I am getting below error when I try to connect with ssh. Not sure why the error is on.I am able to connect from a different login from the same server
Below is what I am getting in debug mode
Quote:
debug1: Next authentication method: gssapi-with-mic
debug3: Trying to reverse map address 91.1.12.102
debug1: Unspecified GSS failure. Minor code may provide more information
Unknown code krb5 195
debug1: Unspecified GSS failure. Minor code may provide more information
Unknown code krb5 195
debug1: Unspecified GSS failure. Minor code may provide more information
Unknown code krb5 195
debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
Good morning.
I am using RedHat shell. when running the .out file of a program I wrote, I cannot see a terminal with the outputs. I know that the program runs, because the files to be changed are changed.
how can I see the terminal (As I see it in windows)?
Thanks,
Ido. (2 Replies)
i would like to make a shell script (red hat 9 cmd line only)
to telnet to my local isp's webmail server on port 25 and send it commands
such as helo :) help would be much appreciated, and i found no posts similar that answered my question... the closest i've gotten to an answer from about 8... (3 Replies)
Hi All,
Where should start checking error on red hat?
I want to check error on system, paging, memory, pci, external storage, etc.
I few advise will do and highly appreciated.
Thanks,
itik (3 Replies)
I get error message when boot up red hat linux
Buffer I/O error on device hdc ,logical block XX
...
/dev/hdc:read failed after 0 of 2048 at 0 : input/output error
.....
I paste the /etc/fstab file in here
/dev/hdc is cdrom
How can I fix it
Please advice
# cat /etc/fstab
# This file... (3 Replies)
We are changing our OS from HP-Unix 11 to Linux Red Hat. We have few k- shell, c - shell and sql scripts which are currently running under HP-Unix 11. Will these scripts work on LINUX as it is? or we need to do any code changes?IS there anyone who have done this kind of migration before?Thanks for... (2 Replies)
Hello everybody, the reason why im posting this thread is because i've installed an oracle test database on RHEL 5, on a localhost (Since it is for test)... the thing is, after i have installed the DB it works just fine, but after i re start it, i get the following errors when i want to go into the... (5 Replies)
Hi,
I have two questions,first of all is where can I collect more error logs(the log under /var/log/messages), also give the corresponding explain is grateful.The second one is the log under various versions(such as red hat,suse,etc) is the same or not.
Thanks for answers. (1 Reply)
I have the smbclient installed and I am able to see information from the '-L' option. But when I attempt to login I'm getting the "NT_STATUS_BAD_NETWORK_NAME". I was hoping for help, because I'm not sure what is supposed to go into the smb.conf file. My goal is to transfer files from my Linux... (2 Replies)
Are basic scripts in awk or bash or perl or other shell scripting languages the same in RHEL red hat as ubuntu? (1 Reply)
Discussion started by: cmccabe
1 Replies
LEARN ABOUT MINIX
gss_auth_rules
gss_auth_rules(5) Standards, Environments, and Macros gss_auth_rules(5)NAME
gss_auth_rules - overview of GSS authorization
DESCRIPTION
The establishment of the veracity of a user's credentials requires both authentication (Is this an authentic user?) and authorization (Is
this authentic user, in fact, authorized?).
When a user makes use of Generic Security Services (GSS) versions of the ftp or ssh clients to connect to a server, the user is not neces-
sarily authorized, even if his claimed GSS identity is authenticated, Authentication merely establishes that the user is who he says he is
to the GSS mechanism's authentication system. Authorization is then required: it determines whether the GSS identity is permitted to access
the specified Solaris user account.
The GSS authorization rules are as follows:
o If the mechanism of the connection has a set of authorization rules, then use those rules. For example, if the mechanism is Kerberos,
then use the krb5_auth_rules(5), so that authorization is consistent between raw Kerberos applications and GSS/Kerberos applications.
o If the mechanism of the connection does not have a set of authorization rules, then authorization is successful if the remote user's
gssname matches the local user's gssname exactly, as compared by gss_compare_name(3GSS).
FILES
/etc/passwd
System account file. This information may also be in a directory service. See passwd(4).
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO ftp(1), ssh(1), gsscred(1M), gss_compare_name(3GSS), passwd(4), attributes(5), krb5_auth_rules(5)SunOS 5.10 13 Apr 2004 gss_auth_rules(5)