Solved

VERY EASY -- Allowing weak passwords

Posted on 2003-11-24
7
331 Views
Last Modified: 2010-04-22
Hi,

I am running Redhat Advanced Server 2.1 --- How do I allow users to changed their passwords to whatever they want?  

Thanks!
0
Comment
Question by:LPTech
  • 3
7 Comments
 
LVL 24

Accepted Solution

by:
shivsa earned 50 total points
ID: 9814991
if u just build up a new system and adding users.
then before the system is available for authenticated users, the new passwd and shadow files are copied to files passwd.orig and shadow.orig. Remember to change the protection of the shadow and shadow.orig files to 0600.

user can change cheir password by themselves by default.
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9821325
check out this link for readhat security and all this is really a cool guide.
http://www.puschitz.com/Security.shtml
0
 
LVL 24

Expert Comment

by:shivsa
ID: 9843464
Dear LPTech
is any of above worked, if not please let us know.
0
 
LVL 1

Expert Comment

by:MKrauss
ID: 9886964
simply edit /etc/login.defs for the pwd length and validy properties .....
MK
0
 
LVL 2

Expert Comment

by:chedlin
ID: 10151221
You can edit /etc/pam.d/system-auth and comment out the line running cracklib.so
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux : how to see memory usage by various processes in segregated output  format 15 142
Layer 7 Transparent cookie checker 22 61
CentOS 6.7 User Audit 3 96
Backing Up Ipset 9 112
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now