Sponsored Content
Full Discussion: New user
Top Forums UNIX for Dummies Questions & Answers New user Post 5870 by PxT on Friday 24th of August 2001 06:38:09 PM
Old 08-24-2001
Just choose a password that is not based on a dictionary word. This is easiest to do by including some punctuation in your password. Another good method is to take the first letter of each word in a sentence.

Example: Ufa$tB

Sentence I used: Unix Forums are Simply the Best.

I mixed it up a little more by using $ instead of S. You get the idea. Choosing a good password is one of the most important parts of your security infrastructure. Please choose your own sentence/password, don't just copy mine. Smilie
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Other than root user .Normal user is unable to create files

Hi all, I am using Sun Solaris 9 .In this system normal users unable to create files from the command line.I added these users in bin,adm and even root group i found them unable to create a file. (1 Reply)
Discussion started by: mallesh
1 Replies

2. Shell Programming and Scripting

How do i change to super user then revert back to ordinary user ,using shell script?

Hi all, I am trying to eject the cdrom from a livecd after certain stage... Now assuming that it is possible to eject,please consider my issue!!! The OS boots into a regular user by default...so i am unable to use the eject command to push out the drive... However if i try pfexec eject it... (3 Replies)
Discussion started by: wrapster
3 Replies

3. UNIX for Dummies Questions & Answers

Difference between : Locked User Account & Disabled User Accounts in Linux ?

Thanks AVKlinux (3 Replies)
Discussion started by: avklinux
3 Replies

4. Shell Programming and Scripting

root user command in shell script execute as normal user

Hi All I have written one shell script for GPRS route add is given below named GPRSRouteSet.sh URL="www.google.com" VBURL="10.5.2.211" echo "Setting route for $URL for GPRS" URL_Address=`nslookup $URL|grep Address:|grep -v "#"|awk -F " " '{print $2}'|head -1` echo "Executing ... (3 Replies)
Discussion started by: mnmonu
3 Replies

5. UNIX for Advanced & Expert Users

Determining if user is local-user in /etc/passwd or LDAP user

Besides doing some shell-script which loops through /etc/passwd, I was wondering if there was some command that would tell me, like an enhanced version of getent. The Operating system is Solaris 10 (recent-ish revision) using Sun DS for LDAP. (5 Replies)
Discussion started by: ckmehta
5 Replies

6. Shell Programming and Scripting

Update LDIF User info based on Test User Certs ID's

Hi I need help.......... I have an Sun One Directory server LDIF file with 5000 user entries, I need to change the data to match Test ID's, so I can run a perf test. I'm way out of my league as I have not done any scripting for 10 years. There are four entries for each user in the file... (3 Replies)
Discussion started by: Macdaddy99
3 Replies

7. Shell Programming and Scripting

Script interacts with user , based on user input it operates

i have a script which takes input from user, if user gives either Y/y then it should continue, else it should quit by displaying user cancelled. #!/bin/sh echo " Enter your choice to continue y/Y OR n/N to quit " read A if then echo " user requested to continue " ##some commands... (7 Replies)
Discussion started by: only4satish
7 Replies

8. UNIX for Dummies Questions & Answers

Switching from root to normal user takes me to user's home dir

Whenever i switch from root to another user, by doing su - user, it takes me to home directory of user. This is very annoying as i want to be in same dir to run different commands as root sometimes and sometimes as normal user. How to fix this? (1 Reply)
Discussion started by: syncmaster
1 Replies

9. UNIX for Advanced & Expert Users

Pam.d and make difference between AD User and local user on Linux

Hello, i configured rhel linux 6 with AD directory to authorize windows users to connect on the system and it works. i have accounts with high privileges (oracle for example) if an account is created on the AD server i would to block him. I looked for how to do, for the moment all the... (3 Replies)
Discussion started by: vincenzo
3 Replies
acceptable_password(3)					     Library Functions Manual					    acceptable_password(3)

NAME
acceptable_password - Determines if a password meets deduction requirements (Enhanced Security) LIBRARY
Security Library - libsecurity.so SYNOPSIS
int acceptable_password( char *word, FILE *stream); PARAMETERS
Points to the suggested password. Points to the stream to write diagnostics into. DESCRIPTION
The acceptable_password() function determines if the given password is difficult to deduce from well known, password-guessing heuristics. The cleartext (plaintext) password is passed as the first argument, and the file pointer of the stream that is used to report failure rea- sons is the second argument. If this checking is to be silent, the second argument should be a null file pointer. When the acceptable_password() function returns a value of 1, the password provided meets all the tests listed in the following text. When it returns a value of 0 (zero), the password failed to meet at least one of the tests. The selectivity criteria for the password include but cannot be limited to the following four tests: This test passes if the word is not a palindrome. (A palindrome is a word that is spelled the same backwards as it is forwards.) Examples of palindromes that fail this test are mom, dad, noon, redivider, radar. Palindromes do not make good passwords because they reduce an n character password to n/2 + 1 char- acters. A penetrator knowing that palindromes were legal could use heuristics that could deduce the password much more quickly than if they were excluded. This test passes if the password is not a derivative of a login name for the system. Many insecure systems allow passwords to be the login name itself. This is a fact known by many penetrators. All login names are excluded because a user that is the owner of several pseudouser accounts can elect to use the login name of one account as the password for all accounts. Similar to the login name issue, this test passes if the password is not a group name derivative. This test passes if the spell program determines that the password is not an English word. A penetrator then could not search the online dictionary to find the password. The spell program also has some built-in rules that go beyond the actual online dictionary in determining what is a proper word, and this routine takes advantage of that. NOTES
Programs that use this routine must be compiled with -lsecurity. FILES
System password file. System group file. RELATED INFORMATION
Functions: getpwent(3), getgrent(3). Commands: spell(1). delim off acceptable_password(3)
All times are GMT -4. The time now is 02:19 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy