Dont forget that for security reasons it is wise to only have root connection allowed from the console, and that is done by creating a single line file containing:
Hi all,
As all of us know that in /etc/passwd file the first field correspond to username
could any one tell me what is bin , damoen etc in the first field, and r they in
user field , what is nologin in the last column ?
root:x:0:0:root:/root:/bin/bash ... (4 Replies)
i am using apache2.0, and i used this command to create username/passwd:
./htpasswd -b passwd.file username password
is it away to translate password back to plaintext ?
for example, passwd.file contains:
username:HnennjvqsGaQs
i want to translate back to:
username:password (1 Reply)
Hi friends, i need a favour from u all i made a small change in home pc it is INTEL i had change /etc/passwd i just change the shell for the root instead of sh i kept bash and i had taken back up of the file /etc/passwd. now the problem is i am not able to log in as a root i got a error NO Shell... (10 Replies)
Hi Gurus,
I have one requirment..
I have written a script and it asks a registry passwd while performing some clearcase command. Now we are giving it manually. It's for one time run. We want to perform this for multiple times on multiple files throguh for loop.. means we need to pass the same... (3 Replies)
Hi Folks,
I have Solaris 10, latest release.
We have passwd aging set in /etc/defalut/passwd.
I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging.
When I reset the users passwd using passwd command, it re enables... (3 Replies)
Hello All,
Can anyone post the default /etc/passwd file for AIX?
I would like to compare with an existing machine of mine and want to identify what are the default users that are created when the O/S is installed.
In other words I would like to see the system users in AIX. Not the ones created... (1 Reply)
Not an unix expert, I read a few pages on the web about passwd files, but I didn't find the answers I need about the last 8 lines of the passwd file I'm taking a look at.
I'm assuming their shortcuts to another file that may have the actual usernames of users on the system.
Please, any help... (1 Reply)
Hello,
I'm trying to recover my /etc/passwd file, but I can't make it work. Im doing the following:
1. Booting from cd-rom:
2. Mounting hard disk drive
3. Copying my passwd and shadow files to /a/etc/
4. Unmounting Hard disk:
5. Rebooting
6. Stopping my OS from booting ( by pressing... (11 Replies)
Discussion started by: alvaradogunner
11 Replies
LEARN ABOUT ULTRIX
passwd
passwd(5) File Formats Manual passwd(5)Name
passwd - password file
Description
The file is an ASCII file that contains the following information for each user:
Login name
Password field
User ID
Group ID
User's real name, office, extension, home phone
Initial working directory
Program to use as Shell
Each line in the file represents a user entry. Each field within a user entry is separated from the next by a colon. Each user entry is
separated from the next by a new line. If the password field is null, no password is demanded; if the Shell field is null, then is used.
This file resides in directory Because the password, if present, is encrypted, the file has general read permission and can be used, for
example, to map user IDs to names.
The ``user's real name'' can contain an ampersand (&), meaning insert the login name. This information is set by the command and used by
the command.
Appropriate precautions must be taken to lock the file against changes if it is to be edited with a text editor. The command does the nec-
essary locking.
If the system is running UPGRADE security level and an asterisk appears in the password field, or if the system is running ENHANCED level,
then the content of the password field is ignored and the password for the account is located in the authentication database. See and the
Security Guide for Administrators for more information.
The files and if they exist, contain the hashed version of the file. If present, they are used by the and functions to retrieve entries
rapidly. See for more information.
The database can be distributed in a network by a naming service, such as Yellow Pages or BIND/Hesiod. See the Guide to the Yellow Pages
Service or the Guide to the BIND/Hesiod Service for setup information.
Restrictions
The ``name'' can contain only lowercase ASCII characters a to z and the numbers 0 to 9.
FilesSee Alsochfn(1), finger(1), login(1), passwd(1), crypt(3), getpwent(3), auth(5), group(5), adduser(8), mkpasswd(8), vipw(8)
Guide to the BIND/Hesiod Service
Guide to the Yellow Pages Service
Security Guide for Administrators
passwd(5)