10 More Discussions You Might Find Interesting
1. UNIX for Beginners Questions & Answers
Hello Team,
Please help me to solve my Problem,
By mistake, I give full permission to /(root) directory. by using the following command "chmod -R 777 /"
after this, the client asks for the password to login via ssh. Before that, I an able to Login without a password.
Please help me to retrieve... (5 Replies)
Discussion started by: Shubham1182
5 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I have followed the below commands for key generation and ssh from one server to another with user mqm
cd /var/mqm/.ssh
mqm@A:~> ssh-keygen -t rsa
<public key creation>
mqm@A:~> ssh mqm@B mkdir -p .ssh
mqm@B's password: <entered_password>
mqm@A:~> cat /var/mqm/.ssh/id_rsa.pub | ssh... (4 Replies)
Discussion started by: Anusha M
4 Replies
3. SuSE
Hi,
I am setting password complexity in SLES 11. I am able to do most of things
pam-config -d --pwcheck
pam-config -a --cracklib
pam-config -a --cracklib-minlen=8
pam-config -a --cracklib-dcredit=-1
pam-config -a --cracklib-ocredit=-1
pam-config -a --pwhistory
pam-config -a... (1 Reply)
Discussion started by: solaris_1977
1 Replies
4. Shell Programming and Scripting
Sorry to post this thread as it has been asked several times. But my question is that I need to write a shell script to transfer a file from machine A to machine B using sftp. I generated pvt-pub key pair and put pub key in machine b and lso make the pub file's permision 600. .ssh directory... (1 Reply)
Discussion started by: vsachan
1 Replies
5. Shell Programming and Scripting
Hello Friends,
I know this issue has been raised many times and hence I tried every resolution provided in the forum before I posted this issue again.
My Password-less RSA authentication was working fine for quite some time. Whenever the remote server password used to change I used to re-do... (5 Replies)
Discussion started by: mehimadri
5 Replies
6. Solaris
Boot device : /pci@1f,4000/scsi@3/disk@0,0:a File and args: -s cdrom
SunOS Release 5.9 Version Generic_118558-11 64-bit (6 Replies)
Discussion started by: agummad
6 Replies
7. Solaris
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Discussion started by: tferrazz
8 Replies
8. Shell Programming and Scripting
Hi
I have a script which uses expect and I run it on solaris 10 to set a common password for all users. I run it as `./script password` but when I tried to log into the system then I do not really have to type password, pressing ENTER on keyboard logs the user into system. (ssh)
This below... (2 Replies)
Discussion started by: upengan78
2 Replies
9. Solaris
Hi,
I am looking for a simple way to :
- force the user to change his password following the first connexion
- check the complexity of a password (password should has a least 8 characters with 1 special char and 1 alpha...).
Thinks for your help (1 Reply)
Discussion started by: dbsora
1 Replies
10. Forum Support Area for Unregistered Users & Account Problems
Well, I get this email -
Hello,
You have requested to reset your password on The UNIX Forums forums because you have forgotten your password. If you did not request this, please ignore it. It will expire and become useless in 24 hours time.
To reset your password, please visit the... (1 Reply)
Discussion started by: zyx
1 Replies
PASSWD(1) User Commands PASSWD(1)
NAME
passwd - change user password
SYNOPSIS
passwd [options] [LOGIN]
DESCRIPTION
The passwd command changes passwords for user accounts. A normal user may only change the password for his/her own account, while the
superuser may change the password for any account. passwd also changes the account or associated password validity period.
Password Changes
The user is first prompted for his/her old password, if one is present. This password is then encrypted and compared against the stored
password. The user has only one chance to enter the correct password. The superuser is permitted to bypass this step so that forgotten
passwords may be changed.
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this
time. If not, passwd refuses to change the password and exits.
The user is then prompted twice for a replacement password. The second entry is compared against the first and both are required to match
in order for the password to be changed.
Then, the password is tested for complexity. As a general guideline, passwords should consist of 6 to 8 characters including one or more
characters from each of the following sets:
o lower case alphabetics
o digits 0 thru 9
o punctuation marks
Care must be taken not to include the system default erase or kill characters. passwd will reject any password which is not suitably
complex.
Hints for user passwords
The security of a password depends upon the strength of the encryption algorithm and the size of the key space. The legacy UNIX System
encryption method is based on the NBS DES algorithm. More recent methods are now recommended (see ENCRYPT_METHOD). The size of the key
space depends upon the randomness of the password which is selected.
Compromises in password security normally result from careless password selection or handling. For this reason, you should not select a
password which appears in a dictionary or which must be written down. The password should also not be a proper name, your license number,
birth date, or street address. Any of these may be used as guesses to violate system security.
You can find advice on how to choose a strong password on http://en.wikipedia.org/wiki/Password_strength
OPTIONS
The options which apply to the passwd command are:
-a, --all
This option can be used only with -S and causes show status for all users.
-d, --delete
Delete a user's password (make it empty). This is a quick way to disable a password for an account. It will set the named account
passwordless.
-e, --expire
Immediately expire an account's password. This in effect can force a user to change his/her password at the user's next login.
-h, --help
Display help message and exit.
-i, --inactive INACTIVE
This option is used to disable an account after the password has been expired for a number of days. After a user account has had an
expired password for INACTIVE days, the user may no longer sign on to the account.
-k, --keep-tokens
Indicate password change should be performed only for expired authentication tokens (passwords). The user wishes to keep their
non-expired tokens as before.
-l, --lock
Lock the password of the named account. This option disables a password by changing it to a value which matches no possible encrypted
value (it adds a '!' at the beginning of the password).
Note that this does not disable the account. The user may still be able to login using another authentication token (e.g. an SSH key).
To disable the account, administrators should use usermod --expiredate 1 (this set the account's expire date to Jan 2, 1970).
Users with a locked password are not allowed to change their password.
-n, --mindays MIN_DAYS
Set the minimum number of days between password changes to MIN_DAYS. A value of zero for this field indicates that the user may change
his/her password at any time.
-q, --quiet
Quiet mode.
-r, --repository REPOSITORY
change password in REPOSITORY repository
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-S, --status
Display account status information. The status information consists of 7 fields. The first field is the user's login name. The second
field indicates if the user account has a locked password (L), has no password (NP), or has a usable password (P). The third field
gives the date of the last password change. The next four fields are the minimum age, maximum age, warning period, and inactivity
period for the password. These ages are expressed in days.
-u, --unlock
Unlock the password of the named account. This option re-enables a password by changing the password back to its previous value (to the
value before using the -l option).
-w, --warndays WARN_DAYS
Set the number of days of warning before a password change is required. The WARN_DAYS option is the number of days prior to the
password expiring that a user will be warned that his/her password is about to expire.
-x, --maxdays MAX_DAYS
Set the maximum number of days a password remains valid. After MAX_DAYS, the password is required to be changed.
CAVEATS
Password complexity checking may vary from site to site. The user is urged to select a password as complex as he or she feels comfortable
with.
Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server.
passwd uses PAM to authenticate users and to change their passwords.
FILES
/etc/passwd
User account information.
/etc/shadow
Secure user account information.
/etc/pam.d/passwd
PAM configuration for passwd.
EXIT VALUES
The passwd command exits with the following values:
0
success
1
permission denied
2
invalid combination of options
3
unexpected failure, nothing done
4
unexpected failure, passwd file missing
5
passwd file busy, try again
6
invalid argument to option
SEE ALSO
chpasswd(8), passwd(5), shadow(5), usermod(8).
shadow-utils 4.5 01/25/2018 PASSWD(1)