Sponsored Content
Top Forums Shell Programming and Scripting is there anyway of implementing password aging in NIS? Post 302115499 by reborg on Wednesday 25th of April 2007 07:05:41 AM
Old 04-25-2007
By default no.

It is possible by use of some very dubious hacks, but it strongly recommended not to use them as they pose a much greater security issue than not having password aging enabled.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

OpenSSH and password aging

Vesion 3.8.1 of OpenSSH has been compiled on a Solaris 8 host. I am having difficulties in enabling password aging to work from reading /etc/default/passwd and /etc/shadow. # passwd -f < user-id > works satisfactorily however once a password ages through due course from the settings in... (1 Reply)
Discussion started by: raylen
1 Replies

2. UNIX for Dummies Questions & Answers

password aging help

If the command passwd -f is used, Users get the below error. I need to force users to change there passwords at initial login. Anyone know what is going on? This is on a Non-Stop UX system UX:in.login: ERROR: Your password has been expired for too long UX:in.login: TO FIX: Consult your system... (0 Replies)
Discussion started by: breigner
0 Replies

3. UNIX for Dummies Questions & Answers

password aging

hi experts this is regarding password aging i tried searching forum but i cudnt locate given a login id, i would like to determine whether password ageing has been enabled for that and for the login id whether password has been expired on a particular point of time Thanks (4 Replies)
Discussion started by: teletype_error
4 Replies

4. Solaris

NIS Password

Greetings All, I am newbie to Unix. Have the following issue: Users are unable to change their password themselves. After they ash to a specific box (NIS Account is extended to that box)and then su as them with an assigned password and run command to change the password they get this error: ... (2 Replies)
Discussion started by: cardiner
2 Replies

5. Solaris

Changing Password in NIS

Friends I want to know whether i can change the password of a user logged in thru NIS from a client machine after stopping the YP services in NIS server. Note - The Slave server is up and running. I tried doing this. But i got the reply "Permission Denied". I stopped the YP services in... (7 Replies)
Discussion started by: efunds
7 Replies

6. Shell Programming and Scripting

Implementing Password

I am trying to implement a login screen to the following code how would i go about doing so. I have try to place the password in a variable using if statements which would usually work but as i have the system in a while loop i think i need to find another method. #!/bin/bash #Filename:... (4 Replies)
Discussion started by: warlock129
4 Replies

7. UNIX for Advanced & Expert Users

Password Aging with Openssh 5.2 SFTP Subsystem Jail

All, I enabled PAM and aged a password, but when I login it asks me for the current password then says password unchanged after entering the current password. Is this a bug? My security dept is going to want me to enable password aging and I'm stuck! Any help on what the issu is? ... (6 Replies)
Discussion started by: markdjones82
6 Replies

8. Red Hat

NIS password policy

Hi, I am running NIS server on redhat linux 5 and I want to implement password restrictions for the yppasswd, how can I do it.Please help me. I can implement password restriction for passwd by configuring /etc/pam.d/system-auth and setting crack_lib.so but I don't know how to implent the same... (3 Replies)
Discussion started by: ktrimu
3 Replies

9. HP-UX

Password Aging script non-shadow non-trusted

basically there are several different versions of hpux, this script is for particular version that is non-trusted but also does not use any shadow files.This one is a little harder to do. Usually the time stamp of the last password change is stored as an epoch number in the shadow file, for... (3 Replies)
Discussion started by: sparcguy
3 Replies

10. Linux

Linux password aging and ssh keys

Recently I have been playing with password ageing and the usage of ssh keys. I have found that if usePAM yes (default) is set in the /etc/ssh/sshd_config file then any password ageing and inactiivity can adversely affect a client with ssh keys. For example: Set PASS_MAX_DAYS to 60 in... (5 Replies)
Discussion started by: smurphy_it
5 Replies
nispasswd(1)							   User Commands						      nispasswd(1)

