10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello ,
I am trying to run a NetBackup command in remote server. Also this command can only be run by root so I am using sudo . Also I want the output of the command locally in a file.
The below command asked for password , ran successfully and showed Output on my local server screen
... (2 Replies)
Discussion started by: rahul2662
2 Replies
2. HP-UX
Hi All
I had installed sudo in HP UX 11.3 and it is working fine but not able to make entry required to set permission similar to ROOT without using password (PASSWD) change option for define user in /etc/sudoers file
Please help if some know the syntex? :confused::wall: (2 Replies)
Discussion started by: deviltech
2 Replies
3. UNIX for Dummies Questions & Answers
I have checked the man page ,which says :
The -H (HOME) option sets the HOME environment variable to the homedir of
the target user (root by default) as specified in passwd(5). By default,
sudo does not modify HOME
But I have tried below command:
#... (1 Reply)
Discussion started by: Michaelw321
1 Replies
4. Shell Programming and Scripting
I have a script in Server A that will run a script in ServerB.
#!/bin/ksh/
ssh user@server "/path/script.sh"
The script permissions are as follow:
-rwxrwxrwx 1 user dba 75 Jun 11 10:00 script.sh
I checked the existence of 'ksh' in /bin and its there. (bash isnt)
... (0 Replies)
Discussion started by: RedSpyder
0 Replies
5. HP-UX
Hi.
i have the accessibility to cat the /et/passwd file
in this file we see the paassword field but the password is in encrypted form
So, it can be possible to get the password encrypted string to convert it into human readable string via some md5 encryption code mechanism etc..
... (6 Replies)
Discussion started by: Rajesh1091
6 Replies
6. Solaris
Hi all,
I have got a problem,
i have Solaris 8 server, where on running the passwd command, it says permission denied. I have checked /bin/passwd, /etc/passwd, /etc/shadow all have permissions as like one working server.
It is happening for root user and all other users.
i have tried... (6 Replies)
Discussion started by: varunksharma87
6 Replies
7. UNIX for Advanced & Expert Users
Hello All,
We could see that suid with execute is set for passwd:
-rwsr-xr-x 1 root root 22960 Jul 17 2006 /usr/bin/passwd
that means if any user execute command passwd that will be executed with root priviledge then why a normal user was not able to change other user password
any... (2 Replies)
Discussion started by: NIMISH AGARWAL
2 Replies
8. Shell Programming and Scripting
Hi Gurus,
I have small issue...
I used to pass the passwd for sudo commands like below,
gzcat ~/passwd.gz | sudo su - <villin> >> eof
------
-----
------
eof
And it was able to login into "villin" sudo account successfully. But now, I'm using the same in another script for the... (2 Replies)
Discussion started by: raghu.iv85
2 Replies
9. Shell Programming and Scripting
hi guys,
i have a query, i wrote a perl script that will collect cpu statistics
Scripts/myScripts/
cpu.pl
i want to make this file so that i can run it from any location on any drive,
without giving the path explicitly.
like
$/home/ravi/perl
cpu.pl
i tried this... (8 Replies)
Discussion started by: niteesh_!7
8 Replies
10. Shell Programming and Scripting
Hi,
I logged into a UNIX system as user ABC.
I do not have root previleges and also do not have root password.
I am executing few commands as:
ABC****>sudo su - XYZ
XYZ****>rm file1.txt
XYZ****>exit
ABC****>
Now I want to execute all these commands from a .sh file ( or in any other... (2 Replies)
Discussion started by: _prasad
2 Replies
LOCKOUT(1) lockout LOCKOUT(1)
NAME
lockout - avoid slacking and impose productivity and discipline on yourself
WARNING
This program is VERY DANGEROUS. If it fails, you may end up not knowing the root password to your own computer (in which case you need to
boot into single-user mode). There are no known reports of this actually happening, but we don't know how stupid you are. Also, you
should probably not run this on a multi-user system.
SYNOPSIS
lockout lock HhMm | Hh | Mm
lockout lock HH:MM
lockout lock HH:MMam | HH:MMpm
lockout lock HHam | HHpm
lockout lock
lockout unlock [force]
lockout status
DESCRIPTION
Lockout is a tool that imposes discipline on you so that you get some work done. For example, lockout can be used to install a firewall
that does not let you browse the Web. Lockout changes the root password for a specified duration; this prevents you from secretly ripping
down the firewall and then browsing the Web anyway. In case of an emergency, you can reboot your computer to undo the effects of lockout
and to restore the original root password.
