Networking :: Getent Shadow Works But Getent Passwd Does Not?

Apr 4, 2011

I have been working on Kerberos and Ldap Authentication on SUSE 11.3.

I was successful with Kerberos authentication and had no issue. then i moved to configure LDAP as i want to configure this authentication method for APACHE server.

Now after configuring ldap and pam, I am able to check the command 'getent shadow' with no issue and this command lists all the users of that OU too. but when i try getent passwd or getent group , it results nothing but local users.

View 1 Replies


ADVERTISEMENT

CentOS 5 Server :: Ldap - Ldapsearch And Getent Works From Client But Cannot Login

Jan 26, 2009

So I've configured ldap on Centos5 64 bit and I can run "ldap search" and "gentent passwd" on the client/server and it shows my users info.

But I can't login via the cli or GUI.

I can login by doing;

su - username

at the client or server but I can't login by issuing;

login username

or at the GUI login screen.

View 2 Replies View Related

Security :: User Appear In /etc/shadow And Not /etc/passwd

Jul 28, 2010

In what cases would a user appear in /etc/shadow and not /etc/passwd

View 2 Replies View Related

General :: Deleted Root From Passwd And Shadow File

Oct 7, 2010

I deleted root from passwd and shadow file.Can I crate a new root user?

View 1 Replies View Related

Programming :: Replace A Hash In A Shadow File Not Using Passwd?

Aug 5, 2010

What is the easiest way to replace a hash in a shadow file for one particular user, not using passwd, and when the current password is unknown?

View 3 Replies View Related

General :: Useradd Command To Create Passwd / Shadow & Other Files Under Different Directory

May 19, 2011

I am bulding my own image based on 2.6.32 kernel, I wish to add a guest user:

In a script thats invoked by the makefile, I use 'useradd' command & this updates the shadow, passwd files under /etc on the host, is it possible to tell the command to create the shadow / password under some other folder on the host? may be /tmp?

View 2 Replies View Related

Software :: Check A String With Actual User Passwd (ie Password In /etc/shadow)?

Sep 24, 2009

I am trying to write a remote access module. Is there any function in linux where I can give string (password entered by user) and compare it with the actual user password stored in /etc/shadow. Since the password is stored encrypted in /etc/shadow I cannot parse and compare. So I want some method to compare if my user entered the correct password..Is there any function for that..

View 6 Replies View Related

CentOS 5 Server :: FreeRadius Simple Shadow / Passwd UNIX System Authentication

Nov 7, 2010

Its 2 weeks i'm trying to configure freeradius2 on centos5 64bit after installed it from yum.all seems working, but i cant authenticate unix users.after digging in many sites its simply cant find user name and password ( ++[unix] returns notfound )Also how can i paste here all the radiusd -X log lines? i can't find any
radius.log file.

View 10 Replies View Related

General :: Delete /etc/passwd And Recover It With /etc/passwd - From Runlevel 1 The Lastly Created User Is Not Having His Account After Recovery?

Jan 14, 2011

we know that /etc/passwd - is a replica of /etc/passwd file and acts as a backup in any damage done to /etc/passwd file..i have observed a strange thing in RHEL 5.4....for example... if /etc/passwd has 100 accounts.. then /etc/passwd - is having only 99 accounts....when i add 101 useraccount with "useradd" then /etc/passwd has 101 accounts and /etc/passwd is having the 100th account of /etc/passwd - ..when i delete /etc/passwd and recover it with /etc/passwd - from runlevel 1 the lastly created user is not having his account after recovery.. what is the solution? this is same case even with /etc/shadow and /etc/shadow -

View 2 Replies View Related

Fedora Networking :: NX On 10 - Shadow Session On Local Display?

Jan 3, 2009

Has anybody been able to get NX (Nomachine) running on Fedora 10 configured using a shadow session of the local desktop (X11-local). I am experiencing some kind or cookie creation error, perhaps privilege related?

FYI. Normal unix-kde sessions work fine (e.g. Giant on Box) and shadow sessions of an existing unix-kde session works fine too. A shadow session of the local display is a bust.

Here's the error log:

Code:
NX> 203 NXSSH running with pid: 4076
NX> 285 Enabling check on switch command
NX> 285 Enabling skip of SSH config files
NX> 285 Setting the preferred NX options

[Code]....

View 14 Replies View Related

General :: Symlinking /etc/passwd Etc For Networking?

