Solved

Unable to logon into Checkpoint SecurePlatform through ssh (putty)

Posted on 2009-03-31
6
2,891 Views
Last Modified: 2013-11-16
I am no longer able to logon to Checkpoint SecurePlatform through ssh (putty).  Whenever I try, "invalid password" message appears.  I can successfully logon through https and locally using the same logon credentials.  The last change I made prior to this occurring was editing the /etc/passwd to change the admin:x:0:0::/home/admin:/bin/cpshell > bash.  This allows you to logon with the expert mode.   Any suggestions on how I maybe to fix this?
0
Comment
Question by:hotrod_952
  • 4
  • 2
6 Comments
 
LVL 14

Expert Comment

by:grimkin
Comment Utility
Are you using putty or a terminal program or are you ssh'ing from a linux command line?

If using the command line, try:

ssh <ip> -l admin    

Editing the passwd file as you have stated above should not have caused any issues - is there anything in /var/log/messages pertaining to the failed login?

For future reference, an easier way to change the shell is:

chsh -s /bin/bash admin
0
 

Author Comment

by:hotrod_952
Comment Utility
I'm using putty.  I can logon locally and https, but not with putty.  It doesn't like the password.
0
 
LVL 14

Accepted Solution

by:
grimkin earned 500 total points
Comment Utility
Is there anything in the /var/log/messages file?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:hotrod_952
Comment Utility
I can't verify that because the FW is located remotely.  I will need to have the IT support person check it.
0
 

Author Comment

by:hotrod_952
Comment Utility
I fix it.   I checked the log messages and indicated that authentication was falling.  I changed the it back to cpshell then back to shell.  SSH is working successfully again.
0
 

Author Comment

by:hotrod_952
Comment Utility
Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video discusses moving either the default database or any database to a new volume.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now