Re: Philosophy: connecting to a Linux server

2007-04-07 Thread Bruce . Lightsey
I thought lime disease was from squeezing too much of the juice into a gin
 tonic and a backtick there would make one fall off the barstool - must
fight such a dangerous affliction !!





 Rob van der Heij
 [EMAIL PROTECTED]
 m To
 Sent by: Linux on LINUX-390@VM.MARIST.EDU
 390 Port   cc
 [EMAIL PROTECTED]
 IST.EDU  Subject
   Re: Philosophy: connecting to a
   Linux server
 04/06/2007 01:56
 AM


 Please respond to
 Linux on 390 Port
 [EMAIL PROTECTED]
 IST.EDU






On 4/5/07, John Summerfield [EMAIL PROTECTED] wrote:

  Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

 Including ticks, of course.

Sure, since ticks may transfer lime disease. Would backticks help fight it?

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-07 Thread Adam Thornton

On Apr 6, 2007, at 8:53 AM, [EMAIL PROTECTED] wrote:


I thought lime disease was from squeezing too much of the juice
into a gin
 tonic and a backtick there would make one fall off the barstool -
must
fight such a dangerous affliction !!


That condition usually indicates an insufficiency of gin.

Rest assured, I'm doing my part to combat it.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-06 Thread Rob van der Heij

On 4/5/07, John Summerfield [EMAIL PROTECTED] wrote:


 Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Including ticks, of course.


Sure, since ticks may transfer lime disease. Would backticks help fight it?

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-06 Thread David Boyes
 Adam Thornton wrote:
  On Apr 5, 2007, at 4:13 PM, John Summerfield wrote:
  Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.
  Including ticks, of course.
 
  Unless you have REALLY pointy shoes, stamping doesn't really help
  with ticks.  I myself usually use the pliers on my Leatherman.
 
 I wonder what effect this has on your Karma !
 --Ivan

Given that he owns a number of really large dogs, and at least one is
female (I think), he's much more likely to be overrun by his dogma if he
doesn't...

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-06 Thread Rob van der Heij

On 4/6/07, David Boyes [EMAIL PROTECTED] wrote:


  Unless you have REALLY pointy shoes, stamping doesn't really help
  with ticks.  I myself usually use the pliers on my Leatherman.


Can you mail them to me please? I need to have 360,000 of them in the
fall to undo DST.

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-06 Thread John Summerfield

Ivan Warren wrote:

Adam Thornton wrote:

On Apr 5, 2007, at 4:13 PM, John Summerfield wrote:

Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Including ticks, of course.


Unless you have REALLY pointy shoes, stamping doesn't really help
with ticks.  I myself usually use the pliers on my Leatherman.


I wonder what effect this has on your Karma !


Not much, he'll continue right on picking at ticks.

--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]

Please do not reply off-list

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-05 Thread John Summerfield

Adam Thornton wrote:

On Apr 3, 2007, at 4:26 PM, Mark Post wrote:


On Tue, Apr 3, 2007 at  5:14 PM, in message


[EMAIL PROTECTED]
, Marcy
Cortes [EMAIL PROTECTED] wrote:


Hey cool. It worked.  Thanks Mark.
I replaced the other 1: line with this line below.

But it doesn't have the little line in the console that makes us feel
all warm and fuzzy that the service finished booting correctly:
That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) -  Kernel
2.6.5- 7.283- s390x

Any idea how I can keep that there?



You can create /root/.bashrc and put this in it:
#!/bin/sh
echo Welcome to `head -n1 /etc/SuSE-release` - Kernel `uname -r`



YOU TOO CAN HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Seriously, folks.  It's Linux, not Solaris: /bin/sh is POSIX-
compliant (boy, was I surprised last week when some of my POSIX
scripts barfed-and-died on.

So:

#!/bin/sh


I'd not have that line in ~/.bashrc or ~/.bash_profile or ~/.profile

it's not exactly a script.



--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]

Please do not reply off-list

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-05 Thread Adam Thornton

#!/bin/sh


I'd not have that line in ~/.bashrc or ~/.bash_profile or ~/.profile

it's not exactly a script.


Yeah, given that you're using it to set environment variables, you
probably don't want it running in its own shell, do you?

So, yep, just source it. In that case, won't the shebang just turn
into a comment?

Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-05 Thread John Summerfield

Adam Thornton wrote:

#!/bin/sh


I'd not have that line in ~/.bashrc or ~/.bash_profile or ~/.profile

it's not exactly a script.


Yeah, given that you're using it to set environment variables, you
probably don't want it running in its own shell, do you?

So, yep, just source it. In that case, won't the shebang just turn
into a comment?


Probably, but let's not confuse the peanut gallery.


Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.


Including ticks, of course.


--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]

Please do not reply off-list

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-05 Thread John Summerfield

Bruce Hayden wrote:

Here is something I've been using on SLES that I got off this list
long long ago.  It actually makes the console do a normal login, so
you get the motd message and it even shows up as a login when you run
the who or w commands.  However, it still won't display the
/etc/issue file unless you put cat /etc/issue in the script below.

In your inittab, replace the mingetty line for ttyS0 with:
1:2345:respawn:/sbin/agetty -L -n -l /sbin/consoleshell 9600 /dev/ttyS0
dumb

Then create a script named /sbin/consoleshell with the following
contents, and be sure to make it executable!

#!/bin/sh

cat /etc/issue

exec /bin/login -f root

or similar


--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]

Please do not reply off-list

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-05 Thread Adam Thornton

On Apr 5, 2007, at 4:13 PM, John Summerfield wrote:

Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Including ticks, of course.


Unless you have REALLY pointy shoes, stamping doesn't really help
with ticks.  I myself usually use the pliers on my Leatherman.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-05 Thread Ivan Warren

Adam Thornton wrote:

On Apr 5, 2007, at 4:13 PM, John Summerfield wrote:

Anyway, HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Including ticks, of course.


Unless you have REALLY pointy shoes, stamping doesn't really help
with ticks.  I myself usually use the pliers on my Leatherman.


I wonder what effect this has on your Karma !

