On 02/13/13 03:05, Heinz Mᅵller wrote:
> I checked this and it's not set. I can't even log in on Console
> as I described in c.
>
> hds620 console login: root
> Password:
> Feb 12 19:54:15 hds620 login: REPEATED LOGIN FAILURES ON /dev/console, root
On modern Solaris systems, root is set up as a role, not a user, which
means you can't log in directly as root. It's an intentional security
feature.
To check whether root is a role:
% grep root /etc/user_attr
To change it to a normal account:
% pfexec usermod -K type=normal root
What this feature provides is accountability: the security logs will
always record a real user logging in and then assuming greater
privileges. If you allow log-ins as "Mr. Root", then that's the only
thing you'll see in the security logs, which is rather useless in terms
of attribution.
I certainly don't recommend breaking intentional security features of
the OS, but if you want to, you can do it.
As for your networking tweaks, they have nothing to do with it. By the
way, setting ip{,6}_strict_dst_multihoming will break most routed
multihoming features and certainly does nothing whatsoever to improve
security. So, if your "auditing" people recommend it, I'd recommend
finding new people. They're at best mistaken. :-/
--
James Carlson 42.703N 71.076W <
carl...@workingcode.com>