Sponsored Content
Operating Systems HP-UX To unblock the some audit scripts Post 302259938 by vbe on Wednesday 19th of November 2008 09:38:21 AM
Old 11-19-2008
To me its clearly a trusted box but Im not to understand where he sees an issue:

Quote:
a) When we give wrong root password three times in a row, the root account has been disabled.
I dont know many root users knowing the box is trusted who would try 3 times in a row... usually at the 2nd attempt he would stop and think twice...

And yes even root is asked the old passwd, so if someone has changed it meanwhile not announcing it to his collegues you are looking for trouble...

Of course when you are a bit neurotic and suffer from amnesia (like me...) you work hard on alternatives e.g. replace the default value of attempts to 5, and make great usage of sudo... And most important (passwd has been changed and you dont know it ...) I grant myself (my users account) the possibility of shutdown/reboot the box...
 

9 More Discussions You Might Find Interesting

1. UNIX Desktop Questions & Answers

audit to crontab scripts

hi, I have scripts which are running every 3 minutes. The scripts include connection to a database, using sqlplus. Sometimes, the connection fails (invalid username or password, locked user etc..) and the connection returns the error code, to the unix screen or to a file. I want whenever there's... (2 Replies)
Discussion started by: krem
2 Replies

2. Linux

Unblock port 80 for none root user

Hi all, I am running an oracle application server but the problem is that the default port it is using is 7777 and if i want to make it port 80 i have to run the server as root which something i do not want to do. If i understand well to run on a port under 1024 the application needs root... (1 Reply)
Discussion started by: staind_art
1 Replies

3. HP-UX

How to Unblock Port in HP UX

Dear All.. I have an HP-UX server, i need to access it through certain port to run application.., but i cant access it, I can login as root by using other port Can anyone give me any advice how to see the list of active port? and how to block / unblock it?? Thankyou in advance ... (1 Reply)
Discussion started by: grimanda
1 Replies

4. Shell Programming and Scripting

Changing the Bash Scripts to Bourne Scripts:URGENT

Hi, I have to write a program to compute the checksums of files ./script.sh I wrote the program using bash and it took me forever since I am a beginner but it works very well. I'm getting so close to the deadline and I realised today that actually I have to use normal Bourne shell... (3 Replies)
Discussion started by: pgarg1989
3 Replies

5. Shell Programming and Scripting

KSH - How to call different scripts from master scripts based on a column in an Oracle table

Dear Members, I have a table REQUESTS in Oracle which has an attribute REQUEST_ACTION. The entries in REQUEST_ACTION are like, ME, MD, ND, NE etc. I would like to create a script which will will call other scripts based on the request action. Can we directly read from the REQUEST_ACTION... (2 Replies)
Discussion started by: Yoodit
2 Replies

6. AIX

When AIX audit start, How to set the /audit/stream.out file size ?

Dear All When I start the AIX(6100-06)audit subsystem. the log will save in /audit/stream.out (or /audit/trail), but in default when /audit/stream.out to grow up to 150MB. It will replace the original /audit/stream.out (or /audit/trail). Then the /audit/stream.out become empty and... (2 Replies)
Discussion started by: nnnnnnine
2 Replies

7. Solaris

how to configure a audit in global zone that will audit all the zone

Hi everyone, how i can configure a single audit service in the global zone for all zones, on solaris BSM. I will be glad to hear back from you. Thanks and Regards (3 Replies)
Discussion started by: ladondo
3 Replies

8. UNIX for Dummies Questions & Answers

Unblock the websites

Hi Guys, Some of the websites are blocked in my office. And I know the root password. I tried to unblock those sites.. Checkedcd /etc/modprobe.d $ cat blacklist.conf # # Listing a module here prevents the hotplug scripts from loading it. # Usually that'd be so that some other driver will... (8 Replies)
Discussion started by: Adhi
8 Replies

9. Red Hat

Want to unblock port for particular site

Dear All We have one Centos Server on Asterisk platform.We are trying to open one particular site from client machines which is our client portal.We have to upload data on that.When we trying to open that site somewhere its blocking and not opening.We did tracert and found one router down... (3 Replies)
Discussion started by: Vaibhav.T
3 Replies
SHADOW(5)							File Formats Manual							 SHADOW(5)

NAME
shadow - encrypted password file DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is Login name Encrypted password Days since Jan 1, 1970 that password was last changed Days before password may be changed Days after which password must be changed Days before password is to expire that user is warned Days after password expires that account is disabled Days since Jan 1, 1970 that account is disabled A reserved field The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, . and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES) algorithm. For example if it starts with "$1$" it means the MD5-based algorithm was used. Refer to crypt(3) for details on how this string is interpreted. The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user. An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass- word expires. An account will also be disabled on the specified day regardless of other password expiration information. This information supercedes any password or password age information present in /etc/passwd. This file must not be readable by regular users if password security is to be maintained. FILES
/etc/passwd - user account information /etc/shadow - encrypted user passwords SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8) AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com) SHADOW(5)
All times are GMT -4. The time now is 12:36 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy