11-22-2004
By doing what you mentioned then it still defeats the purpose of ensuring that the user is authentic.? I can put any ID and test if that ID created the file.
typically, only the user should know their own password which would allow me to verify authenticity.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I am new to unix. I have a flat file that needs to be pgp encyrpted in ASCII format and ftped in Ascii format to remote location.
Can any one tell me the steps involved in the pgp encryption of the unix file. I will really appreciate if any one can help me with the pgp encryption shell... (1 Reply)
Discussion started by: rkumar28
1 Replies
2. Shell Programming and Scripting
All,
I want to encrypt a database system administration password into a file or environment variable. Then, I want to decrypt the password from the file or environment variable so nobody sees the clear text password.
For example, I have the database password of developement.
I need to... (1 Reply)
Discussion started by: bubba112557
1 Replies
3. UNIX for Advanced & Expert Users
I have an ascii file that I want to encrypt and save. I have seen this done before, but cannot remember how, nor can I find anything in any of my manuals or online help.
Any ideas how to do this?
Thanks,
Henry (6 Replies)
Discussion started by: hwollman53
6 Replies
4. Solaris
Hiiiiii..... every one.....
I have written a script, and i want to make that script confidential.So that, only i can see that script.
I am using " crypt " command in solaris 9, to encrypt that script.But when i am executing this... (6 Replies)
Discussion started by: prashantshukla
6 Replies
5. Shell Programming and Scripting
Hi,
Could you pls. help me in encryting a database password on Solaris 10 Box.
eg : username : test
password : t est123
The request is to encrypt the test123 so that no one can understand the what the password is ?
thanks (7 Replies)
Discussion started by: krackjack
7 Replies
6. Shell Programming and Scripting
Iam using the teradata...
and running the scripts in unix,
I wan to encrypt the teradata password in Unix...
my hostname is : bprod
usename: KRN777
passwrd: passwrd
can ant one tell me the exact command to encrypth the passwrd....
thanks, (5 Replies)
Discussion started by: nani1984
5 Replies
7. Shell Programming and Scripting
Hello All,
I need to accept a password from the user and validate it, without having to hard-code it anywhere. Any ideas? (3 Replies)
Discussion started by: optimus_1
3 Replies
8. Programming
I know that simply encrypting and decrypting passwords in a script is as bad as storing them in plain text, but I've been searching for an answer to this for a few days now, and haven't found an answer that fits the problem I'm having.
Here's the scenario. I'll give more details than I think may... (3 Replies)
Discussion started by: mdrisser
3 Replies
9. Solaris
Hello experts,
I am an PLM application admin, use AIX/SOlaris servers where application is installed
to schedule a cron in my system this what i do
Login to AIX/Unix system using an OS account,
Schedule a service to execute the required script - The script will have a PLM utility and... (4 Replies)
Discussion started by: kraghum
4 Replies
10. High Performance Computing
Hi,
i've got a qusetion regarding interconnect of compute nodes.
In our company we are running a Simulation Cluster which is administrated by the Simulation department. Now our central IT requires to encrypt the interconnect of the compute nodes.
Does anybody in that business encrypt... (3 Replies)
Discussion started by: fiberkill
3 Replies
LEARN ABOUT DEBIAN
unix2_chkpwd
UNIX2_CHKPWD(8) Linux-PAM Manual UNIX2_CHKPWD(8)
NAME
unix2_chkpwd - helper binary that verifies the password of the current user
SYNOPSIS
/sbin/unix2_chkpwd servicename username
DESCRIPTION
unix2_chkpwd is a helper program for applications that verifies the password of the current user. It is not intended to be run directly
from the command line and logs a security violation if done so.
It is typically installed setuid root or setgid shadow and called by applications, which only wishes to do an user authentication and noth-
ing more.
OPTIONS
unix2_pwdchk requires the following arguments:
pam_service
The name of the service using unix2_chkpwd. This is required to be one of the services in /etc/pam.d
username
The name of the user whose password you want to verify.
INPUTS
unix2_pwdchk expects the password via stdin.
RETURN CODES
unix2_chkpwd has the following return codes:
1 unix2_chkpwd was inappropriately called from the command line or the password is incorrect.
0 The password is correct.
HISTORY
Written by Olaf Kirch loosely based on unix_chkpwd by Andrew Morgan
SEE ALSO
pam(8)
AUTHOR
Emily Ratliff.
Linux-PAM 0.76 2003-03-21 UNIX2_CHKPWD(8)