<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redhat - Amending password policy in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255165#M33522</link>
    <description>Yes, you must use pam_cracklib, for example, add to /etc/pam.d/system-auth&lt;BR /&gt;&lt;BR /&gt;password   required   pam_cracklib.so   retry=3   minlen=11   difok=3   lcredit=0   ucredit=1 &lt;BR /&gt;dcredit=1 ocredit=1</description>
    <pubDate>Wed, 20 Aug 2008 17:55:54 GMT</pubDate>
    <dc:creator>Ivan Ferreira</dc:creator>
    <dc:date>2008-08-20T17:55:54Z</dc:date>
    <item>
      <title>Redhat - Amending password policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255162#M33519</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;I have a need to view / change the password policy on a number of Redhat (Red Hat Enterprise Linux ES release 4) boxes. I need to be able to enforce the following for each server using a script:&lt;BR /&gt;&lt;BR /&gt;1. Minimum password 7 chars,&lt;BR /&gt;2. At least two alphabetic chars in password,&lt;BR /&gt;3. At lease one numeric char in password,&lt;BR /&gt;4. Old password use must be prevented.&lt;BR /&gt;5. Non priviledged accounts passwords to be changed every 90 days&lt;BR /&gt;6. Shared priviledged accounts (root) passwords to be changed every 30 days&lt;BR /&gt;7. Minimum Five / Recommended three unsuccessful login attempts.&lt;BR /&gt;&lt;BR /&gt;Could anybody point me in the direction of tools to do this using native redhat software. ie avoiding 3rd parties ?&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Wed, 20 Aug 2008 13:34:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255162#M33519</guid>
      <dc:creator>wurzul</dc:creator>
      <dc:date>2008-08-20T13:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: Redhat - Amending password policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255163#M33520</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I think you can do it all native.&lt;BR /&gt;&lt;BR /&gt;vi /etc/login.defs &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.puschitz.com/SecuringLinux.shtml#EnablingPasswordAging" target="_blank"&gt;http://www.puschitz.com/SecuringLinux.shtml#EnablingPasswordAging&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 20 Aug 2008 13:39:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255163#M33520</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2008-08-20T13:39:38Z</dc:date>
    </item>
    <item>
      <title>Re: Redhat - Amending password policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255164#M33521</link>
      <description>Thanks for replying. I've had a search round the interweb and found posts stating that 'login' now does not look to /etc/login.defs for params. I did find the below which states pam maybe able to do what I'm asking. I'll do some testing and post back.&lt;BR /&gt;&lt;BR /&gt;Thanks again.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html" target="_blank"&gt;http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html&lt;/A&gt;</description>
      <pubDate>Wed, 20 Aug 2008 14:28:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255164#M33521</guid>
      <dc:creator>wurzul</dc:creator>
      <dc:date>2008-08-20T14:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Redhat - Amending password policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255165#M33522</link>
      <description>Yes, you must use pam_cracklib, for example, add to /etc/pam.d/system-auth&lt;BR /&gt;&lt;BR /&gt;password   required   pam_cracklib.so   retry=3   minlen=11   difok=3   lcredit=0   ucredit=1 &lt;BR /&gt;dcredit=1 ocredit=1</description>
      <pubDate>Wed, 20 Aug 2008 17:55:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255165#M33522</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2008-08-20T17:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: Redhat - Amending password policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255166#M33523</link>
      <description>Hi, I've setup a test environment to play with PAM. Below is my edited /etc/pam.d/system-auth file. It doesn't seem to work. I've tested using passwd, ie passwd root and the system allows me to use passwords with less then 7 chars. Can anybody suggest anything ?&lt;BR /&gt;&lt;BR /&gt;#%PAM-1.0&lt;BR /&gt;# This file is auto-generated.&lt;BR /&gt;# User changes will be destroyed the next time authconfig is run.&lt;BR /&gt;auth required /lib/security/$ISA/pam_env.so&lt;BR /&gt;auth sufficient /lib/security/$ISA/pam_unix.so likeauth nullok&lt;BR /&gt;auth required /lib/security/$ISA/pam_deny.so&lt;BR /&gt;&lt;BR /&gt;account required /lib/security/$ISA/pam_unix.so&lt;BR /&gt;account sufficient /lib/security/$ISA/pam_succeed_if.so uid &amp;lt; 100 quiet&lt;BR /&gt;account required /lib/security/$ISA/pam_permit.so&lt;BR /&gt;&lt;BR /&gt;password required /lib/security/$ISA/pam_cracklib.so retry=3 minlen=7&lt;BR /&gt;password sufficient /lib/security/$ISA/pam_unix.so nullok use_authtok md5 shadow&lt;BR /&gt;password required /lib/security/$ISA/pam_deny.so&lt;BR /&gt;&lt;BR /&gt;session required /lib/security/$ISA/pam_limits.so&lt;BR /&gt;session required /lib/security/$ISA/pam_unix.so</description>
      <pubDate>Fri, 05 Sep 2008 12:11:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255166#M33523</guid>
      <dc:creator>wurzul</dc:creator>
      <dc:date>2008-09-05T12:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Redhat - Amending password policy</title>
      <link>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255167#M33524</link>
      <description>Hi wurzul&lt;BR /&gt;&lt;BR /&gt;This pam restrictions doesnt apply for root and when passwd cmd is run from root for difernet user.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Try Loggin in with the user and try changing the passwd&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Karthik</description>
      <pubDate>Sat, 06 Sep 2008 05:10:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/redhat-amending-password-policy/m-p/4255167#M33524</guid>
      <dc:creator>Karthikeyan.j</dc:creator>
      <dc:date>2008-09-06T05:10:48Z</dc:date>
    </item>
  </channel>
</rss>