--Ivan

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-04 Thread Rob van der Heij

On 4/4/07, Vic Cross [EMAIL PROTECTED] wrote:


This OpenSSH patch[1] is (IMHO) in need of more airplay.  AFAIK Gentoo
is the only distro that includes it as part of their OpenSSH package (I
don't have SLES10 or RHEL5 nearby, they may have finally picked it up).


Yes, it does solves some problems, which is why I wanted to use it. We
ended up removing all passwords and only allow authentication by
cryptic keys. The root password was also gone, and access was entirely
through sudo (without password obviously -the LDAP database also
defined which users on what system were in the group that could use
sudo). And managed routine processes that needed root access would go
through the SCIF interface to the already logged-on root account.

Suppose the primary reason of OpenSSH-LPK not being mainstream is that
it is a bit of a quick hack. The author did some ad-hoc schema to
stuff the public key into LDAP. What you really want is to have a user
certificate in the database (the public key signed by some trusted
authority). This avoids the need to trust the LDAP server (or
fall-back mirror) on its blue eyes only.
The other part that I would like to see is to hold the host public
keys as well, instead of every user end up with copies in his private
storage (and not being surprised when they don't match).


For shops using LDAP for authentication, it makes a lot of sense -- you
can have all your user detail in a sturdy LDAP directory, and using
appropriate filter configurations for nss_ldap and pam_ldap you can
still provide per-server access control[2].  The 'uploading' of the key
can be done with any of the LDAP administration tools, such as
phpldapadmin, LAM, or Luma -- the authorised key is just an ASCII text
field so cut-and-paste will work.


I know some installations automated maintaining copies of
authorized_keys (at least for root) by replication from a master so
that all required public keys were there when needed. But the security
policy was that the user should be able to have his public key removed
when compromised. That's hard to do when you don't know where it is
kept (and a compromised system may be modified not to remove the key
when the master is changed). Having it in one place makes it possible
for the user to manage it.


Another method that works is to share user home directories via NFS.
When a user logs on to a system their home directory is automounted,
which makes their ~/.ssh/ and consequently their authorised keys
available.


This caused a problem for us with developers who could have root
access on their development system but not on production servers. If
they could mount my home directory on their development system they
could put extra keys in my authorized_keys file and then have that
automount on production systems as well to gain root access.

It may be helpful to distinguish between daily use and exceptional
access to systems. I worked with folks who moved all their daily
system admin stuff into cfengine and other managed processes. That
avoided the need for support staff to login on production systems, and
doing so would need to be justified by a problem ticket. If you can
get that far the requirements are different.

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-04 Thread Rob van der Heij

On 4/4/07, shogunx [EMAIL PROTECTED] wrote:


Oh my.  If this list is set to not echo posts back to the sender, then you
all have my sincerest apologies.  When I did not see my post, I assumed
someone did not like my commentary, and I saw a similar script as the one
I posted.  Given that assumption, I assumed I was speaking to whomever did
not allow said post through.  Sorry all!  I've run into situations like
that before.


I suppose there would be a point in having the default as REPRO for
new subscribers to the list. Not sure we can, but alternatively some
hints in the welcome note could help (Harry?).
You could also set the option yourself or check on the archives web pages.
We do not moderate the posts to the list. If necessary we point
someone to Adams cough syrup, or at worst tell the poster in public
that his behavior was not appropriate.

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-04 Thread McKown, John
 -Original Message-
 From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On 
 Behalf Of Adam Thornton
 Sent: Tuesday, April 03, 2007 5:18 PM
 To: LINUX-390@VM.MARIST.EDU
 Subject: Re: Philosophy: connecting to a Linux server

snip

 
 YOU TOO CAN HELP STAMP OUT BACKTICKS IN OUR LIFETIME.
 
 Seriously, folks.  It's Linux, not Solaris: /bin/sh is POSIX-
 compliant (boy, was I surprised last week when some of my POSIX
 scripts barfed-and-died on.
 
 So:
 
 #!/bin/sh
 echo Welcome to $(head -n1 /etc/SuSE-release) - Kernel $(uname -r)
 
 No, it doesn't make much difference here.  But $() is nestable, and
 backticks are not without very careful escaping, and they make the
 logical grouping of the command line much, much clearer.  You also
 don't have to escape embedded double quotes with $() command
 substitution.  It's a good habit to cultivate.
 
 Adam

And people don't mistake $(...) for a ' as I have seen in magazines
where some copy editor replaced the back tick ` with a '.

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

The information contained in this e-mail message may be privileged
and/or confidential.  It is for intended addressee(s) only.  If you are
not the intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is
strictly prohibited and could, in certain circumstances, be a criminal
offense.  If you have received this e-mail in error, please notify the
sender by reply and delete this message without copying or disclosing
it. 

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-04 Thread Adam Thornton

On Apr 4, 2007, at 2:30 AM, Rob van der Heij wrote:


I know some installations automated maintaining copies of
authorized_keys (at least for root) by replication from a master so
that all required public keys were there when needed. But the security
policy was that the user should be able to have his public key removed
when compromised. That's hard to do when you don't know where it is
kept (and a compromised system may be modified not to remove the key
when the master is changed). Having it in one place makes it possible
for the user to manage it.


This is what we do currently.  However, we're a small enough
organization that the number of key changes is fairly small, and the
amount of log output and manual file inspection I have to keep tabs
on to determine that cfengine really is doing what I asked it to is
reasonable.  If I had to manage thousands of machines and hundreds of
users with privileged access this would probably be infeasible.


It may be helpful to distinguish between daily use and exceptional
access to systems. I worked with folks who moved all their daily
system admin stuff into cfengine and other managed processes. That
avoided the need for support staff to login on production systems, and
doing so would need to be justified by a problem ticket. If you can
get that far the requirements are different.


For what it''s worth, I really don't recommend cfengine.

It's not that it doesn't work--once you have it set up it works
tolerably well--but that its error messages range from unhelpful to
pathologically mendacious.  Specifically, I can't find the target
directory should not masquerade as a key authentication failure.

I have heard that puppet is nice for solving the same problem.
However, I went to LISA last year with high hopes of finding a
solution I liked, and was disappointed to learn that the whole area
of configuration management is a giant minefield of competing
philosophies.  The next major revision I do will probably use puppet
for file distribution and scheduled process maintenance (like, HUP
the nameserver if the master zone file has changed), but just use
good old makefiles to push out all other tasks (like user
provisioning or deprovisioning).

