General :: Using Fedora 11 Password, Shadow, Gshadow, Group Files In Fedora 12?
Apr 28, 2010
I recently mashed the passwd, shadow, gshadow, group files in my Fedora 12 installation. I was dumb and didn't take a copy of the originals and all I have is the originals from a Fedora 11 installation.
View 2 Replies
ADVERTISEMENT
Aug 6, 2010
I'm running RHEL 5. When using the GUI System>Administration>Users and Groups, I get the error: The user database cannot be read. This problem is most likely caused by a mismatch between /etc/passwd and /etc/shadow or /etc/group and /etc/gshadow. The program will exit now.
Some research showed that I need to use vipw and vigr respectively to find an inconsistency between these two sets, which I did - to make it easy I copied each from [vipw | vigr] to an excel file and did =exact(%1, %2). There are no inconsistencies.
[Code]...
View 1 Replies
View Related
Jul 3, 2009
I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)
View 3 Replies
View Related
Aug 3, 2011
1- how I can deactivate selinux and the root password on fedora 15?
2- I can't use copy, cut past in the GUI !!
3- even with (su -) I can't modify files like shadow or config !
View 10 Replies
View Related
Oct 1, 2010
Today i was going through some of security guides written on linux .Under shadow file security following points were mentioned.1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.2)Usernames in shadow file must satisfy to all the same rules as usernames in /etc/passwd.3)password for application Username should display * if username is not locked.4)If a user is locked it should be displayed as ! as the first character in second field of shadow file.
Confusion for point 1 and 2:Now i m confused as why the encrypted password should be more than 14-25 characters.Also what rules to satisfy How to check it?Confusion for point 3 and 4:There are lot of users with * as second field i guess they are not locked but according to 4th point there are lot of users with ! as first characters.How would i check whether they are actually locked or not.I m posting the output of /etc/shadow and /etc/passwd files for the account.
View 11 Replies
View Related
Apr 15, 2010
I need to manually convert an string ( like with echo ) to a DES crypt format to be inserted inside a /etc/shadow file, does anybody knows how can I do that?
Maybe there are some little tool that could handle that operation, well.. I don't know, hope someone can give me a hint on that.
View 3 Replies
View Related
Jan 14, 2010
I would like to grep all values other than encrypted password from /etc/shadow fileFor example,each line consists of 8 fields separated with :/The only thing that I want not to print out is the contents between first : and second : (encrypted password)
View 7 Replies
View Related
Oct 19, 2009
i want secondary users can able to change the files permissions of primary group?user MAC is having www as a primary and httpd as secondary group. But he want to change the file permissions (chmod) httpd group files. Is it possible or not? I think its not possible. If it`s possible then let me know how?
View 3 Replies
View Related
Jul 4, 2010
The normal user is now in the sudoers group. How can i allow it to install programs using it's own password rather than having to know the super-secret Root-Users password?
View 5 Replies
View Related
Nov 11, 2010
How do i chance the owner and group from multiple files at ones.
How to change the rights for all at ones i know!
View 1 Replies
View Related
Nov 11, 2010
How do i chance the owner and group from multiple files at ones.How to change the rights for all at ones i know!.
View 1 Replies
View Related
May 19, 2011
I am bulding my own image based on 2.6.32 kernel, I wish to add a guest user:
In a script thats invoked by the makefile, I use 'useradd' command & this updates the shadow, passwd files under /etc on the host, is it possible to tell the command to create the shadow / password under some other folder on the host? may be /tmp?
View 2 Replies
View Related
Jan 9, 2010
how set the group password? what is the use of the group password?
View 2 Replies
View Related
Jun 16, 2009
I am moving my Linux server from Suse 10 to Ubuntu 9.04 and I moved the significant parts of /etc/shadow, /etc/passwd, and /etc/group over to Ubuntu 9.04. I am not able to login into the computer with the old accounts. The only problem I see is that the old accounts use Blowfish and DES to encrypt the passwords in /etc/shadow, and Ubuntu uses SHA512. If I change the passwords, the accounts will work. However; I have about 300 accounts to move, and I don't want to do that to all of them. I have tired Ubuntu Forums and talked to every linux expert I know, and no one has an answer.
View 7 Replies
View Related
Apr 26, 2011
The /etc/shadow file contains an id of $1$, $2$, $5$ or $6$ to show the encryption method used.A salt follows this,followed by the password hash.When a user is created and a password is set, a hash is RANDOMLY generated and used as the salt to the password hash. Everytime that user logs in, login checks /etc/shadow for the $id$ and salt and runs the password given by the user through the hash mechanism ($id$) using the salt in /etc/shadow.So basically does login look at /etc/shadow for the $id$ and salt to create a hash with which to compare to the /etc/shadow hash?question 2 - If my $id$ was $5$, which is sha256, how would i go about changing this? Like is there a shadow.conf or crypt.conf or something? Can i change it per user?
View 2 Replies
View Related
Apr 7, 2011
There's some sort of shadow on my right desktop. No idea how it got there and it persists through reboots.
