Users who have never changed their password from /etc/shadow.
Hello,
I have to do a script which returns users who have never changed their password from /etc/shadow.
Here is what have I done and I'm not sure if it's ok.
I tried to return just users who doesn;t have password set or are locked.
Can be there other kind of user who never changed the password?
Does anyone know how to remove a stanza in the shadow password file if the user account has already been removed on an AIX box? I know it can be done by editing the file itself but I would prefer not to do it that way.
cheers
gizaa (2 Replies)
Hi,
I want to append password into /etc/shadow file using a shell script.
My below script does add the users to both /etc/passwd and /etc/shadow but how can I add the hordcoded passwords to /etc/shadow file can some one help me ?
# To add the groups into /etc/group file
for a_user... (5 Replies)
How can I know users have changed their passwords ? I don't need their password (!) I have to know if they have changed their pass word and when ?
Thank you in advance for any SIMPLE answer. (6 Replies)
hi,
I had to reset a lost root password by editing the /etc/passwd and /etc/shadow files ( this is a xen vm file, so i mounted and chrooted the file )
after the reboot with an empty password on root , i have set a new password with passwd but
it only changed the /etc/passwd file.... (0 Replies)
We are currently using a script to copy the same encrypted password between our HP-UX and Solaris servers editing the trusted and shadow files directly. The encrypted password is only 13 characters long on both servers and decrypts the same way. Is there a way to copy this same string to Linux... (5 Replies)
Hello,
I want to know the reason behing the scene why some systems have hashed password in /etc/shadow file as "x" not the alienoid language like A1Dksxi3kaA.. (13 characters)
As far as I understand, etc/password will show password as "x" and move all hashed password to etc/shadow.... (8 Replies)
Hi
I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ?
What kind of encryption is used in /etc/shadow file ?
ths for help. (1 Reply)
Today i was going through some of security guides written on linux .
Under shadow file security following points were mentioned.
1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.
2)Usernames in shadow file must satisfy to all the same rules as... (14 Replies)
i have an application that uses the encrypted password that's in the /etc/shadow file.
i copied the line for the particular username i was interested it in from shadow file and i pasted it into the password file of the application. the application is nagios.
this application allowed that... (5 Replies)
Discussion started by: SkySmart
5 Replies
LEARN ABOUT OSF1
dxchpwd
dxchpwd(1X)dxchpwd(1X)NAME
dxchpwd - Create or change password program
SYNOPSIS
dxchpwd
dxchpwd -r | -l
dxchpwd [-r | -l] -q
dxchpwd [-r | -l] -u username
OPTIONS
If dxchpwd is invoked without any options, it is assumed that the current user's password is to be changed. The following options are also
accepted: Tells dxchpwd that the password change is to be done for a Local user. This can be combined with the -u and -q options. Tells
dxchpwd that the password change is to be done for a NIS user. This can only be done from a NIS master and can be combined with the -u and
-q options. Tells dxchpwd to query the user for the user name of the account whose password is to be changed. Tells dxchpwd to change
this user's password.
DESCRIPTION
The dxchpwd command lets you change your password. When you invoke the dxchpwd command, the program prompts you for the old password and
then for the new password. Next, the program asks you for the new password again, to verify that you have typed it correctly. Note that
the passwords are not displayed on the screen.
Your new password must meet the length requirements specified by the authorization database for the user whose password is being changed.
If your system is running with enhanced security, you may have to choose a password from a list of randomly generated passwords or you may
be prohibited from changing your password until its minimum lifetime has expired, as specified in the authorization database.
EXAMPLES
The following example requests that the password be changed for user smith: dxchpwd -u smith
FILES
Password file Protected Password Database dxchpwd executable
SEE ALSO X(1X), xdm(1X), passwd(1)dxchpwd(1X)