<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Linux Password Policy in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539391#M17413</link>
    <description>If you dont want to do more cracking it is better to change the user passwords by root himself ( as it is a testing server )</description>
    <pubDate>Mon, 09 May 2005 05:28:12 GMT</pubDate>
    <dc:creator>Bejoy C Alias</dc:creator>
    <dc:date>2005-05-09T05:28:12Z</dc:date>
    <item>
      <title>Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539385#M17407</link>
      <description>How to change the linux password policy to be less restriction ?&lt;BR /&gt;&lt;BR /&gt;When I want to change the password for regular user, it shows me:&lt;BR /&gt;&lt;BR /&gt;BAD PASSWORD: is too simple&lt;BR /&gt;New password:&lt;BR /&gt;BAD PASSWORD: it's WAY too short&lt;BR /&gt;...&lt;BR /&gt;&lt;BR /&gt;Because it's a testing server, no security issue here needs to be concerned, the user can use the password like "abc" or "123".&lt;BR /&gt;&lt;BR /&gt;Thanks !</description>
      <pubDate>Fri, 06 May 2005 10:04:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539385#M17407</guid>
      <dc:creator>yyghp</dc:creator>
      <dc:date>2005-05-06T10:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539386#M17408</link>
      <description>look, I honestly don't want to help You change that. It's always just test servers, test accounts and test sites that are used to break into people's sites and feel comfy inside.&lt;BR /&gt;&lt;BR /&gt;for a good and easy password generator, check out the Advanced Password Generator 'apg', I won't stop You from keeping the passwords in a binder, but I really can't find any difference in using 123 or Gesw53!AA\ as a password except the number of letters.</description>
      <pubDate>Fri, 06 May 2005 10:50:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539386#M17408</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-05-06T10:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539387#M17409</link>
      <description>because I was asked to setup users who are working in the warehouse and prefer to use 4 digit numbers as password.&lt;BR /&gt;&lt;BR /&gt;where's "apg" ? I couldn't find it from my Red Hat Enterprise Linux 3.&lt;BR /&gt;Thanks !&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 May 2005 13:08:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539387#M17409</guid>
      <dc:creator>yyghp</dc:creator>
      <dc:date>2005-05-06T13:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539388#M17410</link>
      <description>hehe - warehouse spells 'easy terminal access' to me, but I'll shut up and put paranoia aside:&lt;BR /&gt;&lt;BR /&gt;the rpm's here should work for You:&lt;BR /&gt;&lt;A href="http://dag.wieers.com/packages/apg/" target="_blank"&gt;http://dag.wieers.com/packages/apg/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;a small example:&lt;BR /&gt;&lt;BR /&gt;vault:/home/floh$ apg -m 4 -x 4 -a 0&lt;BR /&gt;Quom&lt;BR /&gt;liv2&lt;BR /&gt;utdo&lt;BR /&gt;Haf2&lt;BR /&gt;Fons&lt;BR /&gt;ukgi&lt;BR /&gt;(this was the 'pronouncable' mode)&lt;BR /&gt;&lt;BR /&gt;vault:/home/floh$ apg -m 4 -x 4 -a 1&lt;BR /&gt;T5fu&lt;BR /&gt;+u.y&lt;BR /&gt;FjGr&lt;BR /&gt;LjtO&lt;BR /&gt;AUy~&lt;BR /&gt;W)cp&lt;BR /&gt;(and this wasn't)&lt;BR /&gt;&lt;BR /&gt;vault:/home/floh$ apg -m 4 -x 4 -a 1 -M n&lt;BR /&gt;0548&lt;BR /&gt;6928&lt;BR /&gt;7237&lt;BR /&gt;7693&lt;BR /&gt;6676&lt;BR /&gt;8916&lt;BR /&gt;(and this finally get's You quite random 4-digit numbers, which will hopefully make people keep them a bit safer)&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 May 2005 16:33:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539388#M17410</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-05-06T16:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539389#M17411</link>
      <description>Linux uses a version of crack to test password complexity. It prvents regular users from using dictionary words and such.&lt;BR /&gt;&lt;BR /&gt;That package may be able to be removed from your system.&lt;BR /&gt;&lt;BR /&gt;You can violate the normal password rules by having root user or an operator with sudo capability set the passwords manually.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 06 May 2005 17:56:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539389#M17411</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-05-06T17:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539390#M17412</link>
      <description>This is really not recommended, but here's how to change it.&lt;BR /&gt;&lt;BR /&gt;Minimum password length you can have is 6 characters. This limit is hardcoded into pam_cracklib module.&lt;BR /&gt;&lt;BR /&gt;To allow simple 6 character passwords (e.g. abc123) modify /etc/pam.d/system-auth as descibed below.&lt;BR /&gt;&lt;BR /&gt;Change&lt;BR /&gt;&lt;BR /&gt;password    requisite     /lib/security/$ISA/pam_cracklib.so retry=3&lt;BR /&gt;&lt;BR /&gt;to&lt;BR /&gt;&lt;BR /&gt;password    requisite     /lib/security/$ISA/pam_cracklib.so retry=3 minlen=6 dcredit=0 ucredit=0 ocredit=0 lcredit=0 difok=0&lt;BR /&gt;&lt;BR /&gt;There's good documentation about PAM modules in /usr/share/doc/pam-&lt;VERSION&gt;/txts/README.pam_&lt;MODULE&gt;&lt;/MODULE&gt;&lt;/VERSION&gt;</description>
      <pubDate>Sat, 07 May 2005 00:35:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539390#M17412</guid>
      <dc:creator>Ermin Borovac</dc:creator>
      <dc:date>2005-05-07T00:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Linux Password Policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539391#M17413</link>
      <description>If you dont want to do more cracking it is better to change the user passwords by root himself ( as it is a testing server )</description>
      <pubDate>Mon, 09 May 2005 05:28:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-password-policy/m-p/3539391#M17413</guid>
      <dc:creator>Bejoy C Alias</dc:creator>
      <dc:date>2005-05-09T05:28:12Z</dc:date>
    </item>
  </channel>
</rss>

