Sponsored Content
Full Discussion: Password Construction
Special Forums Cybersecurity Password Construction Post 97492 by tumbikikani on Tuesday 31st of January 2006 04:39:50 AM
Old 01-31-2006
Password Construction

Could someone please help, I am new to unix and I am trying to do the following:

o Each password must have at least eight characters.
Only the first eight characters are significant.
PASSLENGTH is found in /etc/default/passwd and is set
to 6.

o Each password must contain at least two alphabetic
characters and at least one numeric or special char-
acter. In this case, "alphabetic" refers to all
upper or lower case letters.

o Each password must differ from the user's login name
and any reverse or circular shift of that login name.
For comparison purposes, an upper case letter and its
corresponding lower case letter are equivalent.

o New passwords must differ from the old by at least
three characters. For comparison purposes, an upper
case letter and its corresponding lower case letter
are equivalent.


How do I go about this, I am able to add the users, and manouver my way around. Smilie
 

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Matrix construction

Hi experts How to construct a rectangular matrix for a text file with 6012 rows and 2221 columns. Thank You (1 Reply)
Discussion started by: riyabio
1 Replies

2. Shell Programming and Scripting

Matrix construction

Hi I have to construct a rectangular matrix with 6012 rows and 2221 columns. Here the rows and columns were given by alphanumeric ids in a file named row.txt and column.txt respectively. with this row nd column ids I have to construct a matrix ie 6012*2221 and compare the column ids with... (0 Replies)
Discussion started by: riyabio
0 Replies

3. Shell Programming and Scripting

Help with regex construction

I am trying to construct a regular expression that will filter a log file containing the following table: aP mP mC,mI oP oC oF oI tP tI hP ... (8 Replies)
Discussion started by: euval
8 Replies

4. Shell Programming and Scripting

case construction for basic Arithmetics calculation

the scrip (q4.sh) should perform the following calcuation (+, -, / and *) it should be used like this: q4.sh number1 operation number2 I wrote it already but the "*" does not work. #!/bin/bash #Date: 2010.10.19 # un script qui utilisera une instruction case pour effectuer des opérations... (6 Replies)
Discussion started by: flash80
6 Replies

5. Web Development

Website construction nowaday!

Hello, Actually I am not sure how to ask this question, which is about the technique advance on website construction/design. Compared with HTML/CSS, which ones are the most popular for website construction? My colleague recommends Drupal for Linux platform. Any other? Thanks! Yifang (4 Replies)
Discussion started by: yifangt
4 Replies

6. Shell Programming and Scripting

Grep command construction

Hi, I have an array variable "arr" that reads string from a file "vari.txt". Thus, the array will be of variable length depending how many entries are present in "vari.txt" I use a for loop to traverse through the array. However, i need a grep command to grep for a file "output.txt" and... (3 Replies)
Discussion started by: mohtashims
3 Replies
userdb(4)						     Kernel Interfaces Manual							 userdb(4)

NAME
userdb - user database for per-user information SYNOPSIS
DESCRIPTION
The user database is used for storing per-user information. It consists of the directory and the files within it. Each file name is a two-digit hexadecimal number from to The directory and files are created either at installation time or by the command. The per-user information resides in user entries in the database, and consists of any number of pairs, which are used to define the behav- ior of configurable features. A per-user value in overrides any corresponding system-wide default configured in the file, as described in security(4). The file indicates which attributes can be configured with a per-user value in This list includes the following attributes which are described in security(4): Allow or do not allow null passwords. Audit or do not audit users. Maximum number of authentication failures allowed. Display or do not display last login information. Restrict login time periods. Minimum password length. Number of simultaneous logins allowed per user. Password history depth. Minimum number of lower case characters allowed in a password. Minimum number of upper case characters allowed in a password. Minimum number of digit characters allowed in a password. Minimum number of special characters allowed in a password. Define umask for file creation. Notes When defining attributes, first configure default values in as described in security(4), and then configure per-user exceptions in the user database, In addition to the configurable attributes, there are internal attributes that are not user configurable and are normally modified only by programs that enforce system security. The file indicates which attributes are configurable and which are internal. Use the command to verify or fix information in the user database, To disable the user database, create a file called This causes all database reads and writes to return an error code indicating that the database is disabled and should be ignored. Note that, if the user database is disabled for a long period and then re-enabled, it will contain stale data. This can cause unwanted side effects. WARNINGS
Use the command to modify information in Do not use a text editor, because the database contains checksums and other binary data, and edi- tors do not follow the file locking conventions that are used to control access to the database. NFS mounting this database is not supported. FILES
user database security defaults configuration file security attributes description file SEE ALSO
userdbck(1M), userdbget(1M), userdbset(1M), userdb_read(3), security(4). userdb(4)
All times are GMT -4. The time now is 01:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy