11-27-2015
It's working!
Thanks very much for both replies - I was certainly looking into the authenticate function as an alternative, but was having difficulty getting it to return anything useful, or anything at all really.
As it turns out, I forgot to give the program the proper low-level ownership/permissions, so it would always fail.
For those interested, the program needs to be owned by a root-level user/group and have 4755 permissions for it to be able to access the authentication level calls.
Again, thanks a bunch!
Chris
---------- Post updated at 03:28 PM ---------- Previous update was at 10:09 AM ----------
Another update on this for enquiring minds!
Previously, our crypt() call was in a shared object - and this used to work (still does with the old encryption method, (non-LPA) ). However, from what i've been able to tell, calls to crypt() using LPA currently require that the program have a proper authoritative owner and permissions, meaning if you create a stand-alone executable and give it the same permissions as listed above (and the proper salt), the crypt() function will work without issue.
This User Gave Thanks to evansch For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Greetings to all reading this,
I am a Linux/Unix newbie webmaster with a dedicated server, a RaQ 550. I am looking for some step by step documentation about managing a server with shell (not the GUI), from adding a virtual site to adding users, email accounts etc. I can find only parts of this... (0 Replies)
Discussion started by: rolandk
0 Replies
2. Red Hat
I setup the keys between 2 servers, but my user account has no password specified for it (never set one up on the account for security reasons). When I try to SSH to the server, SSH prompts for a password that doesn't exist (so I can never connect successfully).
Note: 'passwd -d Rynok' removes... (3 Replies)
Discussion started by: Rynok
3 Replies
3. Red Hat
i need to set up a user to execute a restricted command as another user and to be able to do so without entering a password. I understand the security concerns but let's not go there, unless you are really compelled to do so... The directive to permit is that I believe should work and did add to... (2 Replies)
Discussion started by: twk
2 Replies
4. Red Hat
Hi
I want to setup an extra account with name 'unixuser' who has the previlege to reset the passwords of other users like eng or myuser (other user).
Please help me.. Waiting for a reply..
Thanks,
MJavalkar (1 Reply)
Discussion started by: mjavalkar
1 Replies
5. Shell Programming and Scripting
hi,
i want to setup a password less FTP to a remote server so that i can ftp to a remote server without the password.
i have setup a passwordless ssh and i am able to use scp commands to connect to the remote server without asking for the password. but when i try to ftp to the same remote... (6 Replies)
Discussion started by: Little
6 Replies
6. Solaris
HI Community.
I was trying to create ssh password less authentication for one user called night and it's not working for me.
These are the steps I followed:-
I have logged into the server and issued ssh-ketgen -t rsabash-3.2$ ssh-keygen -t rsa
Generating public/private rsa key pair.... (4 Replies)
Discussion started by: bentech4u
4 Replies
7. UNIX for Advanced & Expert Users
How do I setup a Samba server to always ask to user and password, when a windows user, prints your files using a shared printer through a Samba Linux Server (CUPS)? (0 Replies)
Discussion started by: viga
0 Replies
8. AIX
Hi
I want to change password for around 100 users on an aix server.
I have the list of those 100 users with me.
instead of doing
# passwd username
for all the 100 users one by one, can you please help with a script through which we can change the password for all the 100 users in a... (2 Replies)
Discussion started by: newtoaixos
2 Replies
9. Red Hat
Hello Experts,
when I am trying to connect my target server through sftp after creating ssh password less setup, it is asking for passowrd to connect.
to setup this I followed below process:
-->generated keys by executing the command "ssh-keygen -t rsa"
-->this created my .ssh directory... (9 Replies)
Discussion started by: Devipriya Ch
9 Replies
10. UNIX for Beginners Questions & Answers
I am new to AIX but not new to unix.
I have an interview for an AIX systems admin position and I know they want someone who has knowledge of High Availability, Failover and LPARs
From my research so far, It appear powerha is used to setup high availability and failover on Power systems but is... (2 Replies)
Discussion started by: mathisecure
2 Replies
crypt(3C) crypt(3C)
NAME
crypt - generate hashing encryption
SYNOPSIS
Obsolescent Interfaces
DESCRIPTION
crypt():
is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things)
to frustrate use of hardware implementations of a key search.
key is a user's typed password. salt is a two-character string chosen from the set this string is used to perturb the hashing algorithm in
one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value points
to the encrypted password. The first two characters are the salt itself.
Obsolescent Interfaces
generate hashing encryption.
WARNINGS
The return value for points to data whose content is overwritten by each call.
and are obsolescent interfaces supported only for compatibility with existing DCE applications. New multithreaded applications should use
SEE ALSO
crypt(1), login(1), passwd(1), getpass(3C), passwd(4), thread_safety(5).
STANDARDS CONFORMANCE
crypt(3C)