View 2 Replies
View Related
Jun 7, 2010
I noticed that our /etc/shadow file is readable on a patch I released for one of our in house linux boxes a while back ago. Could they use it to gain access the root account etc? Our passwords are all MD5 encrypted.
View 5 Replies
View Related
Mar 11, 2011
I am working on building a customized ISO image of a server based on linux. The thing is after the server is installed and run for the first time, three users have to be created for the various services to run properly. I want this to be automated. To achieve this what is was thinking is automatically enter the user entries in the /etc/passwd and /etc/shadow files through init scripts when the server starts for the first time after the installation. I tried creating user and assigning password in one of my machine, and the /etc/passwd and the /etc/shadow entries of this user I copied it into the other machine and tried login in on the other machine and everything worked fine. How I am trying to achieve this.
View 1 Replies
View Related
Jan 24, 2011
I want to know, how does changes happened in the encrypted password in /etc/shadow file , when user changing password . because user doesnot have access on that file
View 1 Replies
View Related
Sep 24, 2009
I am trying to write a remote access module. Is there any function in linux where I can give string (password entered by user) and compare it with the actual user password stored in /etc/shadow. Since the password is stored encrypted in /etc/shadow I cannot parse and compare. So I want some method to compare if my user entered the correct password..Is there any function for that..
View 6 Replies
View Related
Jan 31, 2011
I upgraded to F14 from F13, and when the process was complete, I noticed on my desktop, I have a strange drop shadow on the left-hand corner. As if it's shadowing an invisible window. You cannot interact with it, it's not "really" there.It is very annoying, and I can not figure out what it is, or what is causing it. I've checked all my plasma widgets and things like that, but it still persists.
Anyone run into this before or have any ideas?Here is a screenshot showing the shadow, I intentionally set my background to white, so you could see it best. But it shows up on top of any wallpaper. and you can clearly see it underneath translucent term windows/etc.
View 4 Replies
View Related
May 17, 2011
I need to create a script that returns a list of the users who have never changed their password from /etc/shadow. As I know on linux there is a command "chage" used for find last password change.
View 2 Replies
View Related
Jan 3, 2009
Has anybody been able to get NX (Nomachine) running on Fedora 10 configured using a shadow session of the local desktop (X11-local). I am experiencing some kind or cookie creation error, perhaps privilege related?
FYI. Normal unix-kde sessions work fine (e.g. Giant on Box) and shadow sessions of an existing unix-kde session works fine too. A shadow session of the local display is a bust.
Here's the error log:
Code:
NX> 203 NXSSH running with pid: 4076
NX> 285 Enabling check on switch command
NX> 285 Enabling skip of SSH config files
NX> 285 Setting the preferred NX options
[Code]....
View 14 Replies
View Related
Jan 8, 2010
I'm learning to configure tftp-server and using vi editor - google search not helpful at least what comes up first - maybe different in Fedora ?
[url]
Code:
But . . . vi editing etc/shadow I get . . . E45: 'readonly' option is set (add ! to override)
In INSERT MODE - do I add ! as !wq instead of :wq as I found in google search (that's NOT working) - - or - do I add ! on the line to set tftp server password to * -or - what?
View 6 Replies
View Related
Jan 20, 2010
This is weird, today I updated my system and while trying to visudo from single user mode got
"cannot read /etc/shadow: Permission denied"
which kept me from doing anything until I switched to file permissions of 400 on shadow, then back. Is this being experienced by anyone else or just me? /etc/security/limits.conf doesn't seem like it wants to change in enforcing mode either and I can't find any alerts to provide clues on the situation.
View 8 Replies
View Related
Mar 6, 2010
I'm trying to setup ssh access on my Fedora 12 laptop. I get the following error message in /var/log/secure when I try to login from another machine using ssh and the login is denied:
Code:
sshd[3025]: error: Could not get shadow information for <user>
sshd[3025]: Failed password for <user> from <ip> port <port> ssh2
If I do a 'setenforce 0' I can login and no error is logged.
View 10 Replies
View Related
Jul 20, 2010
How can I group files and create archives accordingly? I have 10,000 files in a folder (no sub-folders) and I want to create 10 zip or tar.gz archives. This means every archive has 1,000 files. How can I do this in Linux?
View 1 Replies
View Related
Mar 8, 2010
i have a directory ( /dir1) that belongs to a user1:group1. I need to know if this is possible and if so a basic idea of how to. when i copy a file into /dir1 (as root) i would like it to obtain a different user and group. Is this possible?
View 1 Replies
View Related
May 2, 2010
I have huge text files with two fields, the first is a string the second is an integer. The files are sorted by the first field. What I'd like to get in the output is one line per unique string and the sum of the numbers for the identical strings. Some strings appear only once while other appear multiple times. Given the sample data below, for the string glehnia I'd like to get 10+22=32 in the result. how to do this either with gnuwin32 command line tools or in linux shell?
[Code]...
View 2 Replies
View Related
Jun 23, 2010
I've been trying to get the -perm option of find to give me all PHP files that are group writable. Should this work?
find -name "*.php" -perm g-w
View 1 Replies
View Related