Solved

access dinied login fedora4

Posted on 2006-07-08
3
296 Views
Last Modified: 2013-12-16
Hi Experts

I traying to login my server (Fedora4) vi SSH and only root can , the rest od the users in the passwd file are refused , here its a copy of my passwd file :

# cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
news:x:9:13:news:/etc/news:
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
rpm:x:37:37::/var/lib/rpm:/sbin/nologin
haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
pcap:x:77:77::/var/arpwatch:/sbin/nologin
nscd:x:28:28:NSCD Daemon:/:/sbin/nologin
named:x:25:25:Named:/var/named:/sbin/nologin
netdump:x:34:34:Network Crash Dump user:/var/crash:/bin/bash
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
rpc:x:32:32:Portmapper RPC user:/:/sbin/nologin
mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:4294967294:4294967294:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
apache:x:48:48:Apache:/var/www:/sbin/nologin
xfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologin
ntp:x:38:38::/etc/ntp:/sbin/nologin
squid:x:23:23::/var/spool/squid:/sbin/nologin
mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bash
vuser:x:1000:1000::/tmp:/noshell
ocampo:x:1081:1081::/home/ocampo:/bin/bash
colomes:x:1084:1084::/home/colomes:/bin/bash
newftpuser:x:1085:2002::/dev/null:/etc
paraic:x:1088:1088::/var/www/vhosts/:/bin/bash
cancerbasics:x:1089:1089::/var/www/vhosts/uicc.org/web/cancerbasics/:/bin/bash
cancercontrol:x:1090:1090::/var/www/vhosts/uicc.org/cancercontrol/:/bin/bash
webdevelop:x:1091:1091::/var/www/vhosts/:/bin/bash
cocoliso:x:1092:0::/home/cocoliso:/bin/bash


but only root can login , the rest got access denied
Please
what can i do ?

thanks
0
Comment
Question by:diegomirner
  • 2
3 Comments
 
LVL 22

Expert Comment

by:pjedmond
ID: 17066432
If the last part of the /etc/passwd file is /sbin/nologin, then that account will always be denied.....because funnily enough nologin is just that;). Same applies to /noshell. However, the ones with /bin/bash as the last term *should* be able to login....assuming that you know their passwd.

Let's take the last account:

cocoliso:x:1092:0::/home/cocoliso:/bin/bash

Login as root, and then reset the password for this account:

#passwd cocoliso

and enter a new passwd. (twice)

Log out, and then try logging in as cocoliso. That *should* work. If not, then let us know how it goes:)

(   (()
(`-' _\
 ''  ''





0
 

Author Comment

by:diegomirner
ID: 17079652
It didint work , any idea ?

0
 
LVL 22

Accepted Solution

by:
pjedmond earned 500 total points
ID: 17079697
Any particular error? Still got access denied?

Output from:

ls -al /home

does /home/cocoliso exist?

tail -f -n50 /var/log/secure

will give details as to the cause of the failure.

(   (()
(`-' _\
 ''  ''


0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now