Solved

VERY EASY -- Allowing weak passwords

Posted on 2003-11-24
7
339 Views
Last Modified: 2010-04-22
Hi,

I am running Redhat Advanced Server 2.1 --- How do I allow users to changed their passwords to whatever they want?  

Thanks!
0
Comment
Question by:LPTech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
7 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 50 total points
ID: 9814991
if u just build up a new system and adding users.
then before the system is available for authenticated users, the new passwd and shadow files are copied to files passwd.orig and shadow.orig. Remember to change the protection of the shadow and shadow.orig files to 0600.

user can change cheir password by themselves by default.
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9821325
check out this link for readhat security and all this is really a cool guide.
http://www.puschitz.com/Security.shtml
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9843464
Dear LPTech
is any of above worked, if not please let us know.
0
 
LVL 1

Expert Comment

by:MKrauss
ID: 9886964
simply edit /etc/login.defs for the pwd length and validy properties .....
MK
0
 
LVL 2

Expert Comment

by:chedlin
ID: 10151221
You can edit /etc/pam.d/system-auth and comment out the line running cracklib.so
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Denyhosts tool: Why I was locked out? 2 150
IRQD Load 34 179
McAfee ePO benefits and use cases needed 4 99
Backing Up Ipset 9 134
​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question