Sponsored Content
Top Forums Shell Programming and Scripting To What files root does not have access to?? Post 92095 by ErNci on Wednesday 7th of December 2005 08:14:45 PM
Old 12-07-2005
Nuclear Weapons Controls on any country, nor Microsoft source files.
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Perl CGI to access / edit "root" owned config files

I am trying to write a CGI program which accesses UNIX configuration files and changes them as required. The thing is, I don't want the CGI program to be "root" owned - it's Perl based! Is there any way that the Perl CGI program can request a username and password - and then use this to... (1 Reply)
Discussion started by: WIntellect
1 Replies

2. Linux

how to access root priveliges if root password is lost

wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies

3. SCO

root access

We have SCO 5.0.5 and can't log into system as "root". The system indicates the password is incorrect. No one knows what happened. How can we resolve this issue.. Are there files we can restore from backup...? Any suggestions would be appreciated. Thank you.. (2 Replies)
Discussion started by: RBurer
2 Replies

4. UNIX for Dummies Questions & Answers

To What files root does not have access to??

Hi, I just wanted to know to what files root does not have access, not even read....I read that .profile for any user is the only file which root cannot access is it true..??...If we have to use passwords and ID's in a script can we use them in .profile and call them as parameters..??? ... (2 Replies)
Discussion started by: mgirinath
2 Replies

5. UNIX for Dummies Questions & Answers

How can I get the list of files if I have root access?

Hi, I'm very new and dumb in linux. What I do is: I use putty to connect to the linux server. I use auth.komtels.ru as a connection line root and oP04Koh0 as a password port 6262, and SSH protocol now I need to get the list of the files, how could I do it? (1 Reply)
Discussion started by: linuxbeginner
1 Replies

6. AIX

root access

Hello I have a question. I have a box with Aix 5.3 but I want to disable root access direct from any terminal or console. I mean If I want to login to 10.10.10.10 login:root password ********* Root access is not permited Which file I have to edit. to the users first login with... (4 Replies)
Discussion started by: lo-lp-kl
4 Replies

7. UNIX for Dummies Questions & Answers

How to allow access to some commands having root privleges to be run bu non root user

hi i am new to unix and i have abig task. i have to \run particular commands having root privileges from a non root user. i know sudo is one of the way but i need sum other approach kindly help Thanks (5 Replies)
Discussion started by: suryashikha
5 Replies

8. Shell Programming and Scripting

How to give root access to non root user?

Currently in my system Red Hat is installed. And Many user connect to my machine via SSH Techia Terminal. I want to give some users a root level access. Can anyone please help me how to make it possible. I too searched on the Google but didn't find the correct way Regards ADI (4 Replies)
Discussion started by: adisky123
4 Replies

9. SuSE

Auditors want more security with root to root access via ssh keys

I access over 100 SUSE SLES servers as root from my admin server, via ssh sessions using ssh keys, so I don't have to enter a password. My SUSE Admin server is setup in the following manner: 1) Remote root access is turned off in the sshd_config file. 2) I am the only user of this admin... (6 Replies)
Discussion started by: dvbell
6 Replies

10. Ubuntu

Root access that can't change root password?

We are having a little problem on a server. We want that some users should be able to do e.g. sudo and become root, but with the restriction that the user can't change root password. That is, a guarantee that we still can login to that server and become root no matter of what the other users will... (2 Replies)
Discussion started by: 244an
2 Replies
sulogin(8)						      System Manager's Manual							sulogin(8)

NAME
sulogin - single-user login program (Enhanced Security) SYNOPSIS
/sbin/sulogin DESCRIPTION
The sulogin program is run by the init process on the console terminal when entering single-user mode. The sulogin program checks the sys- tem configuration to determine whether entering single-user mode requires entering the root password. If it does not, then sulogin execs /sbin/sh with its argv[0] set to "-". That same exec is also done if the root password is correctly entered. The decision to enter the single-user mode depends on the state of the system configuration files. If the files cannot be read, then defaults are assumed (as described below). Therefore, the loss of a configuration file does not prevent access to the system console for repairing the problem. The sulogin program first checks the /etc/rc.config file for a the SECURE_CONSOLE variable. If such a variable is present, and it is set to a true value (either "TRUE", "ON", "YES", or "1"), then the program asks for the root password. The value of the SECURE_CONSOLE vari- able is checked in a case-independent fashion, and only a minimal match is necessary. Thus, the value is really checked against the fol- lowing regular expression: ^([Tt]|1|[Yy]|[Oo][Nn]).* If the SECURE_CONSOLE variable is present, but does not have one of the true values, then sulogin does not ask for the root password, but simply execs /sbin/sh as previously described. If the SECURE_CONSOLE variable is not found in the /etc/rc.config file, or if that file is missing or unreadable, then an attempt is made to obtain the value of the console firmware setting of the SECURE variable, using the GSI_PROM_ENV function of the getsysinfo() system call. If the check determines the console commands are password- protected, the sulogin program requests the root password. If sulogin has made the decision to request the root password, it also determines whether BASE or ENHANCED security should be used to vali- date that password. This is done using the value of the SECURITY variable from the /etc/rc.config file, unless that file was not readable, in which case the /etc/sia/matrix.conf file is read, looking for a line beginning with the string "siad_ses_init=", and containing either "(OSFC2," or "(BSD,". If the /etc/rc.config file was readable, but the SECURITY variable was not set, then BASE security is assumed. (This is how the /sbin/init.d/security script initializes the /etc/sia/matrix.conf file, as well). If the /etc/rc.config file can not be read and the /etc/sia/matrix.conf file either can not be read or does not have an appropriate siad_ses_init line, then the sulogin program checks to see whether the /etc/passwd file contains a valid entry for root and whether the getespwnam("root") function returns a valid extended profile. If both profile entries exist, but only one has a valid encrypted password field, that profile (and thus that security policy) is used. If both passwords are valid, the BASE security policy is used. Once the sulogin program has determined which security policy to use, it checks whether that policy has a valid account entry for user root (if not already checked while determining which policy to use), and whether that entry has a password that can be matched. If the password is impossible to match, or if no valid root profile exists, then sulogin prints a warning and execs /sbin/sh as previously described. For BASE security, a null encrypted password field for root causes the program to exec /sbin/sh without complaining. If there is a matchable root password, sulogin prints out "Single-user root login" and prompts for the password. If the entered password does not match (after the appropriate encryption if non-null), the program waits for 5 seconds (to deter break-in attempts, displays "Sorry", and re-prompts. If the program is interrupted or receives and end-of-file condition while attempting to read a password from the console terminal, it simply exits. This normally causes init to enter multi-user mode (It depends on system configuration information in /etc/inittab, specifically the entry marked with "initdefault", which ships at run-level "3"). This may also cause init to prompt for a run level, or to restart the sulogin program. Finally, if a password was collected, and it did match, the exec of /sbin/sh is done. If that exec fails, the reason for the failure is displayed, and the program sleeps for 5 seconds before exiting. Upon exiting control of the console is returned to the init process, as previously described for interrupt or end-of-file. FILES
/etc/rc.config /etc/sia/matrix.conf /etc/passwd /tcb/files/auth.db (/tcb/files/auth/r/root) RELATED INFORMATION
login(1), getpwnam(3), getespwnam(3), dispcrypt(3), matrix.conf(4), init(8) Security delim off sulogin(8)
All times are GMT -4. The time now is 11:51 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy