- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Detecting failed logins in Trusted System???
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-12-2006 06:04 AM
тАО09-12-2006 06:04 AM
I've been levied by our in-house security team to write a script that will email our systems admins whenever someone attempts to login as root and fails.
For users attempting to login through "su" and "ssh", this is pretty straightforward, as these are logged in the sulog and syslog.log, respectively. However, the logins through "telnet" (yes, we haven't been allowed to turn that off yet, go figure), for some reason do NOT log in syslog, at least not for Trusted Systems.
My requirement is that I need to detect when someone generates enough failed logins (5) to kick them out of the login program. Can someone please point me in the right direction on this?
Thanks in advance!
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-12-2006 06:08 AM
тАО09-12-2006 06:08 AM
SolutionYou can take a look at this page : http://docs.hp.com/en/B2355-90121/ch02s05.html
-Arun
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-12-2006 06:09 AM
тАО09-12-2006 06:09 AM
Re: Detecting failed logins in Trusted System???
lastb
The command reads the binary file /var/adm/btmp and will provide the information.
You will probably want to select by date so you don't get the same complete report every day.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-12-2006 06:22 AM
тАО09-12-2006 06:22 AM
Re: Detecting failed logins in Trusted System???
Is your inetd daemon running with the logging enabled ?
UNIX because I majored in cryptology...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-12-2006 06:26 AM
тАО09-12-2006 06:26 AM
Re: Detecting failed logins in Trusted System???
That's *exactly* the information I was looking for. I should be able to stick the audisp into my script to grab what I need.
Thanks a bunch!