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-04 Thread David Boyes
 I suppose there would be a point in having the default as REPRO for
 new subscribers to the list. Not sure we can, but alternatively some
 hints in the welcome note could help (Harry?).

It's a list header option (cleverly labeled Default-Options=). Harry
would just need to set it and (optionally) update all the member
entries. 

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-04 Thread Bruce Hayden

Here is something I've been using on SLES that I got off this list
long long ago.  It actually makes the console do a normal login, so
you get the motd message and it even shows up as a login when you run
the who or w commands.  However, it still won't display the
/etc/issue file unless you put cat /etc/issue in the script below.

In your inittab, replace the mingetty line for ttyS0 with:
1:2345:respawn:/sbin/agetty -L -n -l /sbin/consoleshell 9600 /dev/ttyS0 dumb

Then create a script named /sbin/consoleshell with the following
contents, and be sure to make it executable!

#!/bin/sh
exec /bin/login -f root

Another thing I've done is replace /sbin/sulogin with this script:
#!/bin/bash
#Always log in without asking for a password
HOME=/root
exec -l /bin/bash --login --noprofile

Then, if you go to single user mode or have an error, you are
automatically in a root shell.  Now, you can either remove or lock the
root password and not worry about who knows it..

On 4/3/07, Marcy Cortes [EMAIL PROTECTED] wrote:

Hey cool. It worked.  Thanks Mark.
I replaced the other 1: line with this line below.

But it doesn't have the little line in the console that makes us feel
all warm and fuzzy that the service finished booting correctly:
That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) - Kernel
2.6.5-7.283-s390x

Any idea how I can keep that there?


Marcy Cortes



--
Bruce Hayden
IBM Global Technology Services, System z Linux
Endicott, NY

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Rob van der Heij

On 4/3/07, shogunx [EMAIL PROTECTED] wrote:


That sounds like a recipe for disaster unless you have the tightest of
physical security.


As Mark points out, physical security is not really the issue here. In
most mainframe installations you will find that physical access to the
hardware is very restricted and controlled. The virtual raised floor
that z/VM provides uses logical access control to manage that virtual
hardware. Those controls are much more granular and easier to keep
up-to-date.

I don't believe security becomes more tight by additional doors that
use the same key to unlock. Or like in many installations, a single
master key for all locks that is shared amongst staff members for
daily operation.

One of the basic rules is to separate authentication (who are you) and
access control (what can you access). Sharing a (common) root password
breaks that rule even when you change it on a regular basis in a way
that is not predictable. We found it more productive to allow staff
members to authenticate themselves for root access to the server, and
audit that access. You get much of that with RACF and a spooled
console to a central archive.

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread John Summerfield

McKown, John wrote:

This is more generic to Linux than specific to z/Linux, but perhaps you
will indulge me. I am curious as to the best practice to allow a user
to connect to a Linux server.

1) Telnet and use a normal userid/password - nope, ain't gonna happen.

2) SSH and use a normal userid/password - well, maybe. At least it is
encrypted.

3) SSH and a userid plus ssh-keygen certificate (what is that called?)

4) Xvnc???


Not really; the authors of realvnc say the password encryption's
trivially broken.

vnc over ssh is fine.




3) How do you give the key to the other person? USB thumb drive? Email
shudder? I guess that emailing a public key would not be bad. True?


My public key gives me access to your system. Anyone want it? Do tell me
the details of how to use my new account:-)


More generally, email can be secure; you encrypt it and you sign it.
Send it to the wrong person, all she gets is a mess of digits. Someone
try to forge my mail, they need my private key.






4) Should the administrator keep copies of everybody's ssh-keygen file
in a secure location (USB thumb drive?) Or should ssh-keygen be rerun in
the case of a problem?


I would have a procedure in place, but I don't think it would include
backups. Regenerating, yes.


6) In any of the above, should logging on with a password be disabled by
removing the password from /etc/passwd or /etc/shadow (I forget how to
do that, off hand - I can look it up.)?

7) I think the above removes the ability to do an su to the userid by
any other user than root. True?


I use sudo, configured to use a person's own password. Then,
sudo passwd -l root
and root's password us unusable.

Note that sudo with one's own password grants access to any account.
OTOH, keeping root out of other's accounts needs some work too.



--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]

Please do not reply off-list

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread David Boyes
 That sounds like a recipe for disaster unless you have the tightest of
 physical security.

Not in a virtual machine. Access to the console is protected by the VM
security management system, which is usually well-monitored and
well-instrumented. If you can get to the console, the machine is
completely compromised anyway (a guest can always look at it's own
virtual storage or just hit PA1 to kill the whole mess), so there's no
real protection offered by not having the root user automagically logged
in.  

I still don't like it much as general practice, but it's not the major
risk it would be in the discrete server community. 

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Marcy Cortes
Hey cool. It worked.  Thanks Mark.
I replaced the other 1: line with this line below.

But it doesn't have the little line in the console that makes us feel
all warm and fuzzy that the service finished booting correctly:
That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) - Kernel
2.6.5-7.283-s390x 

Any idea how I can keep that there?


Marcy Cortes


This message may contain confidential and/or privileged information.  If
you are not the addressee or authorized to receive this for the
addressee, you must not use, copy, disclose, or take any action based on
this message or any information herein.  If you have received this
message in error, please advise the sender immediately by reply e-mail
and delete this message.  Thank you for your cooperation.

-Original Message-
From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On Behalf Of
Mark Post
Sent: Monday, April 02, 2007 21:45
To: LINUX-390@VM.MARIST.EDU
Subject: Re: [LINUX-390] Philosophy: connecting to a Linux server

 On Mon, Apr 2, 2007 at 11:55 PM, in message
[EMAIL PROTECTED],
Marcy
Cortes [EMAIL PROTECTED] wrote: 
 Rick wrote:
 If you have an automatic login of root on the console, that should
 provide enough escape for when all other things fail.
 
 How are you setting that up?  I've looked and it wasn't obvious to me.

This entry in /etc/inittab is how I do it in Slack/390:
1:12345:respawn:/bin/bash -i


Mark Post

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread shogunx
On Tue, 3 Apr 2007, Marcy Cortes wrote:

 Hey cool. It worked.  Thanks Mark.
 I replaced the other 1: line with this line below.

 But it doesn't have the little line in the console that makes us feel
 all warm and fuzzy that the service finished booting correctly:
 That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) - Kernel
 2.6.5-7.283-s390x

 Any idea how I can keep that there?

make a script:

#!/bin/bash
echo Welcome to (Novell is a sellout) LINUX Enterprise Server 9 (s-390x) - 
Kernel `uname -r`
/bin/bash

and call the script instead of /bin/bash from inittab

substitute SUSE above if you like.




 Marcy Cortes


 This message may contain confidential and/or privileged information.  If
 you are not the addressee or authorized to receive this for the
 addressee, you must not use, copy, disclose, or take any action based on
 this message or any information herein.  If you have received this
 message in error, please advise the sender immediately by reply e-mail
 and delete this message.  Thank you for your cooperation.

 -Original Message-
 From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On Behalf Of
 Mark Post
 Sent: Monday, April 02, 2007 21:45
 To: LINUX-390@VM.MARIST.EDU
 Subject: Re: [LINUX-390] Philosophy: connecting to a Linux server

  On Mon, Apr 2, 2007 at 11:55 PM, in message
 [EMAIL PROTECTED],
 Marcy
 Cortes [EMAIL PROTECTED] wrote:
  Rick wrote:
  If you have an automatic login of root on the console, that should
  provide enough escape for when all other things fail.
 
  How are you setting that up?  I've looked and it wasn't obvious to me.

 This entry in /etc/inittab is how I do it in Slack/390:
 1:12345:respawn:/bin/bash -i


 Mark Post

 --
 For LINUX-390 subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
 visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390

 --
 For LINUX-390 subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390


sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Mark Post
 On Tue, Apr 3, 2007 at  5:14 PM, in message
[EMAIL PROTECTED], Marcy
Cortes [EMAIL PROTECTED] wrote: 
 Hey cool. It worked.  Thanks Mark.
 I replaced the other 1: line with this line below.
 
 But it doesn't have the little line in the console that makes us feel
 all warm and fuzzy that the service finished booting correctly:
 That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) -  Kernel
 2.6.5- 7.283- s390x 
 
 Any idea how I can keep that there?

You can create /root/.bashrc and put this in it:
#!/bin/sh
echo Welcome to `head -n1 /etc/SuSE-release` - Kernel `uname -r`


Mark Post

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Adam Thornton

On Apr 3, 2007, at 4:26 PM, Mark Post wrote:


On Tue, Apr 3, 2007 at  5:14 PM, in message

[EMAIL PROTECTED]
, Marcy
Cortes [EMAIL PROTECTED] wrote:

Hey cool. It worked.  Thanks Mark.
I replaced the other 1: line with this line below.

But it doesn't have the little line in the console that makes us feel
all warm and fuzzy that the service finished booting correctly:
That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) -  Kernel
2.6.5- 7.283- s390x

Any idea how I can keep that there?


You can create /root/.bashrc and put this in it:
#!/bin/sh
echo Welcome to `head -n1 /etc/SuSE-release` - Kernel `uname -r`


YOU TOO CAN HELP STAMP OUT BACKTICKS IN OUR LIFETIME.

Seriously, folks.  It's Linux, not Solaris: /bin/sh is POSIX-
compliant (boy, was I surprised last week when some of my POSIX
scripts barfed-and-died on.

So:

#!/bin/sh
echo Welcome to $(head -n1 /etc/SuSE-release) - Kernel $(uname -r)

No, it doesn't make much difference here.  But $() is nestable, and
backticks are not without very careful escaping, and they make the
logical grouping of the command line much, much clearer.  You also
don't have to escape embedded double quotes with $() command
substitution.  It's a good habit to cultivate.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Adam Thornton

On Apr 3, 2007, at 5:17 PM, Adam Thornton wrote:



Seriously, folks.  It's Linux, not Solaris: /bin/sh is POSIX-
compliant (boy, was I surprised last week when some of my POSIX
scripts barfed-and-died on.


Er, I seem to have forgotten what I was doing there.

barfed-and-died on Solaris 10)

is what I meant.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Kielek, Samuel
That's because on Linux, /bin/sh is typically just a symlink to
/bin/bash. I would imagine if you were to use bash on your Solaris
machine the result would be what you were expecting. And vice versa, if
you were to actually use the real bourne shell on Linux, it would fail.

-Sam

-Original Message-
From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On Behalf Of
Adam Thornton
Sent: Tuesday, April 03, 2007 6:20 PM
To: LINUX-390@VM.MARIST.EDU
Subject: Re: Philosophy: connecting to a Linux server

On Apr 3, 2007, at 5:17 PM, Adam Thornton wrote:


 Seriously, folks.  It's Linux, not Solaris: /bin/sh is POSIX- 
 compliant (boy, was I surprised last week when some of my POSIX 
 scripts barfed-and-died on.

Er, I seem to have forgotten what I was doing there.

barfed-and-died on Solaris 10)

is what I meant.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
visit http://www.marist.edu/htbin/wlvindex?LINUX-390

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-03 Thread shogunx
oh, and by the way, thakns for the censorship, and snarfing my script as
your own.  dick.

sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/

-- Forwarded message --
Date: Tue, 3 Apr 2007 17:48:24 -0400 (EDT)
From: shogunx [EMAIL PROTECTED]
To: Linux on 390 Port LINUX-390@VM.MARIST.EDU
Subject: Re: Philosophy: connecting to a Linux server
In-Reply-To:
[EMAIL PROTECTED]
Message-ID: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

On Tue, 3 Apr 2007, Marcy Cortes wrote:

 Hey cool. It worked.  Thanks Mark.
 I replaced the other 1: line with this line below.

