11-11-2010
storing your plain text password in a shell script is a very bad idea
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All,
I'm looking for a script to change root password for about 200 servers of both Solaris and Linux. I'm not very good at scripting, can anyone share a script if you already have one?
:) (3 Replies)
Discussion started by: kvadivel80
3 Replies
2. Shell Programming and Scripting
Hi Friends.
I am new to scripting now i want to change the root password using the script with standard password.
which is the easy scripting to learn for the beginner, Thanks in advance. (2 Replies)
Discussion started by: kurva
2 Replies
3. Solaris
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Discussion started by: tferrazz
8 Replies
4. Shell Programming and Scripting
HI I 'm new shall script and unix. I want to create script for change password root by ssh-keygen command . I have 50 servers and I want ot login ot the servers via ssh by type ones password and can login every machines.The script ssh-keygen must ot generate key every weekly than it send new... (2 Replies)
Discussion started by: pellnapook
2 Replies
5. Shell Programming and Scripting
Hi Everybody,
I am trying to write a script (ksh) to connect to oracle db via sqlplus.
As I do not want the password to be in plain text, I've tried to use java to encrypt and decrypt it but I am not sure how can I pass the decrypted password to the script. Pls advise.
Below is what I would... (1 Reply)
Discussion started by: Nick1971
1 Replies
6. UNIX for Advanced & Expert Users
Hi all,
I have a simple script to check the CPU, Swap Memory and Hard Disk. But I can auto assign password in the script to automatic run it in crontab.
Everytime when I run this script, it require to insert password like the message below :
How can I solve this problem ? (2 Replies)
Discussion started by: cafecoc85
2 Replies
7. Shell Programming and Scripting
Hello,
I am using below command but this is asking for tty
c42dba {/home/oracle}: echo sersnp | su -c ggs
standard in must be a tty
Best regards,
Vishal (4 Replies)
Discussion started by: admin_db
4 Replies
8. Red Hat
Hi Guys
In red hat linux server is there a way to alert via email when the root password is about to expire ?
As per security policy in our environment root password will expire in 90 days.
Example : It would be better if we receive a email on 7th november stating that the root password... (1 Reply)
Discussion started by: newtoaixos
1 Replies
9. Shell Programming and Scripting
Hello,
I have list of around 400 devices. I need to restart a service /etc/init.d/psap23.sh in all of them, but it should restart by root only.
Those have some other kind of light Linux. There is no sudo package in that and we can't/shouldn't install. Direct root login is not allowed. I login... (5 Replies)
Discussion started by: solaris_1977
5 Replies
10. UNIX for Beginners Questions & Answers
Hello everyone,
I want to check how long a remote computer is running (e.g. with the command uptime or who - b)
The check should be done during login from none root user by a script which is called from .cshrc. My script works fine if I login as root but I want that everybody get the information... (5 Replies)
Discussion started by: Nadielosabra
5 Replies
LEARN ABOUT DEBIAN
doveadm-pw
DOVEADM-PW(1) Dovecot DOVEADM-PW(1)
NAME
doveadm-pw - Dovecot's password hash generator
SYNOPSIS
doveadm [-Dv] pw -l
doveadm [-Dv] pw [-p password] [-r rounds] [-s scheme] [-u user] [-V]
doveadm [-Dv] pw -t hash [-u user]
DESCRIPTION
doveadm pw is used to generate password hashes for different password schemes and optionally verify the generated hash.
All generated password hashes have a {scheme} prefix, for example {SHA512-CRYPT.HEX}. All passdbs have a default scheme for passwords
stored without the {scheme} prefix. The default scheme can be overridden by storing the password with the scheme prefix.
OPTIONS
Global doveadm(1) options:
-D Enables verbosity and debug messages.
-v Enables verbosity, including progress counter.
Command specific options:
-l List all supported password schemes and exit successfully.
There are up to three optional password schemes: BLF-CRYPT (Blowfish crypt), SHA256-CRYPT and SHA512-CRYPT. Their availability
depends on the system's currently used libc.
-p password
The plain text password for which the hash should be generated. If no password was given doveadm(1) will prompt interactively for
one.
-r rounds
The password schemes BLF-CRYPT, SHA256-CRYPT and SHA512-CRYPT supports a variable number of encryption rounds. The following table
shows the minimum/maximum number of encryption rounds per scheme. When the -r option was omitted the default number of encryption
rounds will be applied.
Scheme | Minimum | Maximum | Default
----------------------------------------------
BLF-CRYPT | 4 | 31 | 5
SHA256-CRYPT | 1000 | 999999999 | 5000
SHA512-CRYPT | 1000 | 999999999 | 5000
-s scheme
The password scheme which should be used to generate the hashed password. By default the CRAM-MD5 scheme will be used. It is also
possible to append an encoding suffix to the scheme. Supported encoding suffixes are: .b64, .base64 and .hex.
See also http://wiki2.dovecot.org/Authentication/PasswordSchemes for more details about password schemes.
-t hash
Test if the given password hash matches a given plain text password.
-u user
When the DIGEST-MD5 scheme is used, also the user name must be given, because the user name is a part of the generated hash. For
more information about Digest-MD5 please read also: http://wiki2.dovecot.org/Authentication/Mechanisms/DigestMD5
-V When this option is given, the hashed password will be internally verified. The result of the verification will be shown after the
hashed password, enclosed in parenthesis.
EXAMPLE
The first password hash is a DIGEST-MD5 hash for jane.roe@example.com. The second password hash is a CRAM-MD5 hash for john.doe@exam-
ple.com.
doveadm pw -s digest-md5 -u jane.roe@example.com
Enter new password:
Retype new password:
{DIGEST-MD5}9b9dcb4466233a9307bbc33708dffda0
doveadm pw
Enter new password:
Retype new password:
{CRAM-MD5}913331d8782236a8ecba7764a63aa27b26437fd40ca878d887f11d81245c2c6b
REPORTING BUGS
Report bugs, including doveconf -n output, to the Dovecot Mailing List <dovecot@dovecot.org>. Information about reporting bugs is avail-
able at: http://dovecot.org/bugreport.html
SEE ALSO
doveadm(1)
Dovecot v2.1 2012-02-13 DOVEADM-PW(1)