Visit Our UNIX and Linux User Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #771
Difficulty: Medium
Arcade system boards have been using specialized graphics chips since the 1970s.
True or False?
Linux & Unix Commands - Search Man Pages

unix_chkpwd(8) [bsd man page]

UNIX_CHKPWD(8)							 Linux-PAM Manual						    UNIX_CHKPWD(8)

NAME
unix_chkpwd - Helper binary that verifies the password of the current user SYNOPSIS
unix_chkpwd [...] DESCRIPTION
unix_chkpwd is a helper program for the pam_unix module that verifies the password of the current user. It also checks password and account expiration dates in shadow. It is not intended to be run directly from the command line and logs a security violation if done so. It is typically installed setuid root or setgid shadow. The interface of the helper - command line options, and input/output data format are internal to the pam_unix module and it should not be called directly from applications. SEE ALSO
pam_unix(8) AUTHOR
Written by Andrew Morgan and other various people. Linux-PAM Manual 09/19/2013 UNIX_CHKPWD(8)

Check Out this Related Man Page

UNIX2_CHKPWD(8) 						 Linux-PAM Manual						   UNIX2_CHKPWD(8)

NAME
unix2_chkpwd - helper binary that verifies the password of the current user SYNOPSIS
/sbin/unix2_chkpwd servicename username DESCRIPTION
unix2_chkpwd is a helper program for applications that verifies the password of the current user. It is not intended to be run directly from the command line and logs a security violation if done so. It is typically installed setuid root or setgid shadow and called by applications, which only wishes to do an user authentification and nothing more. OPTIONS
unix2_pwdchk requires the following arguments: pam_service The name of the service using unix2_chkpwd. This is required to be one of the services in /etc/pam.d username The name of the user whose password you want to verify. INPUTS
unix2_pwdchk expects the password via stdin. RETURN CODES
unix2_chkpwd has the following return codes: 1 unix2_chkpwd was inappropriately called from the command line or the password is incorrect. 0 The password is correct. HISTORY
Written by Olaf Kirch loosely based on unix_chkpwd by Andrew Morgan SEE ALSO
pam(8) AUTHOR
Emily Ratliff. Linux-PAM 0.76 2003-03-21 UNIX2_CHKPWD(8)

4 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Need help with script.

Hi: I am using linux and trying to format logs. I have grepped for stuff like invalid users and /or error. However, the way the logs are formatted, sometimes the full error is not on the line, ie. it is on the next line. If I grep something, like: cat /var/spool/mail/* |grep -i session |awk... (8 Replies)
Discussion started by: taekwondo
8 Replies

2. UNIX for Dummies Questions & Answers

Removing setuid option for security.

According to Security standards given in https://www.stanford.edu/dept/as/ia/security/policies_standards/AS_standards/RH_linux_prod_sec_std_1.0.1.html Being a production system i want to implement the same on our server. but when i tried finding other files i got following output. # ls... (5 Replies)
Discussion started by: pinga123
5 Replies

3. Red Hat

Transfer file spermission error

hi I like files chage chsh mount pam_timestampcheck ping pt_chown su su_exec unix_chkpwd chfn gpasswd newgrp passwd ping6 sshkeysign sudo umount usernetctl Instead, I wrong copy I've cut The system is rebooted Rooh is read-only access ??????????????????????????!!!!!! (1 Reply)
Discussion started by: mnnn
1 Replies

4. Shell Programming and Scripting

Strange permission issue on Linux server.

Starting sendmail throws this error: I decided to see the permission on the files under /etc/mail and this is the output: # ls -ltr total 284 -rwxr-xr-x. 1 root root 1847 Jan 27 2014 virtusertable -rwxr-xr-x. 1 root root 127 Jan 27 2014 trusted-users -rwxr-xr-x. 1 root root 92... (3 Replies)
Discussion started by: mohtashims
3 Replies

Featured Tech Videos