11-08-2016
my problem too.. 20+ years in UNIX but cygwin_openssh on windows? LOL.. about 3 months...
Only logging I seem to be getting is thru Windows and again all I see there is cyg_server failed to login.. doesnt really say who the user is..
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a SCO R5 Open Server Box running at a remote location, and from time to time it seems to "spontaneously" re-boot itself. Is there a specific log file that I can examine to see why the machine is doing this ? Any suggestions gratefully appreciated (1 Reply)
Discussion started by: pcs7088
1 Replies
2. Shell Programming and Scripting
G'day
Just wondering if anyone out there knows how to log files, using the example I provided in the earlier message / question earlier today:
:confused:
If I was to backup a file, how could I setup a log file to record the filename, date (This one I've got figured), and that the file was... (4 Replies)
Discussion started by: Aussie_Bloke
4 Replies
3. Cybersecurity
is there a log/ how do i make a log that logs every packet inbound or outbound through my server?
I want every packet or packet fragment to be logged that comes to my server. (5 Replies)
Discussion started by: The Fridgerator
5 Replies
4. UNIX for Dummies Questions & Answers
Is there a file that captures info whenever someone logs to su? i know it comes across as standard output on the server, but is it saved anywhere? Time and date info included??
thanks, kym (1 Reply)
Discussion started by: kymberm
1 Replies
5. UNIX for Dummies Questions & Answers
Hi, just wriiten a sh script and as my script will try to log into another server to delete some files but when i run , it keeps on saying that my files do not exist. It seems to refer to my local directory instead. Below is my script :
FTP_HOST=ip_number
FTP_USER="user password"
... (1 Reply)
Discussion started by: blueberry80
1 Replies
6. UNIX for Dummies Questions & Answers
Hi all!
On our current Solaris 8 machine we only have "standard" logging configured, and now i need to put on more. What i specificly need is time in the logfiles. Ex. When a user is logging in,
when a user makes it self SU. etc.
Regards...
dOzY (3 Replies)
Discussion started by: dozy
3 Replies
7. Programming
Hi
How to manage logging in an application.
Actually I am developing a Client-Server application in c/c++ and want to manage an optional logging in my application, but since prior I have never done ths activity.
Plz guide me.
thanks. (2 Replies)
Discussion started by: sumsin
2 Replies
8. Post Here to Contact Site Administrators and Moderators
Hi Everyone. First, I want to thank all of you for letting me participate in this great group.
I am having a bit of a problem.
After I get an email from a responder, I login to make my reply.
In the mean time I get another response by email from another member, I go to reply to them and I... (6 Replies)
Discussion started by: Ccccc
6 Replies
9. Linux
When unlocking a Linux server's console there's no event indicating successful logging
Is there a way I can fix this ?
I have the following in my rsyslog.conf
auth.info /var/log/secure
authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
10. Windows & DOS: Issues & Discussions
I've installed cygwin_openssh on Windows 2012 R2 and it's working great. My issue is when a file is uploaded say from a different timezone, when it is uploaded, it doesnt pick up the sftp servers time.. Is there a way to fix that?
i.e. When someone in PST uploads a file to this server in EST,... (0 Replies)
Discussion started by: MikeAdkins
0 Replies
LOGIN(1) BSD General Commands Manual LOGIN(1)
NAME
login -- authenticate users and set up their session environment
SYNOPSIS
login [-Ffps] [-a address] [-h hostname] [user]
DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system.
If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of
users is done via passwords. If the user can be authenticated via S/Key, then the S/Key challenge is incorporated in the password prompt.
The user then has the option of entering their Kerberos or normal password or the S/Key response. Neither will be echoed.
The options are as follows:
-a The -a option specifies the address of the host from which the connection was received. It is used by various daemons such as
telnetd(8). This option may only be used by the super-user.
-F The -F option acts like the -f option, but also indicates to login that it should attempt to rewrite an existing Kerberos 5 creden-
tials cache (specified by the KRB5CCNAME environment variable) after dropping permissions to the user logging in. This flag is not
supported under pam(8).
-f The -f option is used when a user name is specified to indicate that proper authentication has already been done and that no password
need be requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves.
-h The -h option specifies the host from which the connection was received. It is used by various daemons such as telnetd(8). This
option may only be used by the super-user.
-p By default, login discards any previous environment. The -p option disables this behavior.
-s Require a secure authentication mechanism like Kerberos or S/Key to be used. This flag is not supported under pam(8).
If a user other than the superuser attempts to login while the file /etc/nologin exists, login displays its contents to the user and exits.
This is used by shutdown(8) to prevent normal users from logging in when the system is about to go down.
Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of
the day as well as other information. If the file ``.hushlogin'' exists in the user's home directory, all of these messages are suppressed.
This is to simplify logins for non-human users. login then records an entry in the wtmp(5) and utmp(5) files, executes site-specific login
commands via the ttyaction(3) facility with an action of "login", and executes the user's command interpreter.
login enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter (SHELL),
search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER).
The user's login experience can be customized using login class capabilities as configured in /etc/login.conf and documented in
login.conf(5).
The standard shells, csh(1) and sh(1), do not fork before executing the login utility.
FILES
/etc/login.conf login class capability database
/etc/motd message-of-the-day
/etc/nologin disallows non-superuser logins
/var/run/utmp list of current logins
/var/log/lastlog last login account records
/var/log/wtmp login account records
/var/mail/user system mailboxes
.hushlogin makes login quieter
SEE ALSO
chpass(1), newgrp(1), passwd(1), rlogin(1), skey(1), getpass(3), ttyaction(3), login.conf(5), passwd.conf(5), utmp(5), environ(7),
kerberos(8), pam(8)
HISTORY
A login appeared in Version 6 AT&T UNIX.
TRADEMARKS AND PATENTS
S/Key is a trademark of Bellcore.
BSD
November 19, 2008 BSD