06-29-2005
Did you create an ssh trusted key file, an .rhosts file, or a hosts.equiv file?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi:
I have been given the responsibility of administering AIX 3.1 machine in my lab recently. And, I am having trouble logging on to the machine using SSH through windous systems. Thus, now no one is able to access it!!
The following error message is displayed when I tried to login:
"The... (3 Replies)
Discussion started by: pdepa
3 Replies
2. AIX
Hello!
I'm going through security checklist for AIX 5.3 and i just can't disable remote login for root through ssh.
What i did:
- in /etc/security/user i added a line:
rlogin = false
which works fine when i try to login through telnet
- after installation of openSSH i edited... (3 Replies)
Discussion started by: veccinho
3 Replies
3. Shell Programming and Scripting
Hi ,
I need to login to remotemachines through ssh and move some logfiles to my localmachine. My servername,username and password will be store in the .profile file. can any one please help me in this?
This will be a cronjob so Password can't be enter at run time.
Thanks in advance
Subin (5 Replies)
Discussion started by: subin_bala
5 Replies
4. Solaris
I'm attempting to deny a user's ability to login as root through any remote means - ie telnet or ssh. I've read most of the threads that I can find on this site and I've looked at BigAdmin on Sun's site. I have done what has been suggested here and on BigAdmin which is to make sure that the line... (5 Replies)
Discussion started by: gonzotonka
5 Replies
5. UNIX for Dummies Questions & Answers
Hello sir,
Im using ubuntu distro.
We all know that ssh is used for password less entry.So, I have the public key and the IP address and the username thats it. Now to login it to the system either I should have password or a private key.Now I have the blacklist of private/public keys. But I dont... (1 Reply)
Discussion started by: nsharath
1 Replies
6. Linux
Hi Guys....
I am a newbie to unix. I have a requirement. I have a server. I have to configure ssh to disable direct root login and then add a user with sudo access to this server.Then change the ssh port to 22315 and the server should permit the ssh only from my local machine ip.I also have to... (1 Reply)
Discussion started by: mahesh_raghu
1 Replies
7. Solaris
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
8. UNIX for Dummies Questions & Answers
I have already disabled root login over the ssh by modifying /etc/ssh/sshd_config.
But how would i disable root login on a server itself.
We have implemented LDAP in our environment and our security guide states that root login must be obtained by first logging into the host using his/her own... (2 Replies)
Discussion started by: pinga123
2 Replies
9. AIX
i am in node acbs01b and i use the root@fcbs01b to login and i have the below message .
ssh root@fcbs01b
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT... (6 Replies)
Discussion started by: thecobra151
6 Replies
10. Shell Programming and Scripting
Hi Friends,
I am unable to run our application commands on remote server using ssh (passwordless login enabled). But the same command running with telent perl script. please suggest.
SSH:
C:/bin>ssh -l monitor tl04cp01 exec "/home/monitor/123"
/home/monitor/123: viewlog: not found.
... (7 Replies)
Discussion started by: suresh3566
7 Replies
LEARN ABOUT LINUX
pam_rhosts
PAM_RHOSTS(8) Linux-PAM Manual PAM_RHOSTS(8)
NAME
pam_rhosts - The rhosts PAM module
SYNOPSIS
pam_rhosts.so
DESCRIPTION
This module performs the standard network authentication for services, as used by traditional implementations of rlogin and rsh etc.
The authentication mechanism of this module is based on the contents of two files; /etc/hosts.equiv (or and ~/.rhosts. Firstly, hosts
listed in the former file are treated as equivalent to the localhost. Secondly, entries in the user's own copy of the latter file is used
to map "remote-host remote-user" pairs to that user's account on the current host. Access is granted to the user if their host is present
in /etc/hosts.equiv and their remote account is identical to their local one, or if their remote account has an entry in their personal
configuration file.
The module authenticates a remote user (internally specified by the item PAM_RUSER connecting from the remote host (internally specified by
the item PAM_RHOST). Accordingly, for applications to be compatible this authentication module they must set these items prior to calling
pam_authenticate(). The module is not capable of independently probing the network connection for such information.
OPTIONS
debug
Print debug information.
silent
Don't print informative messages.
superuser=account
Handle account as root.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_AUTH_ERR
The remote host, remote user name or the local user name couldn't be determined or access was denied by .rhosts file.
PAM_USER_UNKNOWN
User is not known to system.
EXAMPLES
To grant a remote user access by /etc/hosts.equiv or .rhosts for rsh add the following lines to /etc/pam.d/rsh:
#%PAM-1.0
#
auth required pam_rhosts.so
auth required pam_nologin.so
auth required pam_env.so
auth required pam_unix.so
SEE ALSO
rootok(3), hosts.equiv(5), rhosts(5), pam.conf(5), pam.d(5), pam(7)
AUTHOR
pam_rhosts was written by Thorsten Kukuk <kukuk@thkukuk.de>
Linux-PAM Manual 06/04/2011 PAM_RHOSTS(8)