical authorization file: # format: Each fully qualified host name on a separate line
c3poid.rvo.dec.com r2d2id.ckt.dec.com
FILES
Location of the authorization file.
RELATED INFORMATION
Commands: syslogd(8), syslog(1)
System Administration delim off
syslog.auth(4)