<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Linux NIS &amp;quot;Authentication token manipulation error&amp;quot; in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583297#M39744</link>
    <description>&lt;!--!*#--&gt;Forum-dwellers:&lt;BR /&gt;&lt;BR /&gt;I'm having an interesting time getting NIS password changes to work on RHEL 5.3.  When I try to change one using "passwd" I get the error:&lt;BR /&gt;&lt;BR /&gt;Changing password for user applic.&lt;BR /&gt;Changing password for applic&lt;BR /&gt;(current) UNIX password: &lt;BR /&gt;New UNIX password: &lt;BR /&gt;New UNIX password: &lt;BR /&gt;passwd: Authentication token manipulation error&lt;BR /&gt;&lt;BR /&gt;(Yes, I'm sure that I'm entering the correct current password first since I know that this simple mistake can cause the same error message to appear, albeit earlier in the output.)&lt;BR /&gt;&lt;BR /&gt;Here are the details of the PAM/NIS configuration:&lt;BR /&gt;&lt;BR /&gt;1) NIS server IP/name added to /etc/hosts&lt;BR /&gt;&lt;BR /&gt;2) /etc/yp.conf changed to&lt;BR /&gt;&lt;BR /&gt;domain &lt;NIS domain=""&gt; server &lt;SERVER name=""&gt;&lt;BR /&gt;&lt;BR /&gt;3) /etc/sysconfig/network changed&lt;BR /&gt;&lt;BR /&gt;NISDOMAIN=&lt;NIS domain=""&gt;&lt;BR /&gt;&lt;BR /&gt;4) ypbind added to auto-start&lt;BR /&gt;&lt;BR /&gt;# chkconfig --level 345 ypbind on&lt;BR /&gt;&lt;BR /&gt;5) "compat" entries added to /etc/passwd and /etc/group&lt;BR /&gt;&lt;BR /&gt;6) /etc/nsswitch changed to:&lt;BR /&gt;&lt;BR /&gt;passwd:     compat&lt;BR /&gt;shadow:     files&lt;BR /&gt;group:      compat&lt;BR /&gt;&lt;BR /&gt;(I suspect that the "shadow" entry may be part of the problem-- more on that later.)&lt;BR /&gt;&lt;BR /&gt;7) Add netgroups to /etc/security/access.conf&lt;BR /&gt;&lt;BR /&gt;8) Change /etc/pam.d/system-auth&lt;BR /&gt;&lt;BR /&gt;password    sufficient    pam_unix.so md5 shadow nis nullok try_first_pass use_authtok&lt;BR /&gt;&lt;BR /&gt;-----&lt;BR /&gt;&lt;BR /&gt;Some interesting tests I've run:&lt;BR /&gt;&lt;BR /&gt;1) add "audit" to /etc/pam.d/system-auth line&lt;BR /&gt;&lt;BR /&gt;This gives some more detail in /var/log/secure, but not enough to troubleshoot the problem.  For example when changing the user "applic":&lt;BR /&gt;&lt;BR /&gt;passwd: pam_unix(passwd:chauthtok): username [applic] obtained&lt;BR /&gt;passwd: pam_unix(passwd:chauthtok): username [applic] obtained&lt;BR /&gt;passwd: pam_unix(passwd:chauthtok): password not changed for applic on &lt;NIS master=""&gt;&lt;BR /&gt;&lt;BR /&gt;2) Removing "md5 shadow" from the system-auth config allows the NIS password changes to work, but the local root account now has an old-style crypt() based password in the /etc/shadow file.&lt;BR /&gt;&lt;BR /&gt;How can I set things up so that:&lt;BR /&gt;1) users in /etc/passwd keep an md5 shadow password&lt;BR /&gt;2) NIS users can change their passwords via NIS&lt;BR /&gt;&lt;BR /&gt;Thanks for any help.&lt;BR /&gt;&lt;BR /&gt;  -- Steve Bonds&lt;BR /&gt;&lt;/NIS&gt;&lt;/NIS&gt;&lt;/SERVER&gt;&lt;/NIS&gt;</description>
    <pubDate>Fri, 12 Feb 2010 19:32:51 GMT</pubDate>
    <dc:creator>Steve Bonds</dc:creator>
    <dc:date>2010-02-12T19:32:51Z</dc:date>
    <item>
      <title>Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583297#M39744</link>
      <description>&lt;!--!*#--&gt;Forum-dwellers:&lt;BR /&gt;&lt;BR /&gt;I'm having an interesting time getting NIS password changes to work on RHEL 5.3.  When I try to change one using "passwd" I get the error:&lt;BR /&gt;&lt;BR /&gt;Changing password for user applic.&lt;BR /&gt;Changing password for applic&lt;BR /&gt;(current) UNIX password: &lt;BR /&gt;New UNIX password: &lt;BR /&gt;New UNIX password: &lt;BR /&gt;passwd: Authentication token manipulation error&lt;BR /&gt;&lt;BR /&gt;(Yes, I'm sure that I'm entering the correct current password first since I know that this simple mistake can cause the same error message to appear, albeit earlier in the output.)&lt;BR /&gt;&lt;BR /&gt;Here are the details of the PAM/NIS configuration:&lt;BR /&gt;&lt;BR /&gt;1) NIS server IP/name added to /etc/hosts&lt;BR /&gt;&lt;BR /&gt;2) /etc/yp.conf changed to&lt;BR /&gt;&lt;BR /&gt;domain &lt;NIS domain=""&gt; server &lt;SERVER name=""&gt;&lt;BR /&gt;&lt;BR /&gt;3) /etc/sysconfig/network changed&lt;BR /&gt;&lt;BR /&gt;NISDOMAIN=&lt;NIS domain=""&gt;&lt;BR /&gt;&lt;BR /&gt;4) ypbind added to auto-start&lt;BR /&gt;&lt;BR /&gt;# chkconfig --level 345 ypbind on&lt;BR /&gt;&lt;BR /&gt;5) "compat" entries added to /etc/passwd and /etc/group&lt;BR /&gt;&lt;BR /&gt;6) /etc/nsswitch changed to:&lt;BR /&gt;&lt;BR /&gt;passwd:     compat&lt;BR /&gt;shadow:     files&lt;BR /&gt;group:      compat&lt;BR /&gt;&lt;BR /&gt;(I suspect that the "shadow" entry may be part of the problem-- more on that later.)