I have the user "tech" added to my system. I want that user (tech) to be able to use sudo, but for only *one* command. ssh. I also want this to utilize the "NOPASSWD" feature.
What's the line I need to add to /etc/sudoers to allow only SSH (and sudo with the no password).
Personally I try to use sudo as much as possible, but as often as I'm moving around the file system it gets a little rough sometimes and I have to use su.
i have a cent os 5 box with directadmin on id like the user apache to be able to run iptables or apf but every time i allow apache to run the command its fine untill you have to add the extra command to tell it to drop then it just comes up with permissions denied
can any one help me with this please?
i've tryed
apache ALL = (root) NOPASSWD: /sbin/iptables
apache ALL=(ALL) ALL
and it still wont let me use apache to write to the deny rules list
How do I login to root with my sudo username and password? I do type su - in putty, but it gives me a "Disconnected: No supported authentication methods available."
today i changed the password for the admin panel for a customer (username eg. mylogin). 10 minutes later he called me and said that he cannot get into his emailaccount anymore. Checked the password and saw that the emailpassword for his emailaddress (eg. mylogin@mydomain.com) is now the same from the admin panel login. So i changed the emailpassword and checked the admin panel login - it now has the emailpassword. What a mess.. I'm running Plesk Panel 11.5.30 MU47.
my Server is : CentOS and my control panel is : Cpanel
my Freand have a mySQL password, but he donot know ROOT Password ( i change root password ) my Freand is a bad Boy ) can he attack Mysql or Mysql user by mysql password?
if he can attack server by Mysql password please help me about change Mysql password by CPANEL
I have successfully changed a shell user password but I cannot login with it via ssh cos its says wrong pass (with previous password can login) as well as any other users pass says wrong pass after a change.
I am transfering my database to a new host and well I need to create the same database (same name and username) along with the same password I used before (because a script im using is connected to it) then import the old .SQL files.
However I dont know how I can find out the current password linked to that database (When you create one it asks you for a password remember?) Anyclue how to find it out? I cant change it I need to know what it is still.
if this is possible, when I create a new client in Plesk I want to automatically generate a complicated password, as opposed to me making up one for a client...
I am using HC7 to manage my hosting plans for my company. The hosting Server have Mail server (MDaemon) and it configured. However, SMTP service in IIS6.0 is not enable. I tried to get password to login HC7. it is tested 2 times : first time : Boths SMTP service in MDaemon and IIS are enable ....result : all things are ok second times : SMTP service is disable in IIS, SMTP service in MDaemon still enable...result : anymail are sent customers to get password.
I suggested : Enable SMTP service in IIS, but my boss (before he also worked with windows hosting ) said that it not need to enable.
May 28 16:23:06 server sshd(pam_unix)[13017]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root
I got so many of this line in my server log.
First of all, where is the server log located anyway? I got this from SIM.
May 28 16:23:09 server sshd(pam_unix)[13037]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:11 server sshd(pam_unix)[13045]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:11 server sshd(pam_unix)[13061]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13066]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13067]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13071]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 17:00:02 server ntpdate[19626]: adjust time server 192.5.41.40 offset 0.343837 sec May 28 18:00:07 server ntpdate[28711]: adjust time server 192.5.41.40 offset 0.344493 sec May 28 19:00:06 server ntpdate[3218]: adjust time server 192.5.41.40 offset 0.342326 sec May 28 20:00:02 server ntpdate[8283]: adjust time server 192.5.41.40 offset 0.341603 sec May 28 21:00:07 server ntpdate[13899]: adjust time server 192.5.41.40 offset 0.343715 sec May 28 21:37:45 server sshd(pam_unix)[17268]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17271]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17270]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17254]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root
In my linux vps (cpanel based) hackers have hacked the password of the user ( website owner ) and he have uploaded some hack files(PHP) through FTP. Sometimes the hacker uploads perl/CGI scripts and sends spam mails .This happens frequently in server. How the hacker gets the users password? How can i prevent my users and server from this security issue?