<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Shadow Passwd in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776359#M390499</link>
    <description>&lt;P&gt;[Will it affect applications?]&lt;BR /&gt;&lt;BR /&gt;The answer will be very similar to the situation with the Trusted System mode in your earlier thread:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h30499.www3.hp.com/t5/System-Administration/Changing-Untrusted-system-to-Trusted-System/m-p/4775901#M390435" target="_blank"&gt;http://h30499.www3.hp.com/t5/System-Administration/Changing-Untrusted-system-to-Trusted-System/m-p/4775901#M390435&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your application does not use HP-UX system passwords or any other authentication information, it will not be affected at all.&lt;BR /&gt;&lt;BR /&gt;If the application uses PAM libraries to perform authentication, it will most likely not be affected at all.&lt;BR /&gt;&lt;BR /&gt;But if the application expects to read password hashes from /etc/passwd (either by reading the file directly, or by using getpwent()/getpwuid()/getpwnam() system calls) and cannot support the /etc/shadow-specific fgetspent()/getspnam() system calls, the authentication functions of the application will fail.&lt;BR /&gt;&lt;BR /&gt;On one hand, the getsp...() system calls are standard in many other Unix-style OSs, so many multi-platform applications should be easy to convert to use them on HP-UX too. &lt;BR /&gt;&lt;BR /&gt;On the other hand, the shadow password system is much newer on HP-UX specifically than the old Trusted System mode, so if the application is old and it has not been updated for 11.23/11.31, it is somewhat more likely to have problems with shadow passwords than with the Trusted System mode.&lt;BR /&gt;&lt;BR /&gt;MK&lt;/P&gt;</description>
    <pubDate>Thu, 04 Aug 2011 16:14:37 GMT</pubDate>
    <dc:creator>Matti_Kurkela</dc:creator>
    <dc:date>2011-08-04T16:14:37Z</dc:date>
    <item>
      <title>Shadow Passwd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776357#M390497</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Converting /etc/passwd to /etc/shadow using pwconv will affect applications.I have oracle users in my system.System is HP-UX 11.23.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;PVM.</description>
      <pubDate>Tue, 12 Apr 2011 04:13:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776357#M390497</guid>
      <dc:creator>PVM_2</dc:creator>
      <dc:date>2011-04-12T04:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Shadow Passwd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776358#M390498</link>
      <description>Hello PVM,&lt;BR /&gt;&lt;BR /&gt;When you convert /etc/passwd file to /etc/shadow, all the user's password gets lock.You need to reset the password with password complexity.So if your application user created on OS level then you need to reset/unlock the user.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Apr 2011 07:37:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776358#M390498</guid>
      <dc:creator>YMP</dc:creator>
      <dc:date>2011-04-12T07:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: Shadow Passwd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776359#M390499</link>
      <description>&lt;P&gt;[Will it affect applications?]&lt;BR /&gt;&lt;BR /&gt;The answer will be very similar to the situation with the Trusted System mode in your earlier thread:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h30499.www3.hp.com/t5/System-Administration/Changing-Untrusted-system-to-Trusted-System/m-p/4775901#M390435" target="_blank"&gt;http://h30499.www3.hp.com/t5/System-Administration/Changing-Untrusted-system-to-Trusted-System/m-p/4775901#M390435&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your application does not use HP-UX system passwords or any other authentication information, it will not be affected at all.&lt;BR /&gt;&lt;BR /&gt;If the application uses PAM libraries to perform authentication, it will most likely not be affected at all.&lt;BR /&gt;&lt;BR /&gt;But if the application expects to read password hashes from /etc/passwd (either by reading the file directly, or by using getpwent()/getpwuid()/getpwnam() system calls) and cannot support the /etc/shadow-specific fgetspent()/getspnam() system calls, the authentication functions of the application will fail.&lt;BR /&gt;&lt;BR /&gt;On one hand, the getsp...() system calls are standard in many other Unix-style OSs, so many multi-platform applications should be easy to convert to use them on HP-UX too. &lt;BR /&gt;&lt;BR /&gt;On the other hand, the shadow password system is much newer on HP-UX specifically than the old Trusted System mode, so if the application is old and it has not been updated for 11.23/11.31, it is somewhat more likely to have problems with shadow passwords than with the Trusted System mode.&lt;BR /&gt;&lt;BR /&gt;MK&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2011 16:14:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776359#M390499</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2011-08-04T16:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Shadow Passwd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776360#M390500</link>
      <description>&amp;gt;When you convert /etc/passwd file to /etc/shadow, all the user's password gets lock.&lt;BR /&gt;&amp;gt;You need to reset the password with password complexity&lt;BR /&gt;&lt;BR /&gt;this is not true. with pwconv, all the password hashes in /etc/passwd will be replaced with an "x", and the existing hashed will be transferred to /etc/shadow. so this means that after a pwconv every user can log in with his/her old password. this is also true to backconverting with pwunconv, the passwords will be retained.</description>
      <pubDate>Tue, 12 Apr 2011 12:52:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/4776360#M390500</guid>
      <dc:creator>Viktor Balogh</dc:creator>
      <dc:date>2011-04-12T12:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: pwconv</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/5888433#M482526</link>
      <description>&lt;P&gt;we have ia64 hp server rx8640 setup as nPar running 11.23 and we ran pwconv to convert the system to use the shadow&amp;nbsp;passwords. System was not&amp;nbsp;a trusted system. System has locked out all the users login including root. No user can login incl root. Now have to reset the super user password using Single user mode and reboot !!&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2012 11:48:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/shadow-passwd/m-p/5888433#M482526</guid>
      <dc:creator>aht</dc:creator>
      <dc:date>2012-12-03T11:48:05Z</dc:date>
    </item>
  </channel>
</rss>