 But it doesn't have the little line in the console that makes us feel
 all warm and fuzzy that the service finished booting correctly:
 That is Welcome to SUSE LINUX Enterprise Server 9 (s390x) - Kernel
 2.6.5-7.283-s390x

 Any idea how I can keep that there?

make a script:

#!/bin/bash
echo Welcome to (Novell is a sellout) LINUX Enterprise Server 9 (s-390x) - 
Kernel `uname -r`
/bin/bash

and call the script instead of /bin/bash from inittab

substitute SUSE above if you like.




 Marcy Cortes


 This message may contain confidential and/or privileged information.  If
 you are not the addressee or authorized to receive this for the
 addressee, you must not use, copy, disclose, or take any action based on
 this message or any information herein.  If you have received this
 message in error, please advise the sender immediately by reply e-mail
 and delete this message.  Thank you for your cooperation.

 -Original Message-
 From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On Behalf Of
 Mark Post
 Sent: Monday, April 02, 2007 21:45
 To: LINUX-390@VM.MARIST.EDU
 Subject: Re: [LINUX-390] Philosophy: connecting to a Linux server

  On Mon, Apr 2, 2007 at 11:55 PM, in message
 [EMAIL PROTECTED],
 Marcy
 Cortes [EMAIL PROTECTED] wrote:
  Rick wrote:
  If you have an automatic login of root on the console, that should
  provide enough escape for when all other things fail.
 
  How are you setting that up?  I've looked and it wasn't obvious to me.

 This entry in /etc/inittab is how I do it in Slack/390:
 1:12345:respawn:/bin/bash -i


 Mark Post

 --
 For LINUX-390 subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
 visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390

 --
 For LINUX-390 subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390


sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Adam Thornton

On Apr 3, 2007, at 5:43 PM, Kielek, Samuel wrote:


That's because on Linux, /bin/sh is typically just a symlink to
/bin/bash. I would imagine if you were to use bash on your Solaris
machine the result would be what you were expecting. And vice
versa, if
you were to actually use the real bourne shell on Linux, it would
fail.


The $() as a command substitution delimiter is guaranteed by POSIX.
If a platform's /bin/sh is POSIX compatible--no matter whether or not
it is actually bash--the construction will work.

I submit that there is no reason to ship your system with a non-
POSIX /bin/sh in the 21st century.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-03 Thread Mark Post
 On Tue, Apr 3, 2007 at  6:56 PM, in message
[EMAIL PROTECTED], shogunx
[EMAIL PROTECTED] wrote: 
 oh, and by the way, thakns for the censorship, and snarfing my script as
 your own.  dick.

Were you directing this vitriol at anyone in particular?  I can't say I've seen 
anyone engaging in censorship, nor anyone snarfing your script.  Regardless, 
you might want to be a little more professional on the list in the future.


Mark Post

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-03 Thread Rich Smrcina

That's the second obtuse comment I've seen out of you today.  Clearly
uncalled for.

shogunx wrote:

oh, and by the way, thakns for the censorship, and snarfing my script as
your own.  dick.

sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/



--
Rich Smrcina
VM Assist, Inc.
Phone: 414-491-6001
Ans Service:  360-715-2467
rich.smrcina at vmassist.com

Catch the WAVV!  http://www.wavv.org
WAVV 2007 - Green Bay, WI - May 18-22, 2007

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Kielek, Samuel
I guess all I was trying to indirectly point out was that this behaviour
is caused by the fact that Solaris has the heirloom Bourne shell as
/bin/sh (which existed prior to POSIX.2). By the way, the XPG version
(/usr/xpg4/bin/sh) on Solaris does support $().

I do agree and wonder why at this point Sun doesn't either update it or
move it out of the way (I'm sure some customers still need/want it) and
put a POSIX.2 compliant shell in its place (bash?).

-Sam

-Original Message-
From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On Behalf Of
Adam Thornton
Sent: Tuesday, April 03, 2007 7:11 PM
To: LINUX-390@VM.MARIST.EDU
Subject: Re: Philosophy: connecting to a Linux server

On Apr 3, 2007, at 5:43 PM, Kielek, Samuel wrote:

 That's because on Linux, /bin/sh is typically just a symlink to 
 /bin/bash. I would imagine if you were to use bash on your Solaris 
 machine the result would be what you were expecting. And vice versa, 
 if you were to actually use the real bourne shell on Linux, it would 
 fail.

The $() as a command substitution delimiter is guaranteed by POSIX.
If a platform's /bin/sh is POSIX compatible--no matter whether or not it
is actually bash--the construction will work.

I submit that there is no reason to ship your system with a non- POSIX
/bin/sh in the 21st century.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
visit http://www.marist.edu/htbin/wlvindex?LINUX-390

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Adam Thornton

On Apr 3, 2007, at 6:46 PM, Kielek, Samuel wrote:


I guess all I was trying to indirectly point out was that this
behaviour
is caused by the fact that Solaris has the heirloom Bourne shell as
/bin/sh (which existed prior to POSIX.2). By the way, the XPG version
(/usr/xpg4/bin/sh) on Solaris does support $().

I do agree and wonder why at this point Sun doesn't either update
it or
move it out of the way (I'm sure some customers still need/want it)
and
put a POSIX.2 compliant shell in its place (bash?).


Or, you know, even the XPG4 one.   I mean, really, it's not 1986
anymore (XPG4 would get us all the way to 1988!), and surely you can
stick #!/usr/crusty/bin/sh on your shell scripts that really, really
depend on something that's actually *different* in POSIX (which isn't
much that I'm aware of).  I like knowing that I have $() and semi-
sane arithmetic with $(()).  If I'm actually using bash-isms,
requiring me to use /bin/bash is fine.  But I think that in 2007 I
really, really ought to be able to assume the 2001 POSIX standard
will be implemented by the default shell found in /bin/sh.

I understand that Solaris must go to some lengths to remain bug-
compatible with its former self.  But I had naively expected that
things had gotten better since Solaris 2.5 when all the useful stuff
was in /usr/ucb/bin.

Now it's just in xpg4 or, more often. sfw.

I think I've been thoroughly spoiled by GNU userland.  I found myself
installing tons of stuff from sunfreeware.com (yes, the same sfw) in
order to get anything actually *done*.  I've gotten used to little
things, like --owner 0 --group 0 in tar (a GNU tar extension) to let
me make owned-by-root tarballs for distribution without having to
build them as root.  I strongly suspect that NexentaOS might be the
best thing ever: Solaris kernel, Debian userland.  I haven't been
successful in installing it under Parallels yet though.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-03 Thread shogunx
Oh my.  If this list is set to not echo posts back to the sender, then you
all have my sincerest apologies.  When I did not see my post, I assumed
someone did not like my commentary, and I saw a similar script as the one
I posted.  Given that assumption, I assumed I was speaking to whomever did
not allow said post through.  Sorry all!  I've run into situations like
that before.


On Tue, 3 Apr 2007, Mark Post wrote:

  On Tue, Apr 3, 2007 at  6:56 PM, in message
 [EMAIL PROTECTED], shogunx
 [EMAIL PROTECTED] wrote:
  oh, and by the way, thakns for the censorship, and snarfing my script as
  your own.  dick.

 Were you directing this vitriol at anyone in particular?  I can't say I've 
 seen anyone engaging in censorship, nor anyone snarfing your script.  
 Regardless, you might want to be a little more professional on the list in 
 the future.


 Mark Post

 --
 For LINUX-390 subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390


sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Vic Cross
On Mon, 2007-04-02 at 16:11 +0200, Rob van der Heij wrote:
 We did it slightly different with an experimental patch to OpenSSH
 that allows for the public keys to be kept in LDAP. That means there's
 only one place where the public key is held. That LDAP server would
 allow the end-user to upload a (new) public key through some
 authenticated interface. And the Linux servers can trust that LDAP to
 provide the right public key. The same LDAP also gives user and group
 information for Linux to allow login.

This OpenSSH patch[1] is (IMHO) in need of more airplay.  AFAIK Gentoo
is the only distro that includes it as part of their OpenSSH package (I
don't have SLES10 or RHEL5 nearby, they may have finally picked it up).
For shops using LDAP for authentication, it makes a lot of sense -- you
can have all your user detail in a sturdy LDAP directory, and using
appropriate filter configurations for nss_ldap and pam_ldap you can
still provide per-server access control[2].  The 'uploading' of the key
can be done with any of the LDAP administration tools, such as
phpldapadmin, LAM, or Luma -- the authorised key is just an ASCII text
field so cut-and-paste will work.

Another method that works is to share user home directories via NFS.
When a user logs on to a system their home directory is automounted,
which makes their ~/.ssh/ and consequently their authorised keys
available.

I used to keep my private key on a USB-key, but convenience (or the lack
thereof) was a barrier.  I'm wondering if some little mobile-phone app
that worked over IR or Bluetooth would be a substitute -- people
sometimes take more care of these. ;)

Cheerio,
Vic Cross

[1] Known as OpenSSH-LPK.  Used to be hosted by the OpenDarwin project,
but now seems to have new owners...  There's a Trac at
http://dev.inversepath.com/trac/openssh-lpk.
[2] pam_ldap provides it's own function for access checking based on an
attribute in LDAP, but we found it was better to use a filter in the
nss_base_* settings.  If you only use the pam_ldap setting, ALL
accounts in LDAP show up as accounts on the system even though the users
don't have access, which will confuse your auditors...  Better to filter
out the unauthorised accounts at the NSS level so they don't even show
up.


--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Vic Cross
On Mon, 2007-04-02 at 16:11 +0200, Rob van der Heij wrote:

 We did it slightly different with an experimental patch to OpenSSH
 that allows for the public keys to be kept in LDAP. That means there's
 only one place where the public key is held. That LDAP server would
 allow the end-user to upload a (new) public key through some
 authenticated interface. And the Linux servers can trust that LDAP to
 provide the right public key. The same LDAP also gives user and group
 information for Linux to allow login.

This is an excellent patch that needs a lot more airplay.  I don't know
why it's never been picked up by mainstream distros; Gentoo is the
only one I know of that includes it (I don't have SLES10 and RHEL5
systems to check, though, they may have finally picked it up).

Combined with the pam_ldap and nss_ldap configuration options[1] that
allow you to restrict user accounts to a subset of all your hosts, you
can have all your users in a single LDAP but still provide access only
to certain hosts.

On the general handling of SSH keys however, the important thing to
remember is that the private key belongs to the USER (Rob and Adam have
both implied this in their posts).  Administering them centrally means
that there are sysadmins that (literally) have everyone's keys[2].  You
may find that some of your users would create their keys with a greater
strength than your default policy might provide, and you shouldn't
really tell your users that they have to make their key less safe than
they want to. :)

[1]ppaam_ldap


--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server (fwd)

2007-04-03 Thread Adam Thornton

On Apr 3, 2007, at 7:10 PM, shogunx wrote:


Oh my.  If this list is set to not echo posts back to the sender,
then you
all have my sincerest apologies.  When I did not see my post, I
assumed
someone did not like my commentary, and I saw a similar script as
the one
I posted.  Given that assumption, I assumed I was speaking to
whomever did
not allow said post through.  Sorry all!  I've run into situations
like
that before.


You need to SET REPRO to receive copies of your own postings.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Kielek, Samuel
I just noticed there is a man page on solaris that details its standards
compliance. Try 'man standards' for the somewhat lengthy details. Here
is the bit I found most relevant:

 If the behavior required by POSIX.2, POSIX.2a, XPG4, SUS, or
 SUSv2  conflicts  with  historical Solaris utility behavior,
 the original Solaris version of the utility is unchanged;  a
 new version that is standard-conforming has been provided in
 /usr/xpg4/bin. For applications wishing to take advantage of
 POSIX.2,  POSIX.2a,  XPG4,  SUS, or SUSv2 features, the PATH
 (sh or ksh) or path (csh) environment  variables  should  be
 set  with  /usr/xpg4/bin  preceding any other directories in
 which  utilities   specified  by  those  specifications  are
 found, such as /bin, /usr/bin, /usr/ucb, and /usr/ccs/bin.

-Sam 

-Original Message-
From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On Behalf Of
Adam Thornton
Sent: Tuesday, April 03, 2007 8:04 PM
To: LINUX-390@VM.MARIST.EDU
Subject: Re: Philosophy: connecting to a Linux server

On Apr 3, 2007, at 6:46 PM, Kielek, Samuel wrote:

 I guess all I was trying to indirectly point out was that this 
 behaviour is caused by the fact that Solaris has the heirloom Bourne 
 shell as /bin/sh (which existed prior to POSIX.2). By the way, the XPG

 version
 (/usr/xpg4/bin/sh) on Solaris does support $().

