Hello All,
If you have not protected Single User Mode with Password then it is big risk for your Linux Server, So protecting Single User Mode with Password is very important when it comes to security,
Today in this article i will show you how you can protect Single User Mode with Password on RHEL / CentOS 5.x and RHEL / CentOS 6.x.
Please execute given commands carefully else your system will not boot properly. First i would request you to read full procedure and then try to follow. Do it at your own risk
1. For RHEL / CentOS 5.x
1.1 Before doing anything please take backup of your /etc/inittabcp /etc/inittab /etc/inittab.backup
To Disable and Make Single User Mode Password Protected, Execute
below command as root :-[root@vikram-linux ~]$ sed -i '1i su:S:wait:/sbin/sulogin'
So It will look like below
su:S:wait:/sbin/sulogin# Default runlevel. The runlevels used by RHS are:
# 0 - halt (Do NOT set initdefault to this)
# 1 - Single user mode
# 2 - Multiuser, without NFS (The same as 3, if you do not have
networking)
# 3 - Full multiuser mode
# 4 - unused
# 5 - X11
# 6 - reboot (Do NOT set initdefault to this)
#
id:3:initdefault:
NOTE: If you do not want to use sed command then You can always add “su:S:wait:/sbin/sulogin” at top in /etc/inittab
2. For RHEL / CentOS 6.x
2.1 Before doing anything please take backup of your /etc/inittabcp /etc/sysconfig/init /etc/sysconfig/init.backup
2.2 To Disable and Make Single User Mode Password Protected, Execute below
command as root :-[root@vikram-linux ~]$#sed -i 's/SINGLE=\/sbin\/sushell/SINGLE=\/sbin\/sulogin/' /etc/sysconfig/init
So It will look like below
SINGLE=/sbin/sulogin
NOTE :- If you do not want to use sed command then You can always change to “
SINGLE=/sbin
No comments:
Post a Comment