10-22-2008
Putty session
Dear all,
We have a practice of getting user's passwords expired after 60 days and a strong password policy.
When a user tries to enter a password which is not compliant to the policy which is set putty exists without giving any feedback to the user. Below is something i captured from the putty log in one such case.
dumuser
password:
New Password:
sshd-kbdint: Password too short - must be at least 10 characters.
Access denied
No supported authentication methods left to try!
The real problem to me is how to get the putty session not to close and prompt the user of the sin he's comitting, further allow him to change the password accordingly.
All above did not come out on the putty session but the log which i enabled. Normal users do not do such things and complain that they have problems logging in.
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi there.
How do I make the DB connection see the parameter variables passed to the unix script ? The code snippet below isn't working properly.
sqlplus << EOF
user1@db1/pass1
BEGIN
PACKAGE1.perform_updates($1,$2,$3);
END;
EOF
Thanks in advance,
Abrahao. (2 Replies)
Discussion started by: 435 Gavea
2 Replies
2. Solaris
I am not able to login in gnome session and java session in Sun solaris 9& 10 respectively through xmanager as a nis user, I am able to login in common desktop , but gnome session its not allowing , when I have given login credentials, its coming back to login screen, what shoul I do to allow nis... (0 Replies)
Discussion started by: durgaprasadr13
0 Replies
3. AIX
Hi Everyone:
Is there any way to enable colors through putty for a session into AIX? I've tried to set the TERM variable to xterm-256color but it doesn't work
having a 8-color terminal would be okay for me
thanks in advance (5 Replies)
Discussion started by: edgarvm
5 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I had add the following line into .profile and .bash_profile for the timeout session to avoid putty close automatically :
timeout=10800
However, i still keep encounter session time out every after 60 seconds.
Can anyone please help advice.
Many Thanks! (2 Replies)
Discussion started by: wancy
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
sorry if this is the wrong forum for this question but I couldnt spot another obvious forum for it.
I have a windows shortcut which opens up a saved session in putty. From this session I then ssh to another remote server. I was wondering is there a way that I can either edit my shortcut... (2 Replies)
Discussion started by: newb1000
2 Replies
6. Emergency UNIX and Linux Support
I am running a process in nohup .
nohup getkeys.ksh 132 > 132.out &
When I close the putty terminal,The process is getting killed .
default_signal_handler called for signal no: 1
Is there a way to keep the process running even If I close the terminal (2 Replies)
Discussion started by: prasperl
2 Replies
7. Solaris
Hi,
I would appreciate some help.
I remotely access, across a VPN, an M5000 and when I connect to the XSCF I can then access the OS using console -d0 and then I can get to the console.
The problem I have is that I need to run something which will take many hours and I can't run it in the... (6 Replies)
Discussion started by: giles.cardew
6 Replies
8. UNIX for Dummies Questions & Answers
Hi,
Is there any way to refresh the session(for the profile file changes get reflect) in putty?
I am tired of closing reopening putty.
Thanks,
Pandeeesh
CTRL + Q to Enable/Disable GoPhoto.it (4 Replies)
Discussion started by: pandeesh
4 Replies
9. UNIX for Dummies Questions & Answers
I have a Windows batch file with the below entry for auto login.
putty.exe -ssh user1@10.10.10.7 -pw passwd1 -m command.txtcommnd.txt contains the below entries
pwd
sudo su - user2Switching from user1 to user2 does not require any password .
Output just prints the pwd and not sudo
When i... (6 Replies)
Discussion started by: mohtashims
6 Replies
LEARN ABOUT HPUX
pwd_strengthd
pwd_strengthd(1m) pwd_strengthd(1m)
NAME
pwd_strengthd - The sample Password Management Server
SYNOPSIS
pwd_strengthd [+/-all[_spaces]] [+/-alp[ha_num]]
[-c[ache_size]] size [-d[ebug]]
[-m[in_len]] pwd_min_len [-t[imeout]] minutes
[-v[erbose]]
OPTIONS
Allow passwords to be all spaces. If this option is not set, the effective registry policy is used. Disallow passwords to be all spaces.
If this option is not set, the effective registry policy is used. Allow passwords to consist only of alphanumeric characters. If this
option is not set, the effective registry policy is used. Disallow passwords to consist only of alphanumeric characters. If this option is
not set, the effective registry policy is used. Specify the number of hash buckets in the password cache. The password cache is used to
store generated passwords which are retrieved when the password is strength checked. The password cache is a hash table with a linked list
for collisions. The size should be set to a reasonable value based on how large the cache will be on average. The default value if not
specified is 100. Run in the foreground. Log messages are written to standard output. Specify the minimum length of a password. If this
option is not set, the effective registry policy is used. Specify the time, in minutes, that generated passwords remain in the cache
before they are deleted from memory. If this option is not specified, the default time is 30 minutes. Runs in verbose mode. More detailed
messages are sent to the logfile $DCELOCAL/var/security/pwd_strengthd.log. (Use of this option is recommended.)
DESCRIPTION
DESCRIPTION
pwd_strengthd is a sample Password Management Server. It exports the rsec_pwd_mgmt application programming interface.
pwd_strengthd generates passwords and strength-checks them. It enforces the security registry policy for password strength-checking.
Administrators can override the security registry policy via the command-line options (alpha_num, all_spaces, min_len.)
Administrators can subject principals to password-strength and -generation policies by attaching the following ERAs: Specifies the password
management policy the user must conform to when selecting passwords. Specifies information required in order to connect to the password
management server.
See the OSF DCE Administrator's Guide -- Core Services for more information and examples. You may want to enhance pwd_strengthd to support
your site's policies for password strength and generation.
pwd_strengthd(1m)