02-21-2017
Hello,
In order for anyone to have a chance of helping you diagnose this, you'll have to provide more information. Without actually seeing the script, it isn't really possible to say what the problem might be. If you could also provide the full 'crontab' entry that is used to run the script, that would be good too. Without these things, anything anyone says is just going to be pure guesswork, which is best avoided if possible.
These 2 Users Gave Thanks to drysdalk For This Post:
10 More Discussions You Might Find Interesting
1. Linux
We have requirments to not allow a userid login abilities but allow users to 'su' to it. In solaris I normally set the shell in /etc/passwd to bin/false. THis does not work on Linux, any suggestions would help. (1 Reply)
Discussion started by: bryanthomas
1 Replies
2. Shell Programming and Scripting
i want to delete every newline and every line which starts with "RECORD......." in a file.
FILE:
Record 61391 in base BROCKHAUS (Timestamp: 2008-04-09 11:38:38)
UNTERTITEL :
Gräfin (seit 1707 Reichsgräfin) von, * Schwerin 4. 2. 1686, + Berlin
21. 10. 1744; wurde
Record 61392 in base BROCKHAUS... (4 Replies)
Discussion started by: trek
4 Replies
3. Shell Programming and Scripting
Hi,
I'm new to UNIX and am trying to learn shell scripting in order to work on an interface that I inherited when a co-worker left. I need to be able to check to see whether a file exists to determine whether the FTP has taken place, but in testing, the if statement always evaluates as false,... (3 Replies)
Discussion started by: JeffR
3 Replies
4. UNIX for Advanced & Expert Users
helo
helo I have create user for the group and entry for the user in /etc/passwd file is liek this
bhavin:x:2014:109:test:/home/pds_RBAC:/bin/false
I have keep here /bin/false
now i m accesing user through sftp
ow when i access that user using sftp from the another linux pc
for e.g... (1 Reply)
Discussion started by: amitpansuria
1 Replies
5. Solaris
Hi Experts,
I am using Solaris-10, Sun-Fire-V445.
i got often the below message-
"Memory Usage – Critical, Memory usage (RAM) exceeding 90%
The memory utilization is exceeding 90%" in a application running on solaris.
I checked with Vmstat. Everything seems to be fine. Where i should... (5 Replies)
Discussion started by: thepurple
5 Replies
6. Shell Programming and Scripting
Hi All,
I am using the below Script to enter a line in the File:
#!/bin/ksh
# To delete the last line if it contains the pattern Redirect permanent / Virgin Atlantic Airways - Popup
echo "Enter the URL that should point to the particular microsite"
read url
# To delete the last line if it... (0 Replies)
Discussion started by: Shazin
0 Replies
7. IP Networking
Why this happens?
How to solve this?
$netstat -na |grep 9325
tcp 0 0 127.0.0.1:9325 127.0.0.1:9325 ESTABLISHED
When a client socket repeatedly tries to connect to an inactive(no server socket is listening on this port) local port,connect succeeds.
... (1 Reply)
Discussion started by: johnbach
1 Replies
8. AIX
Checking configuration access files for an AIX server, left me wondering about this :confused::
If a user is added to system group, it gets gid=0 with some security risks because it gets some root kind of file access level.
Is this insecure condition kept if the user has admin variable... (0 Replies)
Discussion started by: bkiddo
0 Replies
9. Red Hat
Hello All,
Nagios seems to be sending false alerts about few hosts, (ex: There were no users on one host and still Nagios was reporting a critical alert and says 6 users are logged in. How do I fix this one?
Also, I have installed nagios and added 12 hosts as a start and monitoring few... (4 Replies)
Discussion started by: lovesaikrishna
4 Replies
10. Shell Programming and Scripting
Hi All
Below code is working as expected but creating too many child processes when the url is not up and every minute that process is sending false email alerts
any help with the logic not to generate child process and not to send duplicate alerts
app="https://url"
appresult=$(wget... (2 Replies)
Discussion started by: srilinux09
2 Replies
LEARN ABOUT DEBIAN
pure-uploadscript
pure-uploadscript(8) Pure-FTPd pure-uploadscript(8)
NAME
pure-uploadscript - Automatically run an external program after a successful upload
SYNTAX
pure-uploadscript [-p </path/to/pidfile>] [-B] [-g <gid>] [-h] -r <program to run> [-u <uid>]
DESCRIPTION
If Pure-FTPd is compiled with --with-uploadscript (default in binary distributions), and if the -o (or --uploadscript) is passed to the
server, a named pipe called /var/run/pure-ftpd.upload.pipe is created. You will also notice an important file called
/var/run/pure-ftpd.upload.lock, used for locking.
After a successful upload, the file name is written to the pipe.
pure-uploadscript reads this pipe to automatically run any program or script to process the newly uploaded file.
OPTIONS
-B Daemonize the process and fork it in background.
-g <gid>
Switch the group ID to <gid>.
-h or --help
Display available options.
-r <program to run>
Tell what program/script to run. It has to be an absolute filename, the PATH environment variable is ignored. The first argument of
that program will be the unquoted name of the newly uploaded file. Environment variables aren't cleared. So don't put sensitive
data in them before calling pure-uploadscript if you switch uid.
-u <uid>
Switch the user ID to <uid>.
ENVIRONMENT
When the upload script is run, the name of the newly uploaded file is the first argument passed to the script (referenced as $1 by most
shells) . Some environment variables are also filled by useful info about the file. UPLOAD_SIZE The size of the file, in bytes.
UPLOAD_PERMS The permissions, as an octal integer. UPLOAD_UID The numerical UID of the owner. UPLOAD_GID The numerical GID of the owner.
UPLOAD_USER The login of the owner. UPLOAD_GROUP The group name the files belongs to. UPLOAD_VUSER The full user name, or the virtual
user name (127 chars max) .
FILES
/var/run/pure-ftpd.upload.pipe /var/run/pure-ftpd.upload.lock /var/run/pure-uploadscript.pid
SECURITY
pure-ftpd and pure-uploadscript are trying to limit security implications of such a feature.
- The pipe can only be created and opened by root. It must have perms 600, with uid 0, or it will be ignored.
- The argument passed to an external program/script is always an exact absolute path name. It doesn't get fooled by chroot()ed environ-
ments, and by absolute or relative paths added to the STOR command.
- UID and GID are set just after parsing command-line options, and pure-uploadscript never gets back supervisor privileges.
- Descriptors to the pipe are never passed to external programs/scripts. So when UID switched, the target user can't mess the pipe.
- Only regular files are processed, control characters are rejected, and a header+footer avoid partial file names.
- Two external programs/scripts can't run at the same time. Uploads are always processed sequentially, in chronological order. This is to
avoid denial-of-services by issuing a lot of simultaneous STOR commands in order to launch a fork bomb on the server. For this reason, your
programs shouldn't take a long time to complete (but they can run themselves in background) .
EXAMPLES
A sample script could be :
#! /bin/sh
echo "$1 uploaded" | /usr/bin/mutt -s "New upload : $1" ftpadmin@dom.ai.n
Never forget to quote ("variable") all variables in all your shell scripts to avoid security flaws.
AUTHORS
Frank DENIS <j at pureftpd dot org>
SEE ALSO
ftp(1), pure-ftpd(8) pure-ftpwho(8) pure-mrtginfo(8) pure-uploadscript(8) pure-statsdecode(8) pure-pw(8) pure-quotacheck(8) pure-authd(8)
RFC 959, RFC 2228, RFC 2389 and RFC 2428.
Pure-FTPd team 1.0.36 pure-uploadscript(8)