Jun 25, 2011

I'm running a small network of 20 PC's (slackware), I had previously used NIS and can't really be bothered with ldap it's a bit of hassle. I do not need a centralised database just a login auth system.On the server I make a folder called /sec and symlink passwd, group and shadow into it.I export this via nfs.On the workstation I create a folder /sec, move the passwd, group and shadow file into it and then symlink them back into the /etc folder.On bootup, the rc.local mounts server /sec over the top of workstation /sec. If it fails it falls back.I wasn't sure if I could just mount /sec on the workstation and then temporarily symlink group,passwd,shadow over the top of the /etc/shadow etc

View 4 Replies View Related

Fedora Networking :: Unable To Start Wifi - WPA Passwd Always Requested

Jul 14, 2011

I'm fighting to make wifi work on an HP dv6-3194.

The symptom is that I'm always asked to enter the WPA passwd.

1-This is a fresh FC15 install:

Linux localhost.localdomain 2.6.38.6-26.rc1.fc15.i686.PAE #1 SMP Mon May 9 20:36:50 UTC 2011 i686 i686 i386 GNU/Linux

2- Network interfaces are detected:

3- pci card is RT3090

4- lsusb returns:

5- lsmod returns:

6- iwlist wlan0 scanning detects wifi networks without problems.

7- relevant dmesg entries:

8- wpa_supplicant.log

I've tried many suggestions from this forum about RT3090 or RT2800, but none worked :-(none seemed to be close to my problem:

Most of them relates to interface not seen, wifi networks not detected, system freeze.

View 6 Replies View Related

Ubuntu Networking :: Wired Networking - Connection Works But No Internet

Jun 1, 2011

I just installed Ubuntu 11.04 desktop on my desktop in dual boot with Windows 7.

Heres my problem, I am unable to connect to the Internet even though my wired Ethernet connection says it is connected normally. The wierd thing about this is that I also have a wireless card in my desktop and when I connect through that I am able to connect to the Internet. I am connecting to a router that is functioning as a repeater to my main router/cable modem. I have tried to solve this myself but am having no luck. Ironically, earlier today suddenly my ethernet connection worked for a few minutes without me modifying anything.

The output of some terminal commands are below.

Quote:

Quote:

Quote:

However a pint to that ip address (my router) is successful.

Quote:

Hosts.allow and hosts.deny are both fine (not blank but no entries)

View 1 Replies View Related

Fedora :: Shadow On My Desktop

Apr 7, 2011

There's some sort of shadow on my right desktop. No idea how it got there and it persists through reboots.

View 2 Replies View Related

Ubuntu :: Shadow Under Top Bar Turn Black?

Apr 30, 2011

The shadow that is meant to appear under the bar at the top of the screen in unity seem to be overlaying on top of itself every time and eventually turned black

View 3 Replies View Related

Ubuntu :: Black Shadow Below Task Bar

Jul 26, 2011

getting a black shadow below the taskbar recently in ubuntu 11.04. anybody got an idea how to fix it?

View 5 Replies View Related

Software :: Password Encryption In /etc/shadow?

Jun 16, 2009

I am moving my Linux server from Suse 10 to Ubuntu 9.04 and I moved the significant parts of /etc/shadow, /etc/passwd, and /etc/group over to Ubuntu 9.04. I am not able to login into the computer with the old accounts. The only problem I see is that the old accounts use Blowfish and DES to encrypt the passwords in /etc/shadow, and Ubuntu uses SHA512. If I change the passwords, the accounts will work. However; I have about 300 accounts to move, and I don't want to do that to all of them. I have tired Ubuntu Forums and talked to every linux expert I know, and no one has an answer.

View 7 Replies View Related

Ubuntu Networking :: How Networking Works In Lucid

Aug 6, 2010

I am a little confused with the way that networking works in Ubuntu (Lucid in particular). I switch my PC on and my network magically works (ie I dont understand what is configuring everything). I do have a DHCP server, but im not sure which process/file is configuring the interface.There is no entry for my wired interface (eth0) in /etc/network/interfaces.$ cat /etc/network/interfacesauto loface lo inet loopbackDoes this means that Network Manager is then responsible for configuring this interface? How does Network Manager configure this interface (are there config files somewhere that specify settings such as static IP and duplex)?

View 9 Replies View Related

Fedora :: Upgrade Left Shadow On KDE Desktop

Jan 31, 2011

I upgraded to F14 from F13, and when the process was complete, I noticed on my desktop, I have a strange drop shadow on the left-hand corner. As if it's shadowing an invisible window. You cannot interact with it, it's not "really" there.It is very annoying, and I can not figure out what it is, or what is causing it. I've checked all my plasma widgets and things like that, but it still persists.

Anyone run into this before or have any ideas?Here is a screenshot showing the shadow, I intentionally set my background to white, so you could see it best. But it shows up on top of any wallpaper. and you can clearly see it underneath translucent term windows/etc.

