<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic User password in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777614#M23055</link>
    <description>In the Redhat server , I will force the user change the password regularly by "chage -d0 userid", could suggest how to prevent the user use the simple password eg. 123456 ? thx.</description>
    <pubDate>Tue, 25 Apr 2006 21:39:17 GMT</pubDate>
    <dc:creator>ivychung2</dc:creator>
    <dc:date>2006-04-25T21:39:17Z</dc:date>
    <item>
      <title>User password</title>
      <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777614#M23055</link>
      <description>In the Redhat server , I will force the user change the password regularly by "chage -d0 userid", could suggest how to prevent the user use the simple password eg. 123456 ? thx.</description>
      <pubDate>Tue, 25 Apr 2006 21:39:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777614#M23055</guid>
      <dc:creator>ivychung2</dc:creator>
      <dc:date>2006-04-25T21:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: User password</title>
      <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777615#M23056</link>
      <description>Normally, the pam_cracklib is enabled and it does not allow the use of simple passwords.&lt;BR /&gt;&lt;BR /&gt;Check your /etc/pam.d/system-auth file, you should have lines like this:&lt;BR /&gt;&lt;BR /&gt;password    requisite     /lib/security/$ISA/pam_cracklib.so retry=3   &lt;BR /&gt;&lt;BR /&gt;Only root can force the use of simple passwords.</description>
      <pubDate>Tue, 25 Apr 2006 21:48:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777615#M23056</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2006-04-25T21:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: User password</title>
      <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777616#M23057</link>
      <description>thx reply ,&lt;BR /&gt;&lt;BR /&gt;I check that the setting you said is existed in my server , I found that when I use the simple password , the server will prompt me the password is too simple ( BAD PASSWORD: it is too simplistic/systematic ) but it still allow me to use this simple password , I think this only a warning message , could suggest how can I provent the user use it ? thx in advance.</description>
      <pubDate>Tue, 25 Apr 2006 22:06:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777616#M23057</guid>
      <dc:creator>ivychung2</dc:creator>
      <dc:date>2006-04-25T22:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: User password</title>
      <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777617#M23058</link>
      <description>You can customize you PAM to add password integrity checkers, such as pam_passwdqc (available from &lt;A href="http://www.openwall.com/passwdqc/)" target="_blank"&gt;http://www.openwall.com/passwdqc/)&lt;/A&gt; or write your own module. For a list of available PAM modules, see &lt;A href="http://www.kernel.org/pub/linux/libs/pam/modules.html." target="_blank"&gt;http://www.kernel.org/pub/linux/libs/pam/modules.html.&lt;/A&gt; For more information about PAM, see the chapter titled Pluggable Authentication Modules (PAM) in the Official Red Hat Linux Reference Guide.&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Apr 2006 23:10:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777617#M23058</guid>
      <dc:creator>Ajay Agarwal</dc:creator>
      <dc:date>2006-04-25T23:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: User password</title>
      <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777618#M23059</link>
      <description>I would also encourage you to check out this link: &lt;A href="http://forums1.itrc.hp.com/service/forums/helptips.do?#28" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/helptips.do?#28&lt;/A&gt; to learn about the point system of this forum.</description>
      <pubDate>Tue, 25 Apr 2006 23:37:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777618#M23059</guid>
      <dc:creator>Ajay Agarwal</dc:creator>
      <dc:date>2006-04-25T23:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: User password</title>
      <link>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777619#M23060</link>
      <description>&amp;gt;I check that the setting you said is &amp;gt;existed in my server , I found that when I &amp;gt;use the simple password , the server will &amp;gt;prompt me the password is too simple ( BAD &amp;gt;PASSWORD: it is too &amp;gt;simplistic/systematic ) but it still allow &amp;gt;me to use this simple password , I think &amp;gt;this only a warning message , could &amp;gt;suggest how can I provent the user use &amp;gt;it ? thx in advance.&lt;BR /&gt;&lt;BR /&gt;run "passwd" as regular user and you'll see that regular user cannot set trivial password. &lt;BR /&gt;And for root it's just warning!</description>
      <pubDate>Wed, 26 Apr 2006 06:09:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/user-password/m-p/3777619#M23060</guid>
      <dc:creator>Vitaly Karasik_1</dc:creator>
      <dc:date>2006-04-26T06:09:51Z</dc:date>
    </item>
  </channel>
</rss>

