Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
07-11-2001, 03:18 AM
|
#1
|
Member
Registered: Jun 2001
Location: London England
Distribution: Suse 7.1
Posts: 45
Rep:
|
Remote admin?
I have never used telnet and was wondering what would be the best method of editing text files remotely and reboot linux remotely.
Cheers,
|
|
|
07-11-2001, 03:31 AM
|
#2
|
Senior Member
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731
Rep:
|
Well if you can use the command line on your linux box then you can use telnet (bad) or secure shell (aka ssh - good).
A really thorough admin would set up a superusers system (sudo) so that each superuser can be limited in command access and properly authenticated.
|
|
|
07-11-2001, 05:32 AM
|
#3
|
Member
Registered: Jun 2001
Location: London England
Distribution: Suse 7.1
Posts: 45
Original Poster
Rep:
|
I am aware of the Implications of using telnet, only my linux box is at home and none of the data is sensitive.
I was actually in need of a good remote text editor? I can run emacs but i find that difficult to use. Is it possible for me to run a prog like a Kwrite remotely?
Cheers
|
|
|
07-11-2001, 05:47 AM
|
#4
|
Senior Member
Registered: May 2001
Location: Bristol, UK
Distribution: Slackware, Fedora, RHES
Posts: 2,243
Rep:
|
I'd say vi - but thats worse than emacs to learn. If you have Pine installed (the mail client) then you can use 'pico' its nice and simple.
I take it that K write is an X application? You can run X apps externally you just need an X server running on the machine your sat on then you set your DISPLAY environment to point to the machine you're sat on too.
cheers
Jamie...
|
|
|
07-11-2001, 06:17 AM
|
#5
|
Member
Registered: Apr 2001
Posts: 113
Rep:
|
I use Joe as my default text editor it is based on wordstar and dead simple to use.
Hope this helps
___________________
Have Fun
|
|
|
07-11-2001, 04:09 PM
|
#6
|
Senior Member
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731
Rep:
|
Quote:
Originally posted by Ricardo77uk
I am aware of the Implications of using telnet, only my linux box is at home and none of the data is sensitive.
I was actually in need of a good remote text editor? I can run emacs but i find that difficult to use. Is it possible for me to run a prog like a Kwrite remotely?
Cheers
|
It's less a question of how sensitive your data is and more one of how dangerous your system can be to others if rooted.
To use a (charged) analogy, people lock up their guns because they are worried about the cost of replacing them, but moreso the damage that that a stolen gun can cause.
While the risks are admittedly small that you can get rooted, you don't really want to unknowingly be a participatory node in the next DDoS attack.
|
|
|
07-11-2001, 11:02 PM
|
#7
|
Member
Registered: Apr 2001
Location: Cape Cod, MA
Distribution: Redhat 6.2/7.2 & FreeBSD 4.4
Posts: 108
Rep:
|
not to mention i think the owner is liable for all damages....and that is YOU! scary huh?
|
|
|
07-12-2001, 11:46 AM
|
#8
|
Member
Registered: Jun 2001
Location: London England
Distribution: Suse 7.1
Posts: 45
Original Poster
Rep:
|
DDos attack? What do you mean when you say my system be rooted for others? should i use a firewall or something?
Please explain,
Cheers!
|
|
|
07-12-2001, 01:23 PM
|
#9
|
Member
Registered: Apr 2001
Location: Cape Cod, MA
Distribution: Redhat 6.2/7.2 & FreeBSD 4.4
Posts: 108
Rep:
|
someone could easily (if you didnt watch your machine) log into it, then do whatever he wanted, whether it be break into a system or a DoS attack. The IP would be from your machine. and you would be liable. Thats why hackers do it; so they cant get caught.
|
|
|
07-12-2001, 04:08 PM
|
#10
|
Member
Registered: Jun 2001
Location: London England
Distribution: Suse 7.1
Posts: 45
Original Poster
Rep:
|
I see, as telnet does not establish a secure connection with your server, passwords and usernames can be learnt by 'middle men' etc.
If i were to change files remotely, i.e. modify httpd.conf which is owned by root, how would i modify this file without loging in as root
I am a SuSe user, i think it has no remote login for 'root' set by default.
Somebody mentioned the creation of a super-user, how would i do this? and could i grant the super user to modify files owned by root?
cheers,
|
|
|
07-12-2001, 04:19 PM
|
#11
|
Senior Member
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731
Rep:
|
Even if you login and user X and then become a superuser, a decent packet sniffer on your subnet can watch everything being sent between client/server. If you're on a cable modem your audience is probably much larger.
Using something like ssh establishes a secure (encrypted) connection at login and for the session.
it would look something like this.
Code:
user@host:/ ssh -l username 192.168.0.3
Once you have logged in, you can use 'su' to become the superuser (root) after you supply the root password. You could also set up 'sudo' as well.
|
|
|
07-12-2001, 04:33 PM
|
#12
|
Member
Registered: Jun 2001
Location: London England
Distribution: Suse 7.1
Posts: 45
Original Poster
Rep:
|
OK i understood all of the above exept 'sudo' what is sudo and how would i go about implementing it?
Thanks
|
|
|
07-12-2001, 04:44 PM
|
#13
|
Senior Member
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731
Rep:
|
'sudo' is a method for keeping superusers accountable for varying levels of access. Try 'man sudo' and read up on it. If you are the only superuser on the box then it's really not much more than an academic excersize.
|
|
|
07-13-2001, 02:05 PM
|
#14
|
Member
Registered: Feb 2001
Location: Colorado Springs, CO
Distribution: Redhat v8.0 (soon to be Fedora? or maybe I will just go back to Slackware)
Posts: 857
Rep:
|
Learn VI. Its not bad at all once you get the hang of it and you will be much happier with the performance and simplicity than exporting an Xsession just so you can edit a text file. Its also the defacto standard in ALL Linux and UNIX variants. Very very good to know.
You can secure your telnet daemon with the /etc/hosts.allow and /etc/hosts.deny options so that only your internal addies can use it, but I still recommend SSH because if you ever use Linux in the outside world it will be good to know.
I highly recommend PUTTY if you will be telneting or SSHing from a Windows box.
KevinJ
|
|
|
All times are GMT -5. The time now is 04:27 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|