Sponsored Content
Operating Systems Solaris Pipe Actual Password to passwd Post 302974573 by fraenker on Wednesday 1st of June 2016 02:27:07 AM
Old 06-01-2016
Pipe Actual Password to passwd

Hello,

I have a problem. As ldap admin, i have a account with a stored password in passwd (means local). This password must be changed every 30 days.
Now i want execute "passwd" without prompt for the actual password.
I will only typie in the new password.
On Ubuntu i solve this with the following command:
Code:
echo "<oldPWD>" | passwd -r files <USERNAME>--stdin

but the "--stdin" doesn't worked on solaris bash.

how can i solve this?

1. It's not a problem that old PW ist after executing stored in history. Because after execution the password is old and not usable

2. i have no root access.

3. i can't install a additionally Package (but i can use a local script)

4. yes, I'm lazy but this are 35 Servers and it's annoying to type this password 35 times.

thanks in advanced
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

pipe password to passwd

Is there a way that I can pipe text to passwd... This is what I am trying to accomplish e.g. passwd < cat password.txt (4 Replies)
Discussion started by: SmartJuniorUnix
4 Replies

2. AIX

new password not available on nis client for up to 10 minutes after yppush passwd

Hi, We are currently in the process to move the user authentication for our AIX clients to a Windows 2003 server to authenticate them against the active directory entries. What we have so far: - NIS master server on Windows 2003 Server with the unix-subsystem installed -> This is managing... (1 Reply)
Discussion started by: candyflip2000
1 Replies

3. UNIX for Dummies Questions & Answers

How to : Identify the the password is encrypted or not in /etc/shadow or /etc/passwd?

Thanks AVKlinux (11 Replies)
Discussion started by: avklinux
11 Replies

4. Solaris

passwd cmd reenables passwd aging in shadow entry

Hi Folks, I have Solaris 10, latest release. We have passwd aging set in /etc/defalut/passwd. I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging. When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies

5. HP-UX

Port/migrate Password passwd HP-UX to HP-UX

Hi, I know this has been covered many times on this forum from one os to a new os. Has Port/migrate Password passwd HP-UX to HP-UX been covered? B.11.11 U 9000/800 --to-- B.11.11 U 9000/785? TIA. I'm kinda new to HP side of UNIX. I need to sink up my test and live passwords for a big... (1 Reply)
Discussion started by: KmJohnson
1 Replies

6. AIX

When did AIX start using /etc/security/passwd instead of /etc/passwd to store encrypted passwords?

Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies

7. Shell Programming and Scripting

How to ignore Pipe in Pipe delimited file?

Hi guys, I need to know how i can ignore Pipe '|' if Pipe is coming as a column in Pipe delimited file for eg: file 1: xx|yy|"xyz|zzz"|zzz|12... using below awk command awk 'BEGIN {FS=OFS="|" } print $3 i would get xyz But i want as : xyz|zzz to consider as whole column... (13 Replies)
Discussion started by: rohit_shinez
13 Replies

8. HP-UX

Sudo entry required to set permission similar to ROOT without using password (PASSWD) change optio

Hi All I had installed sudo in HP UX 11.3 and it is working fine but not able to make entry required to set permission similar to ROOT without using password (PASSWD) change option for define user in /etc/sudoers file Please help if some know the syntex? :confused::wall: (2 Replies)
Discussion started by: deviltech
2 Replies

9. SuSE

SUSE "passwd username" ask for password 4 times

Below is the error I'm getting. # passwd username Changing password for username. New Password: Reenter New Password: Password changed. New UNIX password: Retype new UNIX password: Password has been already used. Choose another. passwd: Authentication token manipulation error# cat... (0 Replies)
Discussion started by: toor13
0 Replies

10. Shell Programming and Scripting

Using value from pipe as password

how can this be modified to work: echo 1 2 45 4 5 | openssl aes-128-cbc -a -salt -k $(awk '{print $3}') any ideas? if the above were to work as I envision it, the password that would decrypt the encrypted text would be: echo "the encrypted text" | openssl aes-128-cbc -a -salt -k 45 (0 Replies)
Discussion started by: SkySmart
0 Replies
SHADOW(5)							File Formats Manual							 SHADOW(5)

NAME
shadow - encrypted password file DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is Login name Encrypted password Days since Jan 1, 1970 that password was last changed Days before password may be changed Days after which password must be changed Days before password is to expire that user is warned Days after password expires that account is disabled Days since Jan 1, 1970 that account is disabled A reserved field The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, . and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES) algorithm. For example if it starts with "$1$" it means the MD5-based algorithm was used. Refer to crypt(3) for details on how this string is interpreted. The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user. An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass- word expires. An account will also be disabled on the specified day regardless of other password expiration information. This information supercedes any password or password age information present in /etc/passwd. This file must not be readable by regular users if password security is to be maintained. FILES
/etc/passwd - user account information /etc/shadow - encrypted user passwords SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8) AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com) SHADOW(5)
All times are GMT -4. The time now is 09:03 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy