9 More Discussions You Might Find Interesting
1. AIX
Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies
2. UNIX for Advanced & Expert Users
I've been using various versions of UNIX and Linux since 1993, and I've never run across one that showed your password as you type it in when you log in, or one that stored passwords in plain text rather than encrypted. I'm writing a script for work for a security audit, and two of the... (5 Replies)
Discussion started by: Anne Neville
5 Replies
3. Solaris
hi
Actually the normal user as the permission of executing the passwd command due to suid program... eg consider the two users (normal user) as tom & jerry! when tom executes command as " passwd tom" no issue here...
In the same way when the same user tom uses the command as "passwd jerry" ... (1 Reply)
Discussion started by: sriniv666
1 Replies
4. Solaris
hi, has anyone here tried to recycle old passwords by copying something out of the passwd file and paste them back into the same passwd file ?
can it work this way ?
some of our applications passwords are expiring but they cannot be change due to application concerns, so therefore we must... (7 Replies)
Discussion started by: Exposure
7 Replies
5. Cybersecurity
Hi,
By reporting the process status with ps, any Unix user will see the command line arguments
#ps -ef
UID PID PPID C STIME TTY TIME CMD
lsc 13837 13825 0 May 11 pts/17 0:01 -ksh
oracle 4698 6294 0 12:00:40 ? 0:00 sqlplus -s system/manager
appluser 4229 4062 0 12:00:03... (2 Replies)
Discussion started by: bhagirathi
2 Replies
6. Linux
hai friends i have deleted passwd command using rm command i thought it will come again at the time of rebooting but it is completely deleted how to get it worked again (5 Replies)
Discussion started by: venkata.ganesh
5 Replies
7. Shell Programming and Scripting
Sorry for the duplicate thread this one is similar to the one in
https://www.unix.com/shell-programming-scripting/88132-awk-sed-script-read-values-parameter-files.html#post302255121
Since there were no responses on the parent thread since it got resolved partially i thought to open the new... (4 Replies)
Discussion started by: rajan_san
4 Replies
8. Shell Programming and Scripting
I am working with the Oracle 10.2.0.3 job scheduler on Solaris 10, and unfortunately, the scheduler executes scripts in such a way that several default shell environment variables are not defined. For example, $HOME, $USER, and $LOGNAME are missing.
How can I parse the appropriate record in... (7 Replies)
Discussion started by: shew01
7 Replies
9. UNIX for Dummies Questions & Answers
Hello All,
I am working on Sco unix version 5.0.5.
The passwd command has somehow got corrupted and is only displaying the contents of the /etc/passwd file instead of changing the password.
I wanted to know if there is any other command through which you can change the password of a user from... (5 Replies)
Discussion started by: rahulrathod
5 Replies
PWHASH(1) BSD General Commands Manual PWHASH(1)
NAME
pwhash -- hashes passwords from the command line or standard input
SYNOPSIS
pwhash [-km] [-b rounds] [-S rounds] [-s salt] [-p | string]
DESCRIPTION
pwhash prints the encrypted form of string to the standard output. This is mostly useful for encrypting passwords from within scripts.
The options are as follows:
-b rounds
Encrypt the string using Blowfish hashing with the specified rounds.
-k Run in makekey(8) compatible mode. A single combined key (eight chars) and salt (two chars) with no intermediate space are read from
standard input and the DES encrypted result is written to standard output without a terminating newline.
-m Encrypt the string using MD5.
-p Prompt for a single string with echo turned off.
-S rounds
Encrypt the salt with HMAC-SHA1 using the password as key and the specified rounds as a hint for the number of iterations.
-s salt
Encrypt the string using DES, with the specified salt.
If no string is specified, pwhash reads one string per line from standard input, encrypting each one with the chosen algorithm from above.
In the event that no specific algorithm is given as a command line option, the algorithm specified in the default class in /etc/passwd.conf
will be used.
For MD5 and Blowfish a new random salt is automatically generated for each password.
Specifying the string on the command line should be discouraged; using the standard input is more secure.
FILES
/etc/passwd.conf
SEE ALSO
crypt(3), passwd.conf(5)
BSD
October 16, 2009 BSD