04-15-2010
In general, putting passwords out in files is a big security leak. Don't do it.
And while markdjones code will encrypt it, it would take any programmer about 10 minutes to crack it. So that means you would have to encrypt the perl code as well.
There used to be a tool to create an executable image from perl. I dunno if it is still around.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
All,
I want to encrypt a database system administration password into a file or environment variable. Then, I want to decrypt the password from the file or environment variable so nobody sees the clear text password.
For example, I have the database password of developement.
I need to... (1 Reply)
Discussion started by: bubba112557
1 Replies
2. AIX
I have a strange question for someone regarding the AIX 5.2 environment.
Here is the scenerio:
I have a script that is running a menu full of options.
1. I like food
2. I don't like food
Enter Option:_
Enter userID:_
Enter Password:_
(The menu is conversational only so go with me on... (6 Replies)
Discussion started by: Justman
6 Replies
3. Solaris
Hi,
I would like to login from a Sun server running ssh:
Sun_SSH_1.1, SSH protocols 1.5/2.0, OpenSSL 0x0090704f
to
ssh: SSH Secure Shell 3.0.1 on sparc-sun-solaris2.6
How can I achieve this?
Thanks a million in advance (1 Reply)
Discussion started by: newbewie
1 Replies
4. Solaris
Hi Gurus
I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails.
Resetting my password reenables the keys.
Do i need to do something to avoid this scenario or is this... (2 Replies)
Discussion started by: Renjesh
2 Replies
5. Shell Programming and Scripting
Iam using the teradata...
and running the scripts in unix,
I wan to encrypt the teradata password in Unix...
my hostname is : bprod
usename: KRN777
passwrd: passwrd
can ant one tell me the exact command to encrypth the passwrd....
thanks, (5 Replies)
Discussion started by: nani1984
5 Replies
6. Shell Programming and Scripting
Hello All,
I need to accept a password from the user and validate it, without having to hard-code it anywhere. Any ideas? (3 Replies)
Discussion started by: optimus_1
3 Replies
7. Cybersecurity
Hello Gurus,
I am trying to set up bidirectional password-less login between a linux and a Solaris. The way I am doing is very simple, which is creating pub/priv key pairs on each host and add the pub key to each other's authorized_keys file:
ssh-keygen -t rsa (I tried dsa, and it didn't work... (4 Replies)
Discussion started by: error_lee
4 Replies
8. Solaris
Hello experts,
I am an PLM application admin, use AIX/SOlaris servers where application is installed
to schedule a cron in my system this what i do
Login to AIX/Unix system using an OS account,
Schedule a service to execute the required script - The script will have a PLM utility and... (4 Replies)
Discussion started by: kraghum
4 Replies
LEARN ABOUT REDHAT
login.krb5
LOGIN(8C) LOGIN(8C)
NAME
login.krb5 - kerberos enhanced login program
SYNOPSIS
login.krb5 [ -fF [username] ]
DESCRIPTION
login.krb5 is a modification of the BSD login program which is used for two functions. It is the sub-process used by krlogind and telnetd
to initiate a user session and it is a replacement for the command-line login program which, when invoked with a password, acquires Ker-
beros tickets for the user.
login.krb5 will prompt for a username, or take one on the command line, as login.krb5 username and will then prompt for a password. This
password will be used to acquire Kerberos Version 5 tickets and Kerberos Version 4 tickets (if possible.) It will also attempt to run aklog
to get AFS tokens for the user. The version 5 tickets will be tested against a local krb5.keytab if it is available, in order to verify the
tickets, before letting the user in. However, if the password matches the entry in /etc/passwd the user will be unconditionally allowed
(permitting use of the machine in case of network failure.)
OPTIONS
-r hostname
pass hostname to rlogind.
-h hostname
pass hostname to telnetd, etc.
-f name
Perform pre-authenticated login, e.g., datakit, xterm, etc.; allow preauthenticated login as root.
-F name
Perform pre-authenticated login, e.g.,for datakit, xterm, etc.; allows preauthenticated login as root.
-e name
Perform pre-authenticated, encrypted login. Must do term negotiation.
CONFIGURATION
login.krb5 is also configured via krb5.conf using the login stanza. A collection of options dealing with initial authentication are pro-
vided:
krb5_get_tickets
Use password to get V5 tickets. Default value true.
krb4_get_tickets
Use password to get V4 tickets. Default value true.
krb4_convert
Use Kerberos conversion daemon to get V4 tickets. Default value false. If false, and krb4_get_tickets is true, then login will get
the V5 tickets directly using the Kerberos V4 protocol directly. This does not currently work with non MIT-V4 salt types (such as
the AFS3 salt type.) Note that if configuration parameter is true, and the krb524d is not running, login will hang for approxi-
mately a minute under Solaris, due to a Solaris socket emulation bug.
krb_run_aklog
Attempt to run aklog. Default value true.
aklog_path
Where to find it [not yet implemented.] Default value $(prefix)/bin/aklog.
accept_passwd
Don't accept plaintext passwords [not yet implemented]. Default value false.
DIAGNOSTICS
All diagnostic messages are returned on the connection or tty associated with stderr.
SEE ALSO
rlogind(8C), rlogin(1C), telnetd(8c)
BUGS
Should use a config file to select use of V5, V4, and AFS, as well as policy for startup.
LOGIN(8C)