 I do agree and wonder why at this point Sun doesn't either update it 
 or move it out of the way (I'm sure some customers still need/want it)

 and put a POSIX.2 compliant shell in its place (bash?).

Or, you know, even the XPG4 one.   I mean, really, it's not 1986
anymore (XPG4 would get us all the way to 1988!), and surely you can
stick #!/usr/crusty/bin/sh on your shell scripts that really, really
depend on something that's actually *different* in POSIX (which isn't
much that I'm aware of).  I like knowing that I have $() and semi- sane
arithmetic with $(()).  If I'm actually using bash-isms, requiring me to
use /bin/bash is fine.  But I think that in 2007 I really, really ought
to be able to assume the 2001 POSIX standard will be implemented by the
default shell found in /bin/sh.

I understand that Solaris must go to some lengths to remain bug-
compatible with its former self.  But I had naively expected that things
had gotten better since Solaris 2.5 when all the useful stuff was in
/usr/ucb/bin.

Now it's just in xpg4 or, more often. sfw.

I think I've been thoroughly spoiled by GNU userland.  I found myself
installing tons of stuff from sunfreeware.com (yes, the same sfw) in
order to get anything actually *done*.  I've gotten used to little
things, like --owner 0 --group 0 in tar (a GNU tar extension) to let me
make owned-by-root tarballs for distribution without having to build
them as root.  I strongly suspect that NexentaOS might be the best thing
ever: Solaris kernel, Debian userland.  I haven't been successful in
installing it under Parallels yet though.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or
visit http://www.marist.edu/htbin/wlvindex?LINUX-390

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-03 Thread Adam Thornton

On Apr 3, 2007, at 8:46 PM, Kielek, Samuel wrote:


I just noticed there is a man page on solaris that details its
standards
compliance. Try 'man standards' for the somewhat lengthy details. Here
is the bit I found most relevant:

 If the behavior required by POSIX.2, POSIX.2a, XPG4, SUS, or
 SUSv2  conflicts  with  historical Solaris utility behavior,
 the original Solaris version of the utility is unchanged;  a
 new version that is standard-conforming has been provided in
 /usr/xpg4/bin. For applications wishing to take advantage of
 POSIX.2,  POSIX.2a,  XPG4,  SUS, or SUSv2 features, the PATH
 (sh or ksh) or path (csh) environment  variables  should  be
 set  with  /usr/xpg4/bin  preceding any other directories in
 which  utilities   specified  by  those  specifications  are
 found, such as /bin, /usr/bin, /usr/ucb, and /usr/ccs/bin.


Well, at least they're honest about it and it's documented.  And I
guess if I were more familiar with Solaris, I'd have thought to look.

Thanks.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread Adam Thornton

On Apr 2, 2007, at 8:45 AM, McKown, John wrote:

2) Or should the user do the ssh-keygen on his workstation, then give
the public key to the administrator to put in the user's
~/.ssh/authorized_keys file?


Yes.


3) How do you give the key to the other person? USB thumb drive? Email
shudder? I guess that emailing a public key would not be bad. True?


That's the whole point of public-key cryptography.  The public key is
*public*.


4) Should the administrator keep copies of everybody's ssh-keygen file
in a secure location (USB thumb drive?) Or should ssh-keygen be
rerun in
the case of a problem?


You remove the public key from authorized_keys, and generate a new pair.


5) Is there any way for the administrator to guarantee that the user
uses a passphrase on his ssh-keygen key file? I can't find it


Unknown, but I doubt it.  The end user can always re-key access to
his private key file, and (I think) change it to no password if he
wants; this does not change the actual key, so the remote end doesn't
know.


6) In any of the above, should logging on with a password be
disabled by
removing the password from /etc/passwd or /etc/shadow (I forget how to
do that, off hand - I can look it up.)?


Depends on what your local security policy is.  Also depends on how
you have PAM set up.  I think it's generally a good idea to disable
password-interactive logins, but it really depends on what you need
to be able to do.


7) I think the above removes the ability to do an su to the
userid by
any other user than root. True?


Removing the password certainly would.

Adam

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread dave
Hi, John.


- Original Message Follows -
From: McKown, John [EMAIL PROTECTED]
To: LINUX-390@VM.MARIST.EDU
Subject: Philosophy: connecting to a Linux server
Date: Mon, 2 Apr 2007 08:45:53 -0500

 This is more generic to Linux than specific to z/Linux,
 but perhaps you will indulge me. I am curious as to the
 best practice to allow a user to connect to a Linux
 server.

 1) Telnet and use a normal userid/password - nope, ain't
 gonna happen.

Very bad ideabut that doesn't stop some sites from using
it:-)

 2) SSH and use a normal userid/password - well, maybe. At
 least it is encrypted.

You seem to be a bit reluctant to use SSH...is there a
particular reason for this? SSH is the de-facto method for
making a secure connection to a Linux system, I think.

 3) SSH and a userid plus ssh-keygen certificate (what is
 that called?)

Beats me

 4) Xvnc???


 Personally, I like option 3. But, when I think of security
 , I am a bit paranoid. The question then becomes: After
 the userid is set up, who does the ssh-keygen?

 1) Should the system administrator logon to himself, then
 su to the new user, do the ssh-keygen then distribute
 the private key to the user?


 2) Or should the user do the ssh-keygen on his workstation
 , then give the public key to the administrator to put in
 the user's ~/.ssh/authorized_keys file?

 3) How do you give the key to the other person? USB thumb
 drive? Email shudder? I guess that emailing a public key
 would not be bad. True?

 4) Should the administrator keep copies of everybody's
 ssh-keygen file in a secure location (USB thumb drive?) Or
 should ssh-keygen be rerun in the case of a problem?

My personal opinion is that a USB thumb drive is *not* a
secure location. Due to their small size and easy
misplacement (now, I thought I had that in my
pocket...wonder where it got off gto). My opinion only,
of course.