Obviously, lockout lock and lockout unlock can only be run by root. lockout status can be run by any user.
lockout without any parameters shows a brief help message.
lockout lock takes one optional parameter. If no parameter is given, you are dropped in interactive mode and asked for the duration of the
lock or the time at which the lock should be lifted. You can also supply this as a parameter on the command line. Lockout understands
various time formats. You can specify a delay, e.g., 3h (3 hours), 1h30m (1 hour and 30 minutes), or 90m (1 hour and 30 minutes), or you
can specify absolute time, e.g., 2pm, 2:30am, 15:30, etc. You will be asked to confirm the time at which lockout will unlock your system.
If you type "yes", lockout executes /etc/lockout/lock.sh and changes the root password to something completely random. /etc/lock-
out/lock.sh is a shell script that you write. It takes measures to make sure you stop slacking. For example, it could install a firewall
that prevents outgoing connections to port 80. See the "EXAMPLES" section below.
lockout unlock takes an optional force parameter. Without any parameters, lockout lock will check whether it is time to unlock the system
and, if so, executes /etc/lockout/unlock.sh, which is a shell script that you write. It should undo the effects of /etc/lockout/lock.sh,
executed when the system was locked. If you pass the force parameter to lockout unlock, lockout will forcibly unlock your system, whether
it was really time for that or not. lockout unlock should be called every minute by cron. See "CONFIGURATION".
lockout status will print out the time at which the system is going to be unlocked.
CONFIGURATION
/etc/cron.d/lockout must contain the following two entries:
*/1 * * * * root /usr/bin/lockout unlock >/dev/null 2>&1
@reboot root /usr/bin/lockout unlock force >/dev/null 2>&1
The examples that follow assume you are using sudo(8) and you have a file, /etc/lockout/sudoers.normal which is the normal /etc/sudoers
file, and /etc/lockout/sudoers.lock, which is the /etc/sudoers file when lockout locks your computer. This example also assumes you are
using iptables(8). /var/lib/iptables/active should contain your default firewall rules, and /var/lib/iptables/work should contain the
firewall rules that enforce discipline. See below for an example.
/etc/lock/lock.sh imposes discipline. For example:
#!/bin/sh
/etc/init.d/iptables load work
cp /etc/lockout/sudoers.lock /etc/sudoers
/etc/init.d/sudo stop
/etc/init.d/sudo start
/etc/lock/unlock.sh undoes these effects. For example:
#!/bin/sh
/etc/init.d/iptables restart
cp /etc/lockout/sudoers.normal /etc/sudoers
/etc/init.d/sudo stop
/etc/init.d/sudo start
Your /var/lib/iptables/work may look something like this:
*filter
:INPUT ACCEPT [1047:99548]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1104:120792]
# allow incoming packets from localhost, ntp,
# and existing connections
-A INPUT -i lo -j ACCEPT
-A INPUT -p udp -m udp --source-port ntp -m state --state ESTABLISHED -j ACCEPT
-A INPUT -m state --state ESTABLISHED -j ACCEPT
-A INPUT -p tcp -j DROP
-A INPUT -p udp -j DROP
# allow outgoing connections for email and DNS
-A OUTPUT -d 127.0.0.1/8 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport smtp -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport domain -j ACCEPT
-A OUTPUT -p udp -m udp --dport domain -j ACCEPT
-A OUTPUT -j DROP
COMMIT
EXAMPLES
lockout lock 2h30m [locks out for 2h and 30m]
lockout lock 90m [locks out for 1h and 30m]
lockout lock 3pm [locks out until 3pm]
lockout lock 3:20am [locks out until 3:20am]
lockout lock 15:20 [locks out until 3:20pm]
lockout status [shows when the system is going to be unlocked]
FILES
/etc/lockout/lock.sh: executed when running lockout lock
/etc/lockout/unlock.sh: executed when running lockout unlock
SEE ALSO
usermod(8), iptables(8), passwd(1), cron(8), crontab(1)
BUGS
Arguably, a program that changes the root password to something random with the possibility of never recovering the original password might
be considered a bug by itself. Other than that, no known bugs.
AUTHOR
Thomer M. Gil, http://thomer.com/lockout/
lockout 2004-09-08 LOCKOUT(1)