Solved

Solaris 9 - reuse of last four passwords

Posted on 2011-03-25
2
789 Views
Last Modified: 2013-12-28
Hi All,

I want to configure my solaris systems to not to reuse the last four passwords for the acccounts for th e audit complaince, in what way I can do it. Also, I seems that I need to use PAM to get it done, had anybody done this in their setup.  This are solaris 9 sparc systems.

Thanks
virgo
0
Comment
Question by:virgo0880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 250 total points
ID: 35217440
Hi again,

I'm not a true Solaris expert, but I think these are the basic steps:

- First, for Solaris 9 and lower you need the third-party PAM module "pam_history", which should be in the COMSpamph package (?), or you can get it from here:
http://www.comsmiths.com.au/pam/v1.06/

- Next, make an entry in /etc/pam.conf:
other   password requisite      pam_history.so.1 history=4 func=$1$

- To allow for a history greater 5 create a password history database (e.g. for 16 entries):
/usr/local/sbin/mkhistory -c -h 16

More info is here:

http://brandonhutchinson.com/wiki/index.php5?title=Solaris_Password_Policy

Hope this helps. I have no Solaris box here, so I can't test for myself.

wmp

0
 
LVL 38

Expert Comment

by:yuzh
ID: 35237484
You need to enable/use PAM for checking of passwords, password history.

Please read:
http://www.softpanorama.org/Solaris/Security/solaris_pam.shtml

BTW, why not upgrade to Solaris 10, you can set the password hostory in /etc/default/passwd file

otherwise have a look at the following page: (I never use this one myself!)
http://www.badpenguin.co.uk/main/content/view/25/35/
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Trojan 28 116
Import CSV with All modify groups 17 86
Patch KB4012598 (wannacry) won't install on 2k8 3 124
sample of wannacry 3 173
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question