02-20-2016
Login cancellation question
Purely out of curiosity, but what would happen in all accounts were locked out from being able to be logged in to?? The root account, on most unix-based systems, is locked by default. What if all other login-enabled accounts were changed to be login-disabled?? If such a thing were possible, would there be a possibility of using some way to gain control over the system without being able to login?? Or would the system and its contents be inaccessible?? This is pure curiosity. Obviously, I would never do this if it were possible.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Why, when you type in an obviously invalid login, does UNIX give you an opportunity to type in a password? Is it a security thing? (1 Reply)
Discussion started by: grassaj
1 Replies
2. UNIX for Dummies Questions & Answers
Hi all
I am administering Linux boxes (running rehat linux 7.3 and 8.0).
The other day I tried to ssh from 1 linux box to the other. I was root on the client box. Surprisingly, I could login as root into the host after giving the password!! I am unable to get root login from a SSH client... (2 Replies)
Discussion started by: skotapal
2 Replies
3. UNIX for Dummies Questions & Answers
hi all,
what file(s) needs to be changed and in what way in order to do the following:
when user A logs onto freebsd 4.8 automaticaly he needs to start up a script a made that executes:
sets ltp0 in polling mode,
executes tn5250 keyboard mapping
starts tn5250 with the correct parameters.
... (2 Replies)
Discussion started by: termiEEE
2 Replies
4. Shell Programming and Scripting
I have been searching how to do this and haven't been able to make it work. When I login to our Unix machine running SunOS 5.8 it automatically starts in csh but I want bash. I don't have access to chsh or password commands so I guess I need to change .profile or .login or .cshrc? Which one and... (2 Replies)
Discussion started by: blackw
2 Replies
5. Solaris
I post this question because it seems that no many people will knows about this. I hope to meet some real guru to help me out. Here is the question:
I isntalled solaris 10 on Sun sparc 64 bit machine. I can login as root user through GUI or console. After I created an Oracle user, I only can... (1 Reply)
Discussion started by: duke0001
1 Replies
6. UNIX for Advanced & Expert Users
I post this question because it seems that no many people will knows about this. I hope to meet some real guru to help me out. Here is the question:
I isntalled solaris 10 on Sun sparc 64 bit machine. I can login as root user through GUI or console. After I created an Oracle user, I only can... (2 Replies)
Discussion started by: duke0001
2 Replies
7. UNIX for Dummies Questions & Answers
Hey everyone,
I'am a little new here and experincing Unix for the first time. I was wondering if somone could help me with this question i'am a bit stuck on
Looking at the content of .profile login script
The .profile file is in your login directory. It is a startup script file... (1 Reply)
Discussion started by: worldsoutro
1 Replies
8. Red Hat
hi Guys , I m completely new to this environment.
I m working in linux gnu operating type.
I have root user access to this machine and i have created a user named scott using useradd command then set its password using passwd command.
Now my problem is i m not able to loggin using this new... (4 Replies)
Discussion started by: pinga123
4 Replies
9. Shell Programming and Scripting
Hi all,
I am OpenBSD newbie and currently need to manage some OpenBSD firewalls running pf. The OpenBSD version is 4.8
As the other sys admins are not so familiar with OpenBSD, so I have an idea across in my mind on how to minimize the root account usage and other unnecessary access and make... (9 Replies)
Discussion started by: lcxpics
9 Replies
10. Solaris
Hi Folks,
I am studying for my 1z0-821 exam and I would like to clarify an answer to the following question :
You have a ticket from a new user on the system, indicating that he cannot log in to his account.
The information in the ticket gives you both the username and password. The ticket... (2 Replies)
Discussion started by: Ravneet_Pal
2 Replies
ttys(4) Kernel Interfaces Manual ttys(4)
NAME
ttys - terminal control database file for trusted systems
SYNOPSIS
DESCRIPTION
The system supports a single terminal control database containing entries for each local terminal that can log into the system. Authentica-
tion programs use information contained in the terminal control database to determine if login from the terminal is permitted. Additional
fields are maintained for informational purposes.
The format of the terminal control database file is identical to other system authentication database files. For more information on the
file format, see authcap(4). The file consists of keyword field identifiers and values for those fields. The keyword identifiers supported
and their use include:
This field defines the terminal device name for the entry. The terminal device
is expected to be contained in the directory, therefore this prefix should not be specified. If the terminal entry
describes the device, the field should contain
This field records the user id of the last user to successfully login using
the terminal device.
This field records the last successful login time to the terminal device.
This field records the last unsuccessful login time to the terminal device.
This field records the number of consecutive unsuccessful login attempts to
the terminal device.
This field specifies the maximum number of consecutive unsuccessful login
attempts permitted using the terminal before the terminal is locked. Once the terminal is locked, it must be unlocked by
an authorized administrator.
This field specifies the login timeout value (sec).
This field specifies the delay between login tries (sec).
This flag field indicates whether the terminal device has been administratively
locked or not. This field is manipulated by authorized administrators only.
EXAMPLES
The following is an example of a terminal control database entry:
This entry is for the system console device, The most recent successful login session was for the user The entry records the system time
for the current successful login and the time of the most recent unsuccessful login attempt.
WARNINGS
Remote terminals (ptys) should not be added to the or databases. Device name formats treated as ptys by login are:
where x is a letter, and y is a hex number
where x is a letter, and y is a hex number
HP-UX 11i Version 3 is the last release to support
trusted systems functionality.
AUTHOR
was developed by HP.
FILES
Terminal control database file
SEE ALSO
login(1), getprtcent(3), devassign(4), authcap(4), default(4).
TO BE OBSOLETED ttys(4)