Solved

How to get restricted shell to work in Trusted Extensions

Posted on 2014-02-11
4
217 Views
Last Modified: 2014-04-22
Hi,

 I am trying to limited access within a shell  for general users on a Solaris 10 Trusted Extensions box. I have tested this by changing the shell for a test user within /etc/passwd from /bin/sh to /usr/lib/rsh as well as rbash and rksh. Unfortunately when i try to login the system just kicks me back the log on screen. I have been able to login with the default shell and while in a zone type #rbash /rsh /rksh and successfully test that the restricted shell is working but i can not seems to login with the restricted shell. Any help would be greatly appreciated.

Thanks in advance.
0
Comment
Question by:mritwonderful
  • 2
  • 2
4 Comments
 
LVL 68

Expert Comment

by:woolmilkporc
Comment Utility
I think you must add the desired shell to the list of allowed ones

/etc/shells

wmp
0
 

Author Comment

by:mritwonderful
Comment Utility
wmp,

I'm using Solaris 10 Trusted Extension on a x64 SPARC system. I do not have an /etc/shells directory. Is this something I need to create or should this be there already.
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
Comment Utility
/etc/shells is not a directory but a file, containing the full paths to allowed shells, one per line.

If the file doesn't exist create it and retry.

You could also check the /etc/security directory, maybe the "shells" file is there now.

As you can see, I'm not a  "Trusted Extension" expert, but /etc/shells is pretty much standard in "normal" environments, so why not try it?
0
 

Author Comment

by:mritwonderful
Comment Utility
Wmp,

Thanks for the quick response, its much appreciated. I will try this tomorrow when i get in.

Thanks again!
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now