Hello guys ,and girls.
Im having a very interesting problem.
I have a Netra SUN machine
and i had it here for quite a while now...i wanted to install it as a new server and todo so i needed to mount a cd rom and to change the boot at the prom level to cdrom.
this could work but i forgot the... (5 Replies)
:(
I have a system that uses Samba to manage user's accounts. The problem is that the Samba's root password has been changed, and the people who setup the system have left the company. So what do I need to do to reset it or blank it out in order to supply Samba with a new password?
mike (2 Replies)
Hi all,
This is first time I met unix in my life. I purchased old Scanning Elecron Microscope which came with 486/33MHz PC running Unix System V, ver. 3.6. The one simple user name/passw is known so I can boot and login. But can not shutdown! It asks root or su passw. I'm very sensitive not to... (6 Replies)
Hi,
My root password for mysql has some problem as it dosent allow me to login....
all commands to reset it failed. so I removed mysql
yum remove mysql
and installed it by
yum install mysql mysql-devel mysql-server
and it installed fine
I gave chkconfig --levels 235 mysqld on... (1 Reply)
How to change the ldap root password.
I have generated the password by using "slappasswd " command, but In my root machine "/etc/ldap/sldap.d" file is not there. instead of the file sldap.d directory only is there. please help me...? (0 Replies)
I need some help with Fedora. I am trying to reset the root password. When I tried to login I was not able to. I kept getting the authentication failure message. I got the password reset success message.
passwd: all authentication tokens updated successfully.
I then thought maybe the root... (6 Replies)
Hello, I have two old Solaris machines
$ uname -a
SunOS unknown 5.8 Generic_117350-39 sun4u sparc SUNW,UltraAX-e2
unfortunately, it has been so long ago that i have used these that the root password has left my head...
i can log into one of the machine as a normal user, but am unable to... (4 Replies)
Hi All,
I just found one thread on this forum on this subject here:
Forgot MYSQL password root | Unix Linux Forums | Web Development
but unfortunately the issue was not resolved.
I have the same problem with the same error message.
The background is that I built a Solaris 11 x86 server... (11 Replies)
Hello,
We have Windows 10 machine connected to Sparc T5440 server via serial cable.
We access the server from the Windows 10 machine using putty via serial connection. This allows us to access ILOM and Unix.
We have recently noticed that whenever we reboot the windows machine (Windows 10),... (11 Replies)
Hi ,
I ve a question about the Linux system root password change.
Which can be done using grub menu without inputting the old password.:confused:
So If anybody can change the root password without any password and then how it is secure. Anybody can manipulate the other user using the... (6 Replies)
Discussion started by: pradyumnajpn10
6 Replies
LEARN ABOUT DEBIAN
pam_pwcheck
pam_pwcheck(8) Reference Manual pam_pwcheck(8)NAME
pam_pwcheck - PAM module for password strength checking
DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the
change itself. It only provides functionality for one PAM management group: password changing.
This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack
likes the password, the module does an additional set of strength checks. These checks are:
Palindrome
Is the new password a palindrome of the old one?
Case Change Only
Is the new password the old one with only a change of case?
Similar
Is the new password too similar to old one?
Simple Is the new password too short?
Rotated
Is the new password a rotated version of the old password?
Already used
Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd.
OPTIONS
The following options may be passed to the module:
cracklib=<path to dictionaries>
Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is
/usr/lib/cracklib_dict.
debug A lot of debug information is printed with syslog(3).
maxlen=number
Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0.
minlen=number
The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero
suppresses this check. The default is 5.
no_obscure_checks
No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage
is recommended.
not_set_pass
If this option is given, pam_pwcheck will not make the new password available for other modules.
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the
user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process.
tries=number
Maximum number of attempts to change a password if the new ones are rejected because they are too easy.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask
the user for the new password.
use_first_pass
By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked
for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is
available.
remember=XX
Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number
between 1 and 400.
enforce_for_root
If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what
you are doing, since it could be as result that root is no longer allowed to login at all.
FILES
/etc/security/opasswd
SEE ALSO passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)pam_pwcheck September 2008 pam_pwcheck(8)