10-04-2010
I did find the max value for GID and UID parameters.But it contradict my current setup.How its possible?
Quote:
# grep GID /etc/login.defs
GID_MIN 500
GID_MAX 60000
# grep UID /etc/login.defs
UID_MIN 500
UID_MAX 60000
For example:
Quote:
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
In above example nfsnobody user is assigned UID and GID which are not in range specified in login.defs.
However This is fresh installation and nothing is done as far as tricking the os is concerned.
Last edited by pinga123; 10-04-2010 at 01:43 AM..
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I want to append password into /etc/shadow file using a shell script.
My below script does add the users to both /etc/passwd and /etc/shadow but how can I add the hordcoded passwords to /etc/shadow file can some one help me ?
# To add the groups into /etc/group file
for a_user... (5 Replies)
Discussion started by: modgil
5 Replies
2. UNIX for Dummies Questions & Answers
hi,
I had to reset a lost root password by editing the /etc/passwd and /etc/shadow files ( this is a xen vm file, so i mounted and chrooted the file )
after the reboot with an empty password on root , i have set a new password with passwd but
it only changed the /etc/passwd file.... (0 Replies)
Discussion started by: progressdll
0 Replies
3. Solaris
Is it possible to reset a normal user password , by editing password field in /etc/shadow file?
Thanks (6 Replies)
Discussion started by: ksvaisakh
6 Replies
4. Solaris
Hi Solaris's expert
I need to change user password on Solaris10 2 servers.
With the same password I can change it just only one.
Try to check everything but not found difference??
password pattern: abcdeFgh9Jk
server1 check all characters but server2 check only first 8 characters.Why??... (10 Replies)
Discussion started by: arm_naja
10 Replies
5. Red Hat
Hi,
I am running NIS server on redhat linux 5 and I want to implement password restrictions for the yppasswd, how can I do it.Please help me.
I can implement password restriction for passwd by configuring /etc/pam.d/system-auth and setting crack_lib.so but I don't know how to implent the same... (3 Replies)
Discussion started by: ktrimu
3 Replies
6. Solaris
hi folk,
i try to setup a new password policy for our solaris box user, below are the /etc/default/passwd/, but then when i tried to create a user, it didn't ask for numeric character, and the new password also didn't ask for special characters.
# useradd testing
# passwd testing
New... (7 Replies)
Discussion started by: dehetoxic
7 Replies
7. Shell Programming and Scripting
On SPARC Solaris 10. I set the app account so it's expired. I also want it
so not required to change password at first login, I can do this by
removing the numbers after the password in /etc/shadow.
example using user1
The /etc/shadow file looks like this:
user1:kOmcVXAImRTAY:0::::90::
... (8 Replies)
Discussion started by: TKD
8 Replies
8. UNIX for Dummies Questions & Answers
i have an application that uses the encrypted password that's in the /etc/shadow file.
i copied the line for the particular username i was interested it in from shadow file and i pasted it into the password file of the application. the application is nagios.
this application allowed that... (5 Replies)
Discussion started by: SkySmart
5 Replies
9. Ubuntu
Hello Team,
I am using Lubuntu & have DRBL remote boot setup with open Ldap authentication. Currently there is no password expire policy. I want to set Password Policy so that user's password will expire after a month & they will get prompt to change their password.
Using PAM we can do it,... (1 Reply)
Discussion started by: paragnehete
1 Replies
10. AIX
I need help. I have set a password policy. But I want to dis allow setting user name as password.
My policy is as below...
min length =8
min diff=2
min alpha=2
max repeats=2
dictionary= /usr/share/dict/words
Still user can set his username as password (i.e. Jackie1234).
Code tags for... (11 Replies)
Discussion started by: powerAIX
11 Replies
LEARN ABOUT MINIX
lslogins
LSLOGINS(1) User Commands LSLOGINS(1)
NAME
lslogins - display information about known users in the system
SYNOPSIS
lslogins [options] [-s|-u[=UID]] [-g groups] [-l logins]
DESCRIPTION
Examine the wtmp and btmp logs, /etc/shadow (if necessary) and /etc/passwd and output the desired data.
The default action is to list info about all the users in the system.
OPTIONS
Mandatory arguments to long options are mandatory for short options too.
-a, --acc-expiration
Display data about the date of last password change and the account expiration date (see shadow(5) for more info). (Requires root
privileges.)
--btmp-file path
Alternate path for btmp.
-c, --colon-separate
Separate info about each user with a colon instead of a newline.
-e, --export
Output data in the format of NAME=VALUE.
-f, --failed
Display data about the users' last failed login attempts.
-G, --supp-groups
Show information about supplementary groups.
-g, --groups=groups
Only show data of users belonging to groups. More than one group may be specified; the list has to be comma-separated.
Note that relation between user and group may be invisible for primary group if the user is not explicitly specify as group member
(e.g. in /etc/group). If the command lslogins scans for groups than it uses groups database only, and user database with primary GID
is not used at all.
-h, --help
Display help information and exit.
-L, --last
Display data containing information about the users' last login sessions.
-l, --logins=logins
Only show data of users with a login specified in logins (user names or user IDS). More than one login may be specified; the list
has to be comma-separated.
-n, --newline
Display each piece of information on a separate line.
--noheadings
Do not print a header line.
--notruncate
Don't truncate output.
-o, --output list
Specify which output columns to print. Use --help to get a list of all supported columns.
-p, --pwd
Display information related to login by password (see also -afL).
-r, --raw
Raw output (no columnation).
-s, --system-accs
Show system accounts. These are by default all accounts with a UID below 1000 (non-inclusive), with the exception of either nobody
or nfsnobody (UID 65534). This hardcoded default maybe overwritten by parameters SYS_UID_MIN and SYS_UID_MAX in the file
/etc/login.defs.
--time-format type
Display dates in short, full or iso format. The default is short, this time format is designed to be space efficient and human
readable.
-u, --user-accs
Show user accounts. These are by default all accounts with UID above 1000 (inclusive), with the exception of either nobody or nfs-
nobody (UID 65534). This hardcoded default maybe overwritten by parameters UID_MIN and UID_MAX in the file /etc/login.defs.
-V, --version
Display version information and exit.
--wtmp-file path
Alternate path for wtmp.
-Z, --context
Display the users' security context.
-z, --print0
Delimit user entries with a nul character, instead of a newline.
NOTES
The default UID thresholds are read from /etc/login.defs.
EXIT STATUS
0 if OK,
1 if incorrect arguments specified,
2 if a serious error occurs (e.g. a corrupt log).
SEE ALSO
group(5), passwd(5), shadow(5), utmp(5)
HISTORY
The lslogins utility is inspired by the logins utility, which first appeared in FreeBSD 4.10.
AUTHORS
Ondrej Oprala <ooprala@redhat.com>
Karel Zak <kzak@redhat.com>
AVAILABILITY
The lslogins command is part of the util-linux package and is available from Linux Kernel Archive <https://www.kernel.org/pub/linux/utils
/util-linux/>.
util-linux April 2014 LSLOGINS(1)