Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

d_passwd(4) [hpux man page]

dialups(4)						     Kernel Interfaces Manual							dialups(4)

NAME
dialups, d_passwd - dialup security control DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a line found in dialup security is invoked. Anything after a space or tab is ignored. When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro- gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons. The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from FILES
dial-in tty lines passwords SEE ALSO
login(1), passwd(4). dialups(4)

Check Out this Related Man Page

dialups(4)						     Kernel Interfaces Manual							dialups(4)

NAME
dialups, d_passwd - dialup security control DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a line found in dialup security is invoked. Anything after a space or tab is ignored. When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro- gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons. The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from FILES
dial-in tty lines passwords SEE ALSO
login(1), passwd(4). dialups(4)
Man Page

15 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Need help with security

Hi there thanks for checking in. I run a helpdesk with about 500 users login onto a network and then onto a Unix box. Sometimes people use other people's login's.:-( All user's use there own PC.( I.P ) Is there a way that when somebody logs onto the unix box with a different I.P that the... (6 Replies)
Discussion started by: nemex
6 Replies

2. UNIX for Advanced & Expert Users

login & password

I bought a pentium 2 (office auction) for my country home. When I turned it on it had Unix. It asks me for a login and password. I don't have these and since I don't know Unix I want to reformat the drive or at least be able to install Windows. I can't get past the Login and password promt. Anyone... (8 Replies)
Discussion started by: cab
8 Replies

3. Cybersecurity

Need Help

I would really like to work within security in the I.T industry, though I am not sure what my next step should be. I can not afford a security course at this point in time. I have been reading books and catching up with security tips as much as I can from the Internet. Though I feel I can... (6 Replies)
Discussion started by: woofie
6 Replies

4. UNIX for Dummies Questions & Answers

SU command

I have a script in which I need to login as another user, using the su command What is the syntax/format for this command which allows me to input the password along with the command name and userid, all at the same time? Something like: su newuserid ???????? (where ???????? is... (4 Replies)
Discussion started by: itsgreektome
4 Replies

5. Cybersecurity

lost root password using (SAM) trusted security

I have used the system administration management trusted security system and in the process the root password have been changed or lost. Is there any possible way to recover root status after this incident:( (5 Replies)
Discussion started by: jordanrt
5 Replies

6. Cybersecurity

One time password

Hi folks, Postfix 2.3.8 SquirrelMail 1.4.11 I'm prepared installing One-time-password on SquirrelMail as experiment and don't have a clue to start. On googling I found; SquirrelMail and OPTs WiKID Strong Authentication System SourceForge.net: WiKID Strong Authentication System... (7 Replies)
Discussion started by: satimis
7 Replies

7. UNIX for Advanced & Expert Users

How to use SFTP from command line without entering user and password

I would like to use SFTP from command line without entering userid and password. Here is what I have gathered and did. 1) Create a public and private key pair for the protocol you want to use. To create a key pair for use by SSH2, enter: ssh-keygen -t dsa I did that and got... (7 Replies)
Discussion started by: Hangman2
7 Replies

8. UNIX for Dummies Questions & Answers

New Approach Hiding login password from ps -ef

Hello all , I looked up this site for solutions to hide login info from ps -ef | grep like using a seperate file and store the password in that especially for oracle sqlplus scripts. I just got this thought , But dont know how to implement this in UNIX. Is there a way to revoke access from... (17 Replies)
Discussion started by: simonsimon
17 Replies

9. UNIX for Advanced & Expert Users

Password Aging with Openssh 5.2 SFTP Subsystem Jail

All, I enabled PAM and aged a password, but when I login it asks me for the current password then says password unchanged after entering the current password. Is this a bug? My security dept is going to want me to enable password aging and I'm stuck! Any help on what the issu is? ... (6 Replies)
Discussion started by: markdjones82
6 Replies

10. Shell Programming and Scripting

Storing a password

Hello, for an automated telnet login script I need to store a password on the server. Is there a possibility to store the password in an encrypted form and decrypt it every time the login is performed? Are there any ideas Love, Sally (5 Replies)
Discussion started by: Sally[-_-]
5 Replies

11. Shell Programming and Scripting

Search entire system for files containing certain word(s)

I am trying to create a script that will report (email and ftp results) on any file, system wide, that has the word password= in it. (and any variation of password=). Basicaly looking for any plain text passwds. I figured the easiest way would be like this...... for i in `cat find-pw.dat` do... (6 Replies)
Discussion started by: theninja
6 Replies

12. Cybersecurity

swordfish --- a password generator

Here is my new password generation script. The attachment, swordfish.txt, is in dos format. Remember that you need to use dos2unix or flip or something to get it into unix format. The script is self documenting. It has an extensive help system built-in. And you can run: swordfish "set... (8 Replies)
Discussion started by: Perderabo
8 Replies

13. UNIX for Dummies Questions & Answers

Explaining some lines from files : .login and .cshrc

Hello, can anyone explain me please what do those lines do ? From file .login 1) set history=40 2) setenv MACH `uname -s` 3) source /etc/login 4) source ~/$MACH/.login From file .cshrc 1) if ( ! $?prompt) exit 0 (5 Replies)
Discussion started by: bbqtoss
5 Replies

14. Cybersecurity

Ssh password less login with different ID

Hi, I have setup password less ssh connection between Server A and Server B and I am able to connect with User2. But my requirement is, User 1 run a script in Server A to ssh into Server B as User 2 but it is asking password every time I execute. Server A: Login as User 1 and execute sh... (8 Replies)
Discussion started by: sakthi.99it
8 Replies

15. AIX

Decrypt ssha1 password

hi to all, i have an AIX6.1 machine and i want to decrypt an ssha1 password written on /etc/security/passwd. the reason that i want to do that is because i have some complains about a few users that cannot login and receive the message for invalid login. i suspect that they are entering wrong... (15 Replies)
Discussion started by: omonoiatis9
15 Replies