NAME
nispasswd - change NIS+ password information SYNOPSIS
nispasswd [-ghs] [-D domainname] [username] nispasswd -a nispasswd [-D domainname] [ -d [username]] nispasswd [-l] [-f] [-n min] [-x max] [-w warn] [-D domainname] username DESCRIPTION
The nispasswd utility changes a password, gecos (finger) field (-g option), home directory (-h option), or login shell (-s option) asso- ciated with the username (invoker by default) in the NIS+ passwd table. Additionally, the command can be used to view or modify aging information associated with the user specified if the invoker has the right NIS+ privileges. nispasswd uses secure RPC to communicate with the NIS+ server, and therefore, never sends unencrypted passwords over the communication medium. nispasswd does not read or modify the local password information stored in the /etc/passwd and /etc/shadow files. When used to change a password, nispasswd prompts non-privileged users for their old password. It then prompts for the new password twice to forestall typing mistakes. When the old password is entered, nispasswd checks to see if it has "aged" sufficiently. If "aging" is insufficient, nispasswd terminates; see getspnam(3C). The old password is used to decrypt the username's secret key. If the password does not decrypt the secret key, nispasswd prompts for the old secure-RPC password. It uses this password to decrypt the secret key. If this fails, it gives the user one more chance. The old pass- word is also used to ensure that the new password differs from the old by at least three characters. Assuming aging is sufficient, a check is made to ensure that the new password meets construction requirements described below. When the new password is entered a second time, the two copies of the new password are compared. If the two copies are not identical, the cycle of prompting for the new password is repeated twice. The new password is used to re-encrypt the user's secret key. Hence, it also becomes their secure-RPC password. Therefore, the secure-RPC password is no longer a different password from the user's password. Passwords must be constructed to meet the following requirements: o Each password must have at least six characters. Only the first eight characters are significant. o Each password must contain at least two alphabetic characters and at least one numeric or special character. In this case, "alpha- betic" refers to all upper or lower case letters. o Each password must differ from the user's login username and any reverse or circular shift of that login username. For comparison purposes, an upper case letter and its corresponding lower case letter are equivalent. o New passwords must differ from the old by at least three characters. For comparison purposes, an upper case letter and its corre- sponding lower case letter are equivalent. Network administrators, who own the NIS+ password table, may change any password attributes if they establish their credentials (see key- login(1)) before invoking nispasswd. Hence, nispasswd does not prompt these privileged-users for the old password and they are not forced to comply with password aging and password construction requirements. Any user may use the -d option to display password attributes for his or her own login name. The format of the display will be: username status mm/dd/yy min max warn or, if password aging information is not present, username status where username The login ID of the user. status The password status of username: "PS" stands for password exists or locked, "LK" stands for locked, and "NP" stands for no password. mm/dd/yy The date password was last changed for username. (Note that all password aging dates are determined using Greenwich Mean Time (Universal Time) and, therefore, may differ by as much as a day in other time zones.) min The minimum number of days required between password changes for username. max The maximum number of days the password is valid for username. warn The number of days relative to max before the password expires that the username will be warned. The use of nispasswd is strongly discouraged. It is a wrapper around the passwd(1) command. Using passwd(1) with the -r nisplus option will achieve the same result and will be consistent across all the different name services available. This is the recommended way to change the password in NIS+. The login program, file access display programs (for example, ls -l), and network programs that require user passwords, for example, rlogin(1), ftp(1), and so on, use the standard getpwnam(3C) and getspnam(3C) interfaces to get password information. These programs will get the NIS+ password information, which is modified by nis- passwd, only if the passwd: entry in the /etc/nsswitch.conf file includes nisplus. See nsswitch.conf(4) for more details. OPTIONS
The following options are supported: -a Shows the password attributes for all entries. This will show only the entries in the NIS+ passwd table in the local domain that the invoker is authorized to "read". -d [username] Displays password attributes for the caller or the user specified if the invoker has the right privileges. -D domainname Consults the passwd.org_dir table in domainname. If this option is not specified, the default domainname returned by nis_local_directory() will be used. This domainname is the same as that returned by domainname(1M). -f Forces the user to change password at the next login by expiring the password for username. -g Changes the gecos (finger) information. -h Changes the home directory. -l Locks the password entry for username. Subsequently, login(1) would disallow logins with this NIS+ password entry. -n min Sets minimum field for username. The min field contains the minimum number of days between password changes for username. If min is greater than max, the user may not change the password. Always use this option with the -x option, unless max is set to -1 (aging turned off). In that case, min need not be set. -s Changes the login shell. By default, only the NIS+ administrator can change the login shell. The user will be prompted for the new login shell. -w warn Sets warn field for username. The warn field contains the number of days before the password expires that the user will be warned whenever he or she attempts to login. -x max Sets maximum field for username. The max field contains the number of days that the password is valid for username. The aging for username will be turned off immediately if max is set to -1. If it is set to 0, then the user is forced to change the password at the next login session and aging is turned off. EXIT STATUS
The following exit values are returned: 0 Success. 1 Permission denied. 2 Invalid combination of options. 3 Unexpected failure. NIS+ passwd table unchanged. 4 NIS+ passwd table missing. 5 NIS+ is busy. Try again later. 6 Invalid argument to option. 7 Aging is disabled. 8 No memory. 9 System error. 10 Account expired. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWnisu | +-----------------------------+-----------------------------+ SEE ALSO
keylogin(1), login(1), nis+(1), nistbladm(1), passwd(1), rlogin(1), domainname(1M), nisserver(1M), getpwnam(3C), getspnam(3C), nis_local_directory(3NSL), nsswitch.conf(4), passwd(4), shadow(4), attributes(5) NOTES
NIS+ might not be supported in future releases of the SolarisTM Operating Environment. Tools to aid the migration from NIS+ to LDAP are available in the Solaris 9 operating environment. For more information, visit http://www.sun.com/directory/nisplus/transition.html. SunOS 5.10 10 Dec 2001 nispasswd(1)
All times are GMT -4. The time now is 12:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy