Solved

How to get restricted shell to work in Trusted Extensions

Posted on 2014-02-11
4
222 Views
Last Modified: 2014-04-22
Hi,

 I am trying to limited access within a shell  for general users on a Solaris 10 Trusted Extensions box. I have tested this by changing the shell for a test user within /etc/passwd from /bin/sh to /usr/lib/rsh as well as rbash and rksh. Unfortunately when i try to login the system just kicks me back the log on screen. I have been able to login with the default shell and while in a zone type #rbash /rsh /rksh and successfully test that the restricted shell is working but i can not seems to login with the restricted shell. Any help would be greatly appreciated.

Thanks in advance.
0
Comment
Question by:mritwonderful
  • 2
  • 2
4 Comments
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 39853154
I think you must add the desired shell to the list of allowed ones

/etc/shells

wmp
0
 

Author Comment

by:mritwonderful
ID: 39861526
wmp,

I'm using Solaris 10 Trusted Extension on a x64 SPARC system. I do not have an /etc/shells directory. Is this something I need to create or should this be there already.
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 39861560
/etc/shells is not a directory but a file, containing the full paths to allowed shells, one per line.

If the file doesn't exist create it and retry.

You could also check the /etc/security directory, maybe the "shells" file is there now.

As you can see, I'm not a  "Trusted Extension" expert, but /etc/shells is pretty much standard in "normal" environments, so why not try it?
0
 

Author Comment

by:mritwonderful
ID: 39862184
Wmp,

Thanks for the quick response, its much appreciated. I will try this tomorrow when i get in.

Thanks again!
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question