04-24-2009
Hi incredible..
actually this problem with all users not some of all.
It shows passwd : Sorry, wrong passwd
Permission denied
but root is able to change the password for the user
i checked the permission of /etc/passwd and /etc/shadow
-rw-r--r-- 1 root sys 15738 Apr 23 10:24 /etc/passwd
and shadow permission is :
-r-------- 1 root sys 7173 Apr 23 10:24 /etc/shadow
and i did remove the password for user and put again new password but it's still prompting the same error.
Last edited by daya.pandit; 04-24-2009 at 02:45 AM..
10 More Discussions You Might Find Interesting
1. Solaris
Hi
Someone logged on the system with a Normal user and changed the password , for this user , how can i know ? who changed the password from which terminal ?
regards
Georges (5 Replies)
Discussion started by: itsgeorge
5 Replies
2. Solaris
Hi,
I need help urgently.
I've been running NIS for 4 years without problem. And just two weeks ago, all my users are unable to change their password which never happens before.
When we issue passwd or yppasswd, this is what we get
passwd : Changing password for Jennifer
Enter existing... (2 Replies)
Discussion started by: jennifer
2 Replies
3. HP-UX
I have two unix system A and B with same configuration.
I can use remsh from A system login to B system as root, but when I want to change the root password of B system, it ask me the old password, but i forgot it.
However, is it possible to change the B system root password? :(
Thanks a lot (3 Replies)
Discussion started by: zetadhell
3 Replies
4. Solaris
Friends
I want to know whether i can change the password of a user logged in thru NIS from a client machine after stopping the YP services in NIS server.
Note - The Slave server is up and running.
I tried doing this. But i got the reply "Permission Denied".
I stopped the YP services in... (7 Replies)
Discussion started by: efunds
7 Replies
5. Linux
Hi all,
I'm having an issue resetting an Linux user password. As root, I type 'passwd <username>, enter the new password, but the user is still Access Denied. Can someone assist me in figuring this one out?
The box is running "Linux trm62 2.4.21-15.ELsmp #1 SMP Thu Apr 22 00:18:24 EDT 2004... (6 Replies)
Discussion started by: bbbngowc
6 Replies
6. Solaris
i created 1 user . Now its passwd time period get expired.
Now how can I set password for that user. Also how can I set a condition such a way that after every 3 months user must change his passwd. (5 Replies)
Discussion started by: ajitkraj
5 Replies
7. IP Networking
I have a T2000 server running Solaris 10. I want to change the auto negotiaing on the ethernet ce3 to off. but when
I try with the comand only ce2 changes. I have tried with but failing.
Note: Earlier i was using ce2 but not using ce3 because ce2 failed.
Kindly help (1 Reply)
Discussion started by: lottiem
1 Replies
8. Shell Programming and Scripting
Hi all
Im trying to learn the basics of bash and am struggling with some file manipulation. I am trying to run a script that once you have logged in allows you to change your password which is held (along with the corresponding username) in a different file called usernames. When i try to run my... (2 Replies)
Discussion started by: somersetdan
2 Replies
9. Shell Programming and Scripting
i want to change user to "root" from another user while running a script. how can i automatically feed the password? for example, i want to write a script say "script.sh"... it will first run the command "p" as mhmn user, and then it will change the user to "root" by using "su - root" command. at... (1 Reply)
Discussion started by: mhmn
1 Replies
10. AIX
I want to change the root password on an AIX box. What is the best method to do this so i do not get myself locked out. When I do i search the results come up for resetting the password if you are locked out.
Thanks (5 Replies)
Discussion started by: fierfek
5 Replies
LEARN ABOUT DEBIAN
pam_pwcheck
pam_pwcheck(8) Reference Manual pam_pwcheck(8)
NAME
pam_pwcheck - PAM module for password strength checking
DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the
change itself. It only provides functionality for one PAM management group: password changing.
This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack
likes the password, the module does an additional set of strength checks. These checks are:
Palindrome
Is the new password a palindrome of the old one?
Case Change Only
Is the new password the old one with only a change of case?
Similar
Is the new password too similar to old one?
Simple Is the new password too short?
Rotated
Is the new password a rotated version of the old password?
Already used
Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd.
OPTIONS
The following options may be passed to the module:
cracklib=<path to dictionaries>
Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is
/usr/lib/cracklib_dict.
debug A lot of debug information is printed with syslog(3).
maxlen=number
Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0.
minlen=number
The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero
suppresses this check. The default is 5.
no_obscure_checks
No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage
is recommended.
not_set_pass
If this option is given, pam_pwcheck will not make the new password available for other modules.
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the
user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process.
tries=number
Maximum number of attempts to change a password if the new ones are rejected because they are too easy.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask
the user for the new password.
use_first_pass
By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked
for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is
available.
remember=XX
Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number
between 1 and 400.
enforce_for_root
If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what
you are doing, since it could be as result that root is no longer allowed to login at all.
FILES
/etc/security/opasswd
SEE ALSO
passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)
pam_pwcheck September 2008 pam_pwcheck(8)