View 4 Replies View Related

Ubuntu :: How To Enable Shadow For Tooltip Window

Nov 2, 2010

I get used to have shadow for tooltip window in my desktop environment. But from Ubuntu 10.04, the defaut setting disables shadow for tooltip. And I don't feel good about such minor change.So how to enable shadow for tooltip window again? (ubuntu 10.04 + gnome 2.30)

View 1 Replies View Related

Ubuntu :: How To Delete WIndows Shadow Copies VSS

Feb 19, 2011

I deleted Windows from my Notebook and am only rockin Ubuntu on this machine. On the (previously) shared Data Partition, there are dozens of GBs occupied by the Volume Shadow Copy Service backups (which I used with Windows) but now how do I get rid of these?In Windows you could either turn off VSS/Restore under System Protection or alternatively use the Disk Cleanup Utility. How do I do this with Ubuntu?

View 6 Replies View Related

Ubuntu :: Equivalent To Windows Shadow Copy?

Mar 29, 2011

Here at work we've made very good use of Server 2003's Shadow Copy service, which lets me restore users' files quickly and easily using the Previous Versions software--yet takes minimal resources and storage space on the server. I've also heard that the service may be available to users in Windows 7. Is there an equivalent of this in Ubuntu? Something I could set up that would snapshot files on my hard drive every so often, and let me recover deleted files or earlier versions of files?

View 1 Replies View Related

Ubuntu :: Shadow Certain Type Of Window With Emerald

Jul 12, 2011

I'm using this metacity theme along with the included (and AMAZING) emerald theme for the window borders. Just wondering if there's any way I can keep the window borders as they are, but put shadows on for the gnome-panel and my stickynotes? See HERE.When I try to adjust the shadow settings in emerald, it changes everything -- including the window borders, which make the theme look horrible.I know I can specify certain types and classes of windows when using compiz as default window decorator with ccsm, but is there any way to do something like this with emerald?

View 3 Replies View Related

Ubuntu Security :: Can Make New Algorithm For /etc/shadow

Aug 16, 2011

i use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..

how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method

View 7 Replies View Related

Debian :: How /etc/shadow File Authenticates An User ?

Feb 9, 2011

i am new to debian. I need to know after booting sequence login shell appears to get username and password. so what happens when user puts username and password ?? how this given username and password are matched with /etc/shadow file ??

my another question is what is role of /etc/pam.d/ authenticating username and password ?? does it work with shadow file or not ?

View 3 Replies View Related

General :: Normal For /etc/shadow To Change It's Timestamp?

Aug 1, 2010

I noticed that file /etc/shadow changed it's timestamp.Why it is changed? Is it "normal"?

View 4 Replies View Related

General :: Shadow File Password Policy?

Oct 1, 2010

Today i was going through some of security guides written on linux .Under shadow file security following points were mentioned.1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.2)Usernames in shadow file must satisfy to all the same rules as usernames in /etc/passwd.3)password for application Username should display * if username is not locked.4)If a user is locked it should be displayed as ! as the first character in second field of shadow file.

Confusion for point 1 and 2:Now i m confused as why the encrypted password should be more than 14-25 characters.Also what rules to satisfy How to check it?Confusion for point 3 and 4:There are lot of users with * as second field i guess they are not locked but according to 4th point there are lot of users with ! as first characters.How would i check whether they are actually locked or not.I m posting the output of /etc/shadow and /etc/passwd files for the account.

View 11 Replies View Related

General :: What Encryption Does The /etc/shadow File Use For Passwords

Nov 26, 2009

I am just wondering what encryption method the shadow file uses, so that I may be able to manually change it. I ask this because I am trying to make a web page that will allow people to change their linux password via a browser.

View 4 Replies View Related

Security :: Shadow Password Hashes - If My $id$ Was $5$, Which Is Sha256?

Apr 26, 2011

The /etc/shadow file contains an id of $1$, $2$, $5$ or $6$ to show the encryption method used.A salt follows this,followed by the password hash.When a user is created and a password is set, a hash is RANDOMLY generated and used as the salt to the password hash. Everytime that user logs in, login checks /etc/shadow for the $id$ and salt and runs the password given by the user through the hash mechanism ($id$) using the salt in /etc/shadow.So basically does login look at /etc/shadow for the $id$ and salt to create a hash with which to compare to the /etc/shadow hash?question 2 - If my $id$ was $5$, which is sha256, how would i go about changing this? Like is there a shadow.conf or crypt.conf or something? Can i change it per user?

View 2 Replies View Related

Server :: Migrate From LDAP To Regular Shadow?

Jun 16, 2010

I need to make a backup of the ldap (users and passwords). Is there a tool to do this? I've found o the internet only the shadow to ldap version

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved