Sponsored Content
Full Discussion: Passphrase Complexity
Top Forums UNIX for Advanced & Expert Users Passphrase Complexity Post 302497062 by jim mcnamara on Wednesday 16th of February 2011 08:41:29 AM
Old 02-16-2011
I assume you mean ssh-keygen -N newpassphrase or the passphrase that is asked for during keygen.. There is nothing in the docset on this. The reason is that the passphrase is optional. You can hit return twice (NULL passphrase) to off the passphrase completely.
 

3 More Discussions You Might Find Interesting

1. Solaris

password complexity check

Hi, I am looking for a simple way to : - force the user to change his password following the first connexion - check the complexity of a password (password should has a least 8 characters with 1 special char and 1 alpha...). Thinks for your help (1 Reply)
Discussion started by: dbsora
1 Replies

2. Cybersecurity

Computational complexity

This is a general question about the practical use of computational complexity in security. Wikipedia has a good article about the theoretical background of computational complexity. In the course of conversation with colleagues, a topic that is brought up occassionally is the security of any... (2 Replies)
Discussion started by: gratuitous_arp
2 Replies

3. SuSE

Setting password complexity

Hi, I am setting password complexity in SLES 11. I am able to do most of things pam-config -d --pwcheck pam-config -a --cracklib pam-config -a --cracklib-minlen=8 pam-config -a --cracklib-dcredit=-1 pam-config -a --cracklib-ocredit=-1 pam-config -a --pwhistory pam-config -a... (1 Reply)
Discussion started by: solaris_1977
1 Replies
pktool(1)							   User Commands							 pktool(1)

NAME
pktool - manage softtoken object storage SYNOPSIS
pktool setpin DESCRIPTION
The pktool command allows users to manage the softtoken object store. The setpin subcommand changes the passphrase used to authenticate a user to the softtoken object store. setpin prompts the user for the old passphrase, if any. If the old passphrase matches, pktool prompts for the new passphrase twice. If the two entries of the new passphrase match, it will become the current passphrase for the token. Passphrases may be any string of characters with lengths between 1 and 256 with no nulls. EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. FILES
${HOME}/.sunw/pkcs11_softtoken The user's default token object store. ${SOFTTOKEN_DIR}/pkcs11_softtoken The alternate token object store. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
attributes(5), pkcs11_softtoken(5) RSA PKCS#11 v2.11 http://www.rsasecurity.com/rsalabs/pkcs/pkcs-11 SunOS 5.10 1 Mar 2004 pktool(1)
All times are GMT -4. The time now is 11:26 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy