Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I would like to write a small configuration utility that will act as a daemon on the telnet port and SSH port that will only allow access to, and modification of, specific information in a structure imposed by the utility. How do I set this utility up so that when a user opens a telnet connection (or ssh) to the device, they are actually connected to the utility?
I would like to write a small configuration utility that will act as a daemon on the telnet port and SSH port that will only allow access to, and modification of, specific information in a structure imposed by the utility. How do I set this utility up so that when a user opens a telnet connection (or ssh) to the device, they are actually connected to the utility?
Thanks
You don't say anything about the utility, or what it's written in, but a simple way may be to set the program to be the users shell. Instead of BASH, just do a "useradd -s /your/program/name <user name>".
You don't say anything about the utility, or what it's written in, but a simple way may be to set the program to be the users shell. Instead of BASH, just do a "useradd -s /your/program/name <user name>".
The utility is yet to be written and I can write it in C, C++, Perl or any other language. The I/O model is non-GUI, TTY only with basic ANSI text commands (remember the Wyse 50?). The utility will be running on an embedded system that may or may not have bash running.
The utility is yet to be written and I can write it in C, C++, Perl or any other language. The I/O model is non-GUI, TTY only with basic ANSI text commands (remember the Wyse 50?). The utility will be running on an embedded system that may or may not have bash running.
You don't need bash running. If your program is set to be the users shell, when the user logs in, your program starts, and runs with the users permissions. So again, just set your program to be the 'shell' of your user(s), and when they log in, that's what they'll see.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.