02-05-2015
Okay, I'll remember, 'cause apart of this, it is an endless journey. :-)
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello all
I'm new to this site and I have to say that ,it is just awesome. I was able to get most of my questions answered by reading the archives.
I've been a UNIX programmer for a while now but new to administration.
I just installed SunOS 5.9 on my desktop ( i86pc) . Everything... (3 Replies)
Discussion started by: luft
3 Replies
2. UNIX for Dummies Questions & Answers
Hi everyone,
I am a beginner in Linux and Shell scripting.I am migrating a couple of shell scripts from Solaris platform to Linux platform.In one script i saw a usage as :
/base/article/ocilib/lobfile $username/$password $filename $filepath
I didn't understand what this represents.The... (2 Replies)
Discussion started by: DILEEP410
2 Replies
3. UNIX for Advanced & Expert Users
Hello Experts,
I am facing a problem with ldap account, Some systems account running properly, but some systems it returns as "su: Unknown id: username". Please let me know how to start troubleshooting the same.
Thanks in Advance.
Reagrds,
Awadhesh (1 Reply)
Discussion started by: Awadhesh
1 Replies
4. Solaris
Hello,
I have a problem - I created a chrooted jail for one user. When I'm logged in as root, everything work fine, but when I'm logged in as a chrooted user - I have many problems:
1. When I execute the command ping, I get weird results:
bash-3.00$ usr/sbin/ping localhost ... (4 Replies)
Discussion started by: Przemek
4 Replies
5. HP-UX
Hi, I am facing an issue with HP-UX box.
-bash-4.0$ uname -a
HP-UX ctsintco B.11.31 U ia64 2795347624 unlimited-user license
When ever iam doing a su - root, it is showing the below error
-bash-4.0$ su - root
Password:
su: Unknown id: root
Can you pls. let me know how to over come... (2 Replies)
Discussion started by: ysrikanth
2 Replies
6. AIX
Hi Guys,
I found on one of the server there are 2 VG's which I dont have any Idea of who created .. as below
bash-3.00$ lsvg
old_rootvg
rootvg
datavg
altinst_rootvg
altinst_rootvg under is meant for alternate disk installation.. But I'm not sure for which version of OS it was... (5 Replies)
Discussion started by: kkeng808
5 Replies
7. UNIX for Dummies Questions & Answers
Is there an easy way to setup a cross-over cable (USB-USB) between a linux box and a windows PC? My 2 machines are next to each other but I really do not want to keep transfering my files using my USB drive.
Thanks! (4 Replies)
Discussion started by: Xterra
4 Replies
8. Solaris
Dear all I have formatted/labeled/partitioned my new disk but when trying to mount it is returning 'unknown fstype' .Can you please let me know how to solve this problem? Thank you (37 Replies)
Discussion started by: hadimotamedi
37 Replies
9. Shell Programming and Scripting
Hello,
I am running ubuntu 16.04 .
Below script gives: "unknown command '\;'
counter=105
while read COL1 COL2 COL3
do
let counter++
url="http://localhost/test/$COL1.$COL2.$COL3";
mysql -uroot -D mydatabase -pmypasswd -e "SELECT video_id FROM video_series_files WHERE id IN \
(SELECT... (12 Replies)
Discussion started by: baris35
12 Replies
LEARN ABOUT CENTOS
pam_pwhistory
PAM_PWHISTORY(8) Linux-PAM Manual PAM_PWHISTORY(8)
NAME
pam_pwhistory - PAM module to remember last passwords
SYNOPSIS
pam_pwhistory.so [debug] [use_authtok] [enforce_for_root] [remember=N] [retry=N] [authtok_type=STRING]
DESCRIPTION
This module saves the last passwords for each user in order to force password change history and keep the user from alternating between the
same password too frequently.
This module does not work together with kerberos. In general, it does not make much sense to use this module in conjunction with NIS or
LDAP, since the old passwords are stored on the local machine and are not available on another machine for password history checking.
OPTIONS
debug
Turns on debugging via syslog(3).
use_authtok
When password changing enforce the module to use the new password provided by a previously stacked password module (this is used in the
example of the stacking of the pam_cracklib module documented below).
enforce_for_root
If this option is set, the check is enforced for root, too.
remember=N
The last N passwords for each user are saved in /etc/security/opasswd. The default is 10. Value of 0 makes the module to keep the
existing contents of the opasswd file unchanged.
retry=N
Prompt user at most N times before returning with error. The default is 1.
authtok_type=STRING
See pam_get_authtok(3) for more details.
MODULE TYPES PROVIDED
Only the password module type is provided.
RETURN VALUES
PAM_AUTHTOK_ERR
No new password was entered, the user aborted password change or new password couldn't be set.
PAM_IGNORE
Password history was disabled.
PAM_MAXTRIES
Password was rejected too often.
PAM_USER_UNKNOWN
User is not known to system.
EXAMPLES
An example password section would be:
#%PAM-1.0
password required pam_pwhistory.so
password required pam_unix.so use_authtok
In combination with pam_cracklib:
#%PAM-1.0
password required pam_cracklib.so retry=3
password required pam_pwhistory.so use_authtok
password required pam_unix.so use_authtok
FILES
/etc/security/opasswd
File with password history
SEE ALSO
pam.conf(5), pam.d(5), pam(8)pam_get_authtok(3)
AUTHOR
pam_pwhistory was written by Thorsten Kukuk <kukuk@thkukuk.de>
Linux-PAM Manual 09/19/2013 PAM_PWHISTORY(8)