<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enforcing more complex passwords... in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756681#M753566</link>
    <description>You don't say what HP-UX release you are running, but given that you refer to /etc/default/security I will assume it's either 11.00 or 11.11.&lt;BR /&gt;&lt;BR /&gt;It seems that sites have a limitless number of special requirements&lt;BR /&gt;for passwords.  A custom PAM module is probably the 'right'&lt;BR /&gt;solution here, but has obvious support cost consequences.&lt;BR /&gt;&lt;BR /&gt;Although I don't have a perfect solution for you, there is one simple&lt;BR /&gt;solution that can help meet most of your requirements.  Take a look&lt;BR /&gt;at the documetation for patch PHCO_24390, which adds a&lt;BR /&gt;new feature. Unfortunately this isn't yet mentioned in the security(4)&lt;BR /&gt;manual pages. Quoting from the patch documentation:&lt;BR /&gt;&lt;BR /&gt;           A site's security policies sometimes require new passwords&lt;BR /&gt;           to contain specific numbers or types of characters, such as&lt;BR /&gt;           at least two digits and at least one special character.&lt;BR /&gt;           Resolution:&lt;BR /&gt;           In addition to the standard password requirements,&lt;BR /&gt;           optional entries in the file /etc/default/security specify&lt;BR /&gt;           the minimum number of required characters of each type&lt;BR /&gt;           (upper case characters, lower case characters, digits&lt;BR /&gt;           and special characters) in a new password.&lt;BR /&gt;           PASSWORD_MIN_UPPER_CASE_CHARS=N&lt;BR /&gt;           PASSWORD_MIN_LOWER_CASE_CHARS=N&lt;BR /&gt;           PASSWORD_MIN_DIGIT_CHARS=N&lt;BR /&gt;           PASSWORD_MIN_SPECIAL_CHARS=N&lt;BR /&gt;           The default value for N is 0.  These parameters have&lt;BR /&gt;           effect only when a password is changed.  On untrusted&lt;BR /&gt;           systems, these parameters do not apply to the root user.&lt;BR /&gt;           The file /etc/default/security should be owned by root and&lt;BR /&gt;           have 0644 permissions.&lt;BR /&gt;           As an example, to require passwords at least 8 characters&lt;BR /&gt;           long, composed of at least 5 upper case characters, 2&lt;BR /&gt;           lower case characters and a digit, include the following&lt;BR /&gt;           lines in /etc/default/security, as specified above:&lt;BR /&gt;           PASSWORD_MIN_UPPER_CASE_CHARS=5&lt;BR /&gt;           PASSWORD_MIN_LOWER_CASE_CHARS=2&lt;BR /&gt;           PASSWORD_MIN_DIGIT_CHARS=1&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 04 Jul 2002 11:28:42 GMT</pubDate>
    <dc:creator>doug hosking</dc:creator>
    <dc:date>2002-07-04T11:28:42Z</dc:date>
    <item>
      <title>Enforcing more complex passwords...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756677#M753562</link>
      <description>Greetings,&lt;BR /&gt;&lt;BR /&gt;Our client has requested that user passwords must include 3 of the following 4 types of characters: uppercase, lowercase, numbers, and special characters.  However, according to the man page for passwd, only two groups are required by default (letters and either numbers or special characters).  &lt;BR /&gt;&lt;BR /&gt;We're running as a trusted system, and there doesn't seem to be an option in SAM.  I also couldn't find an appropriate variable to add to /etc/default/security.&lt;BR /&gt;&lt;BR /&gt;Can I satisfy this requirement through a configuration change, or do I need a third-party tool?  &lt;BR /&gt;&lt;BR /&gt;Thanks for your consideration...&lt;BR /&gt;&lt;BR /&gt;~Michael Pasquale</description>
      <pubDate>Tue, 02 Jul 2002 19:55:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756677#M753562</guid>
      <dc:creator>Michael Pasquale</dc:creator>
      <dc:date>2002-07-02T19:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing more complex passwords...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756678#M753563</link>
      <description>Hi Michael,&lt;BR /&gt;&lt;BR /&gt; Think you can do this with a PAM - Pluggable Authentication Module.&lt;BR /&gt;You'd have to modify the std module, write one or purchase it.&lt;BR /&gt;If you do a strings  | grep password on the /usr/lib/security/libpam.unix.1 file you'll see the following in the output&lt;BR /&gt;&lt;BR /&gt;The password entered is not valid. Valid passwords must contain at least:&lt;BR /&gt;&lt;BR /&gt;So the std module IS checking - it just has to be modified to check using your restrictions.&lt;BR /&gt;Maybe someone out there has already done so.&lt;BR /&gt;I know there are 3rd party products that will do this.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 02 Jul 2002 20:31:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756678#M753563</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-07-02T20:31:15Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing more complex passwords...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756679#M753564</link>
      <description>Hi Michael,&lt;BR /&gt;&lt;BR /&gt;You can try writing a passwd wrapper for it.&lt;BR /&gt;&lt;BR /&gt;A rough example (you definitely need to test and finetune):&lt;BR /&gt;&lt;BR /&gt;# mv /usr/bin/passwd /usr/bin/passwd.bin&lt;BR /&gt;&lt;BR /&gt;# cat /usr/bin/passwd&lt;BR /&gt;&lt;BR /&gt;#!/sbin/sh&lt;BR /&gt;&lt;BR /&gt;stty -echo&lt;BR /&gt;echo "New UNIX password: \c"&lt;BR /&gt;read passwd&lt;BR /&gt;stty echo&lt;BR /&gt;&lt;BR /&gt;if echo $passwd | grep [0123456789] | grep [a-zA-Z] | grep [!@#$%^&amp;amp;*()_+|] &amp;gt;/dev/null 2&amp;gt;&amp;amp;1&lt;BR /&gt;then&lt;BR /&gt;  echo "This password qualifies. Proceeding..."&lt;BR /&gt;  /usr/bin/passwd.bin $passwd&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Wed, 03 Jul 2002 10:11:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756679#M753564</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-07-03T10:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing more complex passwords...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756680#M753565</link>
      <description>Thank you both very much!!&lt;BR /&gt;&lt;BR /&gt;Since enforcing such complexity is not immediately feasible (i.e., the change can't be made without additional coding/software), our client decided that this issue can wait for the time being.&lt;BR /&gt;&lt;BR /&gt;Thank you both for your input; I'll investigate your suggestions.&lt;BR /&gt;&lt;BR /&gt;Sincerely,&lt;BR /&gt;Michael Pasquale</description>
      <pubDate>Wed, 03 Jul 2002 14:58:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756680#M753565</guid>
      <dc:creator>Michael Pasquale</dc:creator>
      <dc:date>2002-07-03T14:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing more complex passwords...</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756681#M753566</link>
      <description>You don't say what HP-UX release you are running, but given that you refer to /etc/default/security I will assume it's either 11.00 or 11.11.&lt;BR /&gt;&lt;BR /&gt;It seems that sites have a limitless number of special requirements&lt;BR /&gt;for passwords.  A custom PAM module is probably the 'right'&lt;BR /&gt;solution here, but has obvious support cost consequences.&lt;BR /&gt;&lt;BR /&gt;Although I don't have a perfect solution for you, there is one simple&lt;BR /&gt;solution that can help meet most of your requirements.  Take a look&lt;BR /&gt;at the documetation for patch PHCO_24390, which adds a&lt;BR /&gt;new feature. Unfortunately this isn't yet mentioned in the security(4)&lt;BR /&gt;manual pages. Quoting from the patch documentation:&lt;BR /&gt;&lt;BR /&gt;           A site's security policies sometimes require new passwords&lt;BR /&gt;           to contain specific numbers or types of characters, such as&lt;BR /&gt;           at least two digits and at least one special character.&lt;BR /&gt;           Resolution:&lt;BR /&gt;           In addition to the standard password requirements,&lt;BR /&gt;           optional entries in the file /etc/default/security specify&lt;BR /&gt;           the minimum number of required characters of each type&lt;BR /&gt;           (upper case characters, lower case characters, digits&lt;BR /&gt;           and special characters) in a new password.&lt;BR /&gt;           PASSWORD_MIN_UPPER_CASE_CHARS=N&lt;BR /&gt;           PASSWORD_MIN_LOWER_CASE_CHARS=N&lt;BR /&gt;           PASSWORD_MIN_DIGIT_CHARS=N&lt;BR /&gt;           PASSWORD_MIN_SPECIAL_CHARS=N&lt;BR /&gt;           The default value for N is 0.  These parameters have&lt;BR /&gt;           effect only when a password is changed.  On untrusted&lt;BR /&gt;           systems, these parameters do not apply to the root user.&lt;BR /&gt;           The file /etc/default/security should be owned by root and&lt;BR /&gt;           have 0644 permissions.&lt;BR /&gt;           As an example, to require passwords at least 8 characters&lt;BR /&gt;           long, composed of at least 5 upper case characters, 2&lt;BR /&gt;           lower case characters and a digit, include the following&lt;BR /&gt;           lines in /etc/default/security, as specified above:&lt;BR /&gt;           PASSWORD_MIN_UPPER_CASE_CHARS=5&lt;BR /&gt;           PASSWORD_MIN_LOWER_CASE_CHARS=2&lt;BR /&gt;           PASSWORD_MIN_DIGIT_CHARS=1&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Jul 2002 11:28:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enforcing-more-complex-passwords/m-p/2756681#M753566</guid>
      <dc:creator>doug hosking</dc:creator>
      <dc:date>2002-07-04T11:28:42Z</dc:date>
    </item>
  </channel>
</rss>

