05-30-2002
On most unix systems the password is limited to 8 characters. You can enter more, but the extra trailing characters are ignored.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
This is my first post!! I really hope this question hasn't been asked a thousand times before(I'll bet it has).
Anyway, here it is. I am new to the UNIX world by the way so forgive my ignorance. OK, whenever I write code on my windows machine and then try to port it over to UNIX I always get... (3 Replies)
Discussion started by: Jubba
3 Replies
2. UNIX for Dummies Questions & Answers
I am using smartFTP client on my windows machine to connect to a linux box of mine (different location) to download some large files 100+meg. The linux box is running vsftp.
After several minutes of downloading, the connection suddenly dies, and I cannot reconnect to the box via FTP using ANY... (7 Replies)
Discussion started by: Spetnik
7 Replies
3. AIX
Hi,
I have a strange problem. we're trying to connect an IBM pseries, to a Brocade switch, for SAN acess, using a badged emulex card, (IBM FC6239) WE can configure the device to see the fabric. The only problem we have is that the Brocade sees the HBA as storage, and not as a HBA.
We've zoned... (1 Reply)
Discussion started by: praxis22
1 Replies
4. UNIX for Dummies Questions & Answers
I discovered that where 'tr -s' works as expected on grepped input, it appears to completely fail on dig results.
I am not sure if this is because of some sort of non posix compliancy, or what.
Here is what I did:
The command below works as expected, squeezing all repeated spaces to a single... (3 Replies)
Discussion started by: bdmeyersc
3 Replies
5. BSD
Our webserver is running FreeBSD, for the last few days we have been having an issue with our cronjobs/mysql server.
Specifically we have jobs that execute php scripts to do various things to the website. When running these php scripts manually, via external browser, or lynx on the server, they... (8 Replies)
Discussion started by: mrfr0g
8 Replies
6. Programming
I've been going through a java tutorial, and ran across some strangeness in this small example...
class SqrRoot {
public static void main(String args) {
double num,sroot,rerr,resquare;
for(num = 1.0; num < 100.0; num++) {
sroot = Math.sqrt(num);
... (1 Reply)
Discussion started by: Trones
1 Replies
7. Solaris
All,
I'm baffled by some sort behavior on SunOS 5.10 and looking for guidance.
Running the command:
sort -t'|' -k5,5 -k7,7 -k1,1 -k2,2 -k3,3 -k6,6 -k8,8 test
Against the file "test":
thirdA||||first||second|Data
thirdB||||first||second|
thirdC||||first||second|Data... (11 Replies)
Discussion started by: effigy
11 Replies
8. UNIX for Dummies Questions & Answers
I have to apologize for my ignorance so this question is probably stupid.
How does awk process a file? Does it read from top of input file to end of file going line by line?
Yoda helped me create an awk script that helps me parse the named.conf file and output it into a .csv file but when... (8 Replies)
Discussion started by: djzah
8 Replies
9. Shell Programming and Scripting
Hi all, I'm trying to use bash to create a basic parser for some text, because basic grep/sed/awk have all my needs covered.
So, I'm creating the chain of grep/sed I need and trying the execute that on the data I gather.
The problem is, it's not working as it does when hardcoded.
e.g.
... (3 Replies)
Discussion started by: beomagi
3 Replies
LEARN ABOUT NETBSD
passwd
PASSWD(1) BSD General Commands Manual PASSWD(1)
NAME
passwd -- modify a user's password
SYNOPSIS
passwd [user]
passwd [-d files | -l] [user]
passwd [-d nis | -y] [user]
passwd [-d krb5 | -k] [principal]
DESCRIPTION
passwd changes the user's password. First, the user is prompted for their current password. If the current password is correctly typed, a
new password is requested. The new password must be entered twice to avoid typing errors.
The new password should be at least six characters long and not purely alphabetic. Its total length must be less than _PASSWORD_LEN (cur-
rently 128 characters). Numbers, upper case letters and meta characters are encouraged.
All options may not be available on all systems.
-d database
This option specifies the password database that should be updated. The following databases are supported:
files This specifies that the password change should be applied to the local password file. When changing only the local password,
passwd uses pwd_mkdb(8) to update the password databases.
nis This specifies that the password change should be applied to the NIS password database. The rpc.yppasswdd(8) daemon should be
running on the master NIS server.
krb5 This specifies that the user's Kerberos 5 password should be changed. The host must be configured to use Kerberos. See
krb5.conf(5).
-l This is the equivalent of -d files.
-y This is the equivalent of -d nis.
-k This is the equivalent of -d krb5.
If a password database is not specified, passwd will change the password database as determined by the Pluggable Authentication Module (PAM)
library.
The type of cipher used to encrypt the password depends on the configuration in passwd.conf(5). It can be different for local and NIS pass-
words.
FILES
/etc/master.passwd The user database
/etc/passwd A Version 7 format password file
/etc/passwd.XXXXXX Temporary copy of the password file
SEE ALSO
chpass(1), login(1), pwhash(1), passwd(5), passwd.conf(5), pam(8), pwd_mkdb(8), vipw(8)
Robert Morris and Ken Thompson, UNIX password security.
HISTORY
A passwd command appeared in Version 6 AT&T UNIX.
BSD
February 25, 2005 BSD