 5) Is there any way for the administrator to guarantee
 that the user uses a passphrase on his ssh-keygen key
 file? I can't find it

Not that I know of.
 6) In any of the above, should logging on with a password
 be disabled by removing the password from /etc/passwd or
 /etc/shadow (I forget how to do that, off hand - I can
 look it up.)?

 7) I think the above removes the ability to do an su to
 the userid by any other user than root. True?

 Thanks for any thoughts. If too off-topic, please just
 ignore this or email me directly to go away, boy. You're
 bothering me. (W.C. Fields?)


Close...it was William Claude Dukenfield:-)

DJ
 --
 John McKown
 Senior Systems Programmer
 HealthMarkets
 Keeping the Promise of Affordable Coverage
 Administrative Services Group
 Information Technology

 The information contained in this e-mail message may be
 privileged and/or confidential.  It is for intended
 addressee(s) only.  If you are not the intended recipient,
 you are hereby notified that any disclosure, reproduction,
 distribution or other use of this communication is
 strictly prohibited and could, in certain circumstances,
 be a criminal offense.  If you have received this e-mail
 in error, please notify the sender by reply and delete
 this message without copying or disclosing it.

 --
  For LINUX-390 subscribe / signoff / archive
 access instructions, send email to [EMAIL PROTECTED]
 with the message: INFO LINUX-390 or visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread Rob van der Heij

On 4/2/07, McKown, John [EMAIL PROTECTED] wrote:


3) How do you give the key to the other person? USB thumb drive? Email
shudder? I guess that emailing a public key would not be bad. True?


The only requirement is that the admin can be certain that this is
indeed the public key of user A and not of user B. The risk to address
is that user B interferes with the communication and replaces the
public key by one for which he has the private key.

If your organization has some other reliable way to have the user
authenticate himself (e.g. RACF) you could have the user send the
public key from there. Or if you have a trusted web application you
might have the user upload the public key there.
Alternative would be to run ssh-keygen for the new user through some
trusted web interface, store the public key on a central place and
allow the private key to be downloaded (and discard it after that).


4) Should the administrator keep copies of everybody's ssh-keygen file
in a secure location (USB thumb drive?) Or should ssh-keygen be rerun in
the case of a problem?


No, that would mean the system admin also has access to the user's
private key which is not what you want. I would hope a sysadmin has
ways to get access to the system and he does not have to use someone
else's identity for that.

If the user has reason to believe his private key and passphrase are
compromised, he would generate a new key pair and give the new public
key to the sysadmin.  One problem is that you need to remove all
occurrences of that compromised key. If you cloned systems and put
public key of all support staff in those systems, that may be hard.


6) In any of the above, should logging on with a password be disabled by
removing the password from /etc/passwd or /etc/shadow (I forget how to
do that, off hand - I can look it up.)?


You do that in the sshd.conf. There's an option to disable plain text
passwords
Yes, I think you should disable that.

We did it slightly different with an experimental patch to OpenSSH
that allows for the public keys to be kept in LDAP. That means there's
only one place where the public key is held. That LDAP server would
allow the end-user to upload a (new) public key through some
authenticated interface. And the Linux servers can trust that LDAP to
provide the right public key. The same LDAP also gives user and group
information for Linux to allow login.

Rob

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread Rob van der Heij

On 4/2/07, Adam Thornton [EMAIL PROTECTED] wrote:


 7) I think the above removes the ability to do an su to the
 userid by any other user than root. True?

Removing the password certainly would.


Tee hee hee. If you have an automatic login of root on the console,
that should provide enough escape for when all other things fail.

Funny enough security rules at my previous place did not allow this.
We were not allowed to have no password for root, but were required to
set a new one every so-many days. :-(

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread Marcy Cortes
Rick wrote:
If you have an automatic login of root on the console, that should
provide enough escape for when all other things fail.

How are you setting that up?  I've looked and it wasn't obvious to me.

Thanks in advance.


Marcy Cortes


This message may contain confidential and/or privileged information.
If you are not the addressee or authorized to receive this for the
addressee, you must not use, copy, disclose, or take any action based on
this message or any information herein.  If you have received this
message in error, please advise the sender immediately by reply e-mail
and delete this message.  Thank you for your cooperation.

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread Mark Post
 On Mon, Apr 2, 2007 at 11:55 PM, in message
[EMAIL PROTECTED], Marcy
Cortes [EMAIL PROTECTED] wrote: 
 Rick wrote:
 If you have an automatic login of root on the console, that should
 provide enough escape for when all other things fail.
 
 How are you setting that up?  I've looked and it wasn't obvious to me.

This entry in /etc/inittab is how I do it in Slack/390:
1:12345:respawn:/bin/bash -i


Mark Post

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread shogunx
That sounds like a recipe for disaster unless you have the tightest of
physical security.

On Mon, 2 Apr 2007, Mark Post wrote:

  On Mon, Apr 2, 2007 at 11:55 PM, in message
 [EMAIL PROTECTED], Marcy
 Cortes [EMAIL PROTECTED] wrote:
  Rick wrote:
  If you have an automatic login of root on the console, that should
  provide enough escape for when all other things fail.
 
  How are you setting that up?  I've looked and it wasn't obvious to me.

 This entry in /etc/inittab is how I do it in Slack/390:
 1:12345:respawn:/bin/bash -i


 Mark Post

 --
 For LINUX-390 subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
 http://www.marist.edu/htbin/wlvindex?LINUX-390


sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390


Re: Philosophy: connecting to a Linux server

2007-04-02 Thread Mark Post
 On Tue, Apr 3, 2007 at  1:31 AM, in message
[EMAIL PROTECTED], shogunx
[EMAIL PROTECTED] wrote: 
 That sounds like a recipe for disaster unless you have the tightest of
 physical security.

For z/VM guests, you have to get past the physical security, and know the 
userid and password of the Linux system.  For LPAR installs, let's just say I 
haven't seen too many mainframes sitting in wiring closets.  Except for SHARE, 
WAVV, etc., I haven't actually been anywhere near a mainframe in years and 
years.  Tightest of physical security doesn't begin to approach what most 
mainframe shops employ.


Mark Post

--
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390