Solved

ROOT access from remote computer.

Posted on 1999-01-02
8
257 Views
Last Modified: 2013-12-15
Hello,

1. I just installed RedHat 5.2 Kernel 2.0.36 on my     computer.
    When I connect from a remote computer ROOT gives
    invalid password but it is the right password.

2. How can I make a shadowed user. When I
   make a new user the password is not shadowed.

Thanks for the help.
Vincent
0
Comment
Question by:Vincentg
8 Comments
 
LVL 4

Expert Comment

by:swwelsh
ID: 1632064
Redhat by default won't allow root access from another machine because it is a security hole. It is better to set up a user account and give that account permission to do the things you want to do.
0
 

Author Comment

by:Vincentg
ID: 1632065
Okee thanks for the information swwelsh.

Vincent
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1632066
 You can't login as root directly from another machine (or at least not without editing some config files.  However, DON'T setup a user account with root permissions - that's just like having a root login available.  Have a normal user account, and login using it, and then use the 'su' command to become root whenever you need extra privileges.
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 
LVL 2

Expert Comment

by:benten
ID: 1632067
You should checkout the shadow-utils package.  In that package are programs to convert the passwd (pwconv and pwunconv) and group (grpconv and grpunconv) files to and from shadowed form as well as other information pertaining to shadowing.
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1632068
 Oh yeah, I forgot to answer part 2).  It sounds like you might be using some system to add users which doesn't know about shadowed passwords.
  You should be able to just do it manually by editing /etc/passwd - just make sure you specify a * in the password field, and give the user a unique login and user id.  The shadow passwords are likely to be in /etc/shadow, but you may need to check the filename on your system.
  If you do use a program to create users, you can just copy the password it generates (from /etc/passwd) into /etc/shadow -- then just blank out the password in /etc/passwd with a *.  This should do the trick.
0
 

Accepted Solution

by:
alexmo earned 10 total points
ID: 1632069
If you really *MUST* do what you are asking for, you need to setup whatever terminal you are connecting from as a secure terminal.   For instance, if you have a dial-up configured on ttyS0..  edit the file /etc/securetty and add ttyS0 to the list (you'll notice that only tty1-tty8 are listed.  those are your "consoles" at the machine).

If you are doing this for "virtual" terminals (telnet sessions), you'd add ttyp0, ttyp1, etc..

This, however is NOT recommended as anything you'll ever need to do can be done by logging in as a regular user and su'ing to root from there.

For your second question...  su to root <grin> and run /usr/sbin/pwconv5.  That should turn on default shadowing.
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1632070
 If the system has even several users, though, it's most unlikely you'll ever get the same psuedo tty number.  I'd never make anything a secure device apart from the console.
0
 
LVL 2

Expert Comment

by:benten
ID: 1632071
Redhat 5.2 is setup to use shadow passwords but not by default.  Please look at the man pages for the conversions programs that I mentioned in my earlier comment.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Guacamole and browser performance 1 86
Ubuntu not booting - How get past GRUB? 3 43
Adding more CPU cores to a Linux VM 5 94
Securing Azure Oracle instance of Linux VM 4 56
Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question