Solved

Solaris 9 - reuse of last four passwords

Posted on 2011-03-25
2
791 Views
Last Modified: 2013-12-28
Hi All,

I want to configure my solaris systems to not to reuse the last four passwords for the acccounts for th e audit complaince, in what way I can do it. Also, I seems that I need to use PAM to get it done, had anybody done this in their setup.  This are solaris 9 sparc systems.

Thanks
virgo
0
Comment
Question by:virgo0880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 250 total points
ID: 35217440
Hi again,

I'm not a true Solaris expert, but I think these are the basic steps:

- First, for Solaris 9 and lower you need the third-party PAM module "pam_history", which should be in the COMSpamph package (?), or you can get it from here:
http://www.comsmiths.com.au/pam/v1.06/

- Next, make an entry in /etc/pam.conf:
other   password requisite      pam_history.so.1 history=4 func=$1$

- To allow for a history greater 5 create a password history database (e.g. for 16 entries):
/usr/local/sbin/mkhistory -c -h 16

More info is here:

http://brandonhutchinson.com/wiki/index.php5?title=Solaris_Password_Policy

Hope this helps. I have no Solaris box here, so I can't test for myself.

wmp

0
 
LVL 38

Expert Comment

by:yuzh
ID: 35237484
You need to enable/use PAM for checking of passwords, password history.

Please read:
http://www.softpanorama.org/Solaris/Security/solaris_pam.shtml

BTW, why not upgrade to Solaris 10, you can set the password hostory in /etc/default/passwd file

otherwise have a look at the following page: (I never use this one myself!)
http://www.badpenguin.co.uk/main/content/view/25/35/
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question