&lt;BR /&gt;&lt;BR /&gt;7) Add netgroups to /etc/security/access.conf&lt;BR /&gt;&lt;BR /&gt;8) Change /etc/pam.d/system-auth&lt;BR /&gt;&lt;BR /&gt;password    sufficient    pam_unix.so md5 shadow nis nullok try_first_pass use_authtok&lt;BR /&gt;&lt;BR /&gt;-----&lt;BR /&gt;&lt;BR /&gt;Some interesting tests I've run:&lt;BR /&gt;&lt;BR /&gt;1) add "audit" to /etc/pam.d/system-auth line&lt;BR /&gt;&lt;BR /&gt;This gives some more detail in /var/log/secure, but not enough to troubleshoot the problem.  For example when changing the user "applic":&lt;BR /&gt;&lt;BR /&gt;passwd: pam_unix(passwd:chauthtok): username [applic] obtained&lt;BR /&gt;passwd: pam_unix(passwd:chauthtok): username [applic] obtained&lt;BR /&gt;passwd: pam_unix(passwd:chauthtok): password not changed for applic on &lt;NIS master=""&gt;&lt;BR /&gt;&lt;BR /&gt;2) Removing "md5 shadow" from the system-auth config allows the NIS password changes to work, but the local root account now has an old-style crypt() based password in the /etc/shadow file.&lt;BR /&gt;&lt;BR /&gt;How can I set things up so that:&lt;BR /&gt;1) users in /etc/passwd keep an md5 shadow password&lt;BR /&gt;2) NIS users can change their passwords via NIS&lt;BR /&gt;&lt;BR /&gt;Thanks for any help.&lt;BR /&gt;&lt;BR /&gt;  -- Steve Bonds&lt;BR /&gt;&lt;/NIS&gt;&lt;/NIS&gt;&lt;/SERVER&gt;&lt;/NIS&gt;</description>
      <pubDate>Fri, 12 Feb 2010 19:32:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583297#M39744</guid>
      <dc:creator>Steve Bonds</dc:creator>
      <dc:date>2010-02-12T19:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583298#M39745</link>
      <description>Shalom Steve,&lt;BR /&gt;&lt;BR /&gt;Note: HP-UX systems with trusted system won't NIS authenticate to RHEL NIS master.&lt;BR /&gt;&lt;BR /&gt;The root account should not be handled via NIS. You need to be able to get on root with the system in single user mode.&lt;BR /&gt;&lt;BR /&gt;if you exclude root from this configuration you may be okay using md5 shadow. shadow by itself is not so bad though.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 12 Feb 2010 20:39:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583298#M39745</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2010-02-12T20:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583299#M39746</link>
      <description>&lt;!--!*#--&gt;&amp;gt;Note: HP-UX systems with trusted system won't &lt;BR /&gt;&amp;gt;NIS authenticate to RHEL NIS master.&lt;BR /&gt;&lt;BR /&gt;Noted.  In this case the NIS master is an HP-UX system, but I've seen no signs that there's a problem on that end.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;The root account should not be handled via&lt;BR /&gt;&amp;gt;NIS. You need to be able to get on&lt;BR /&gt;&amp;gt;root with the system in single user mode.&lt;BR /&gt;&lt;BR /&gt;Agreed!  In fact, that's really my question...&lt;BR /&gt;&lt;BR /&gt;&amp;gt;if you exclude root from this configuration&lt;BR /&gt;&amp;gt;you may be okay using md5 shadow. shadow by&lt;BR /&gt;&amp;gt;itself is not so bad though.&lt;BR /&gt;&lt;BR /&gt;How would I exclude root from the configuration?  Ideally, I'd like to exclude all users who exist in /etc/passwd, but I'll settle for root if that's all I can get...&lt;BR /&gt;&lt;BR /&gt;Thanks again,&lt;BR /&gt;&lt;BR /&gt;  -- Steve Bonds&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Feb 2010 20:49:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583299#M39746</guid>
      <dc:creator>Steve Bonds</dc:creator>
      <dc:date>2010-02-12T20:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583300#M39747</link>
      <description>On the RHEL client in /etc/nsswitch.conf, put&lt;BR /&gt;&lt;BR /&gt;passwd:     files nis&lt;BR /&gt;&lt;BR /&gt;This will cause the system to prefer the local password and shadow files over the NIS server.  If and only if the account does not appear in the files, then it will consult the NIS server.  The root and utility accounts should be in the files; users will typically be in the NIS map; for 3rd party applications, it's your judgement call, depending on, among other things, whether the account should be available to every machine in the NIS domain and on whether the 3rd party application install procedure creates the account in the local passwd/shadow files.</description>
      <pubDate>Tue, 16 Feb 2010 02:37:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583300#M39747</guid>
      <dc:creator>Stephen P. Schaