Sponsored Content
Full Discussion: Telnet in redhat linux
Operating Systems Linux Telnet in redhat linux Post 97813 by infierno on Thursday 2nd of February 2006 02:08:13 PM
Old 02-02-2006
It is a normal behaviour since root remote access is disabled by default for security reasons (you always should connect as a normal user and the "su" root)... anyway, to disable this feature you should add the allowed ttys for root access. To do such thing edit the /etc/securetty file, add pts/0, pts/1, and so on.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

redhat linux 7.3

hi, just installed redhat linux 7.3 on my server, and put it in gnome gui. Does anyone know what software i need to run a web server??? and what software i need to set up a proxy to secure it? also, if these are free to download, can you give me the links. Thanx (2 Replies)
Discussion started by: matt2kjones
2 Replies

2. UNIX for Dummies Questions & Answers

RedHat linux questions??

1. is redhat linux 7.3 the latest version ?? 2. where can i find FREE documentation regarding it ?? installation , etc... Thanks (2 Replies)
Discussion started by: BAM
2 Replies

3. UNIX Desktop Questions & Answers

RedHat Linux Cd

I am wondering if anyone has copies (or can burn me a copy) of RedHat Linux. I will pay shipping charges... I don't have a CD burner and i dont want to run it off of my hard drive... please email me at: empireinfo623@yahoo.com or baldwitm@muc.edu (5 Replies)
Discussion started by: thedude623
5 Replies

4. UNIX for Dummies Questions & Answers

Linux RedHat. Help please.

I from russia. install rus Linux RedHat. When i load linux it ask me for user name and pass... and up of ask form label: Welcome to localhost... dont remember... what i want write in it? (sorry, bad english..:( ).. (1 Reply)
Discussion started by: Sen
1 Replies

5. Slackware

Redhat Linux?

Hi, I use linux and it is a great OS, I use Redhat Linux 9 and I was wondering are they going to update 9 or they'll be leaving that to the fedora project? I would like a stable linux distro. Thanks -n (9 Replies)
Discussion started by: Insomniac
9 Replies

6. UNIX for Dummies Questions & Answers

Redhat Linux?

I seen a pool that said Linux was the most popular Unix download. I then seen Redhat Linux is the most popular Linux download. Is there a difference? Is it the better program/s? (6 Replies)
Discussion started by: Mr_Pinky
6 Replies

7. Red Hat

telnet idle timeout on Redhat kernel 2.4.35.4

Hello, I've searched this forum for telnet idle timeout problem. I tried to set timeout parameters in /etc/profile readonly TMOUT=10 export TMOUT This doesn't work for Redhat kernel 2.4.35.4. It's really frustrating. Can anybody tell me what else I could try? Thanks a lot! jing (0 Replies)
Discussion started by: jing han
0 Replies

8. Red Hat

telnet in Redhat 5 update 3

how to restart the telnet daemon in Redhat 5 Update 3. I am not able to find the path /etc/init.d/xinetd restart /etc/init.d/inetd restart (4 Replies)
Discussion started by: gunnervarma
4 Replies

9. UNIX and Linux Applications

Redhat Linux 5

Can anyone help me outwith the post installation script.I'm newbie to scripting! i need to customize the post installation script using kickstart..here are the requirements to be set set permissions /etc/crontab =400 /etc/securetty=400 /etc/sysctl.conf=600 and following services to be set OFF... (1 Reply)
Discussion started by: bvkumar
1 Replies

10. Red Hat

Difference Redhat Linux/RH Enterprise Linux

what is the difference between Redhat Linux and Redhat Enterprise Linux. whereas Redhat linux have Server installation options too. (2 Replies)
Discussion started by: hananabbas
2 Replies
PAM_SECURETTY(8)						 Linux-PAM Manual						  PAM_SECURETTY(8)

NAME
pam_securetty - Limit root login to special devices SYNOPSIS
pam_securetty.so [debug] DESCRIPTION
pam_securetty is a PAM module that allows root logins only if the user is logging in on a "secure" tty, as defined by the listing in /etc/securetty. pam_securetty also checks to make sure that /etc/securetty is a plain file and not world writable. It will also allow root logins on the tty specified with console= switch on the kernel command line and on ttys from the /sys/class/tty/console/active. This module has no effect on non-root users and requires that the application fills in the PAM_TTY item correctly. For canonical usage, should be listed as a required authentication method before any sufficient authentication methods. OPTIONS
debug Print debug information. noconsole Do not automatically allow root logins on the kernel console device, as specified on the kernel command line or by the sys file, if it is not also specified in the /etc/securetty file. MODULE TYPES PROVIDED
Only the auth module type is provided. RETURN VALUES
PAM_SUCCESS The user is allowed to continue authentication. Either the user is not root, or the root user is trying to log in on an acceptable device. PAM_AUTH_ERR Authentication is rejected. Either root is attempting to log in via an unacceptable device, or the /etc/securetty file is world writable or not a normal file. PAM_INCOMPLETE An application error occurred. pam_securetty was not able to get information it required from the application that called it. PAM_SERVICE_ERR An error occurred while the module was determining the user's name or tty, or the module could not open /etc/securetty. PAM_USER_UNKNOWN The module could not find the user name in the /etc/passwd file to verify whether the user had a UID of 0. Therefore, the results of running this module are ignored. EXAMPLES
auth required pam_securetty.so auth required pam_unix.so SEE ALSO
securetty(5), pam.conf(5), pam.d(5), pam(7) AUTHOR
pam_securetty was written by Elliot Lee <sopwith@cuc.edu>. Linux-PAM Manual 09/19/2013 PAM_SECURETTY(8)
All times are GMT -4. The time now is 11:16 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy