Solved

Linux equivalent to the solaris /etc/default/login file

Posted on 2001-07-25
15
2,038 Views
Last Modified: 2013-12-05
Is there an equivalent linux file to the solaris /etc/default/login file which can define whether the root user can login across the network or only from the consol?

Thanks
0
Comment
Question by:cht
  • 4
  • 3
  • 3
  • +3
15 Comments
 
LVL 17

Expert Comment

by:dorward
Comment Utility
0
 
LVL 4

Expert Comment

by:garisoain
Comment Utility
root access from console or network?

check:    /etc/inittab
it's well commented...

Hope this helps
-garisoain
0
 
LVL 3

Expert Comment

by:tdaoud
Comment Utility

It is the file /etc/securetty, there you add the terminals that you want to enable root login from.

Good luck,

Tarik
0
 
LVL 4

Expert Comment

by:garisoain
Comment Utility
=) yep... dorward is right... so is tdaoud, both comments refer to /etc/securetty.. =)

what i was thinking? =)
0
 

Author Comment

by:cht
Comment Utility
Do you know what the line would be that needed to be included in the /etc/securetty file to allow root telnet access?

Thanks
0
 
LVL 3

Accepted Solution

by:
tdaoud earned 50 total points
Comment Utility

You need to add the line

pts/0

for telnet terminal 1 and

pts/1

for second telnet session

So let's say you add

pts/0

if you are the only one to telnet at the server you can login, if someone else is already in a telnet session then you cannot unless you have

pts/1

and so on, so you need to determine the number of telnet sessions to allow for root to login from.

Tarik
0
 
LVL 17

Expert Comment

by:dorward
Comment Utility
Allowing root telnet access is a BAD BAD idea as passwords are sent across the network unencrypted.

You would be much better installing OpenSSH and using that as it will encrypt the data. (It also has other useful features such as data compression to speed up access over slow network connections)
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 3

Expert Comment

by:tdaoud
Comment Utility

I strongly agree with dorward security related remarks.

Tarik
0
 
LVL 17

Expert Comment

by:dorward
Comment Utility
To take it a stage further, I do not install (or uninstall) telnetd from all my systems and allow all remote users access only through encrypted proticals. There are SSH clients for Windows users in the form of a terra term pro plug in, putty, and part of cygwin.
0
 
LVL 5

Expert Comment

by:vsamtani
Comment Utility
I just tried adding pts/0 , pts/1 etc to my /etc/securetty and it didn't permit root login by telnet; however, adding the lines

0
1
2
3

allowed me to login as root from a telnet session. I don't know if this is something dependent on versions of login, telnetd, etc.

All the warnings above re insecurity of telnet are very valid - telnet simply should not be used over an insecure wire, which is more or less any wire other than a cross-over cable whose entire length you can see...

Vijay
0
 
LVL 3

Expert Comment

by:tdaoud
Comment Utility

I'm talking about RedHat version 7.1

It could be different for other versions of UNIX/Linux's

In the past I can't recall which RedHat version it used to be ttyp0, ttyp1, ...etc

One way I can tell the terminal name is while I'm logged in I would do the "who" command and it would show me the terminals names from where people are logging in from or at least mine if I was the only user telneting in.

Tarik
0
 
LVL 5

Expert Comment

by:vsamtani
Comment Utility
Yes, I think it must be version-specific - I was just checking on a Redhat 6.1 system. The output from ps and who is misleading, though - it says pts/0 is where I am logged in, but this doesn't work for /etc/securetty. However, the clue (I think) is in /var/log/secure - I disabled /etc/securetty by renaming it, then telnetted in as root, and got a message in /var/log/secure saying:

Jul 26 16:31:13 gate login: ROOT LOGIN ON 2 FROM vs32

- note the LOGIN ON 2, rather than LOGIN ON PTS/2

Vijay
0
 
LVL 5

Expert Comment

by:paulqna
Comment Utility
1) Install ssh and make sure this works (also after reboot)
2) Create empty /etc/securetty.
3) additionally: Restrix acces using /etc/hosts.allow /etc/hosts.deny

0
 

Author Comment

by:cht
Comment Utility
Thanks for your help. I think I probably will restrict root access - but it's still good to know...
0
 

Author Comment

by:cht
Comment Utility
Thanks for your help. I think I probably will restrict root access - but it's still good to know...
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Attention: This article will no longer be maintained. If you have any questions, please feel free to mail me. jgh@FreeBSD.org Please see http://www.freebsd.org/doc/en_US.ISO8859-1/articles/freebsd-update-server/ for the updated article. It is avail…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now