After a customer had performed some bad edits on various LDAP configuration files, users were locked out and unable to access the system. Root could still login however.
I logged in as root, and rather than mess with various config files, eg under /etc/pam.d, ran this command to disable LDAP authentication and enable “normal” authentication using /etc/shadow: Continue reading →
Running sshd in the foreground can be an effective way to debug ssh problems. In the following example, a user was unable to access a remote system using ssh keys. Running sshd in debug mode provided a quick resolution. Both source and target systems were Solaris, but the same method applies equally to Linux. Continue reading →
Copying data is something every administrator does. A single file or directory file can be copied with a single command. Moving information from one system to another needs a bit more work, but it needn’t be a pain.
The ssh command can be used to copy data from one Unix system to another. Here is an example for HP-UX, but it works on Linux too. A directory, called /var/opt/ignite, is copied from the system “pluto” to another machine called “jupiter”. Continue reading →