Solved

Linux equivalent to the solaris /etc/default/login file

Posted on 2001-07-25
15
2,160 Views
Last Modified: 2013-12-05
Is there an equivalent linux file to the solaris /etc/default/login file which can define whether the root user can login across the network or only from the consol?

Thanks
0
Comment
Question by:cht
  • 4
  • 3
  • 3
  • +3
15 Comments
 
LVL 17

Expert Comment

by:dorward
ID: 6319415
0
 
LVL 4

Expert Comment

by:garisoain
ID: 6319525
root access from console or network?

check:    /etc/inittab
it's well commented...

Hope this helps
-garisoain
0
 
LVL 3

Expert Comment

by:tdaoud
ID: 6320616

It is the file /etc/securetty, there you add the terminals that you want to enable root login from.

Good luck,

Tarik
0
Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

 
LVL 4

Expert Comment

by:garisoain
ID: 6320679
=) yep... dorward is right... so is tdaoud, both comments refer to /etc/securetty.. =)

what i was thinking? =)
0
 

Author Comment

by:cht
ID: 6321071
Do you know what the line would be that needed to be included in the /etc/securetty file to allow root telnet access?

Thanks
0
 
LVL 3

Accepted Solution

by:
tdaoud earned 50 total points
ID: 6321094

You need to add the line

pts/0

for telnet terminal 1 and

pts/1

for second telnet session

So let's say you add

pts/0

if you are the only one to telnet at the server you can login, if someone else is already in a telnet session then you cannot unless you have

pts/1

and so on, so you need to determine the number of telnet sessions to allow for root to login from.

Tarik
0
 
LVL 17

Expert Comment

by:dorward
ID: 6321455
Allowing root telnet access is a BAD BAD idea as passwords are sent across the network unencrypted.

You would be much better installing OpenSSH and using that as it will encrypt the data. (It also has other useful features such as data compression to speed up access over slow network connections)
0
 
LVL 3

Expert Comment

by:tdaoud
ID: 6321510

I strongly agree with dorward security related remarks.

Tarik
0
 
LVL 17

Expert Comment

by:dorward
ID: 6321751
To take it a stage further, I do not install (or uninstall) telnetd from all my systems and allow all remote users access only through encrypted proticals. There are SSH clients for Windows users in the form of a terra term pro plug in, putty, and part of cygwin.
0
 
LVL 5

Expert Comment

by:vsamtani
ID: 6322252
I just tried adding pts/0 , pts/1 etc to my /etc/securetty and it didn't permit root login by telnet; however, adding the lines

0
1
2
3

allowed me to login as root from a telnet session. I don't know if this is something dependent on versions of login, telnetd, etc.

All the warnings above re insecurity of telnet are very valid - telnet simply should not be used over an insecure wire, which is more or less any wire other than a cross-over cable whose entire length you can see...

Vijay
0
 
LVL 3

Expert Comment

by:tdaoud
ID: 6322425

I'm talking about RedHat version 7.1

It could be different for other versions of UNIX/Linux's

In the past I can't recall which RedHat version it used to be ttyp0, ttyp1, ...etc

One way I can tell the terminal name is while I'm logged in I would do the "who" command and it would show me the terminals names from where people are logging in from or at least mine if I was the only user telneting in.

Tarik
0
 
LVL 5

Expert Comment

by:vsamtani
ID: 6322544
Yes, I think it must be version-specific - I was just checking on a Redhat 6.1 system. The output from ps and who is misleading, though - it says pts/0 is where I am logged in, but this doesn't work for /etc/securetty. However, the clue (I think) is in /var/log/secure - I disabled /etc/securetty by renaming it, then telnetted in as root, and got a message in /var/log/secure saying:

Jul 26 16:31:13 gate login: ROOT LOGIN ON 2 FROM vs32

- note the LOGIN ON 2, rather than LOGIN ON PTS/2

Vijay
0
 
LVL 5

Expert Comment

by:paulqna
ID: 6330380
1) Install ssh and make sure this works (also after reboot)
2) Create empty /etc/securetty.
3) additionally: Restrix acces using /etc/hosts.allow /etc/hosts.deny

0
 

Author Comment

by:cht
ID: 6335308
Thanks for your help. I think I probably will restrict root access - but it's still good to know...
0
 

Author Comment

by:cht
ID: 6335309
Thanks for your help. I think I probably will restrict root access - but it's still good to know...
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Attention: This article will no longer be maintained. If you have any questions, please feel free to mail me. jgh@FreeBSD.org Please see http://www.freebsd.org/doc/en_US.ISO8859-1/articles/freebsd-update-server/ for the updated article. It is avail…
When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question