Solved

uucp

Posted on 1997-02-19
4
263 Views
Last Modified: 2013-12-16
I am using Solaris 2.5.
I want to have a login and a password when someone want to use uucp between to machine.
what do I have to do ?
I 'll know that it existe a file /etc/uucp/Permission.
if someone as a exemple of this file that could be very nice.
0
Comment
Question by:burnotte
4 Comments
 
LVL 1

Expert Comment

by:rjhoward
ID: 1811906
There is not a simple answer to your question.  Whole volumes have been written on uucp.  O'Reilly & Assoc has a good one (see http://www.ora.com for ordering info).

Sun has a writeup on their site which explains how to setup uucp on Solaris 2.2; 2.5 shouldn't be much different:

  http://sunsolve.sun.com/cserve/Sparc-FAQ/102201.faq

0
 
LVL 2

Expert Comment

by:df020797
ID: 1811907
To use UUCP you got to insytall the Taylor UUCP packafge or any other UUCP package. You laso need support for UUCP in your sendmail.cf and your sendmail binary, I suggest you read the O'Reilly UUCP and Sendmail books.
0
 
LVL 1

Author Comment

by:burnotte
ID: 1811908

0
 
LVL 1

Accepted Solution

by:
rfedane earned 100 total points
ID: 1811909
Here is an entry of Permissions file:


MACHINE=remote-machine LOGNAME=uremote MYNAME=your-machine \
COMMANDS=uucp \
READ=/usr/spool/uucppublic:/usr/hack/tmp \
WRITE=/usr/spool/uucppublic:/usr/hack/tmp \
SENDFILES=yes REQUEST=yes


The MACHINE value is the name of the remote machine.
The LOGNAME value is the login name the remote machine
will use. Note that it is eight characters or less. You
should create a user called "uremote" (or whatever) in /etc/passwd.
The MYNAME is what your machine calls itself. The remote machine will need to know this for his configuration.
READ, WRITE are directories allowed to be accessed.
SENDFILES, REQUEST says that remote-machine can upload
and download.

This is just a generic example.
I strongly suggest you get the O'Reily book, since there is
a lot more options and security issues involved. And there
a quite a few files that you need to mess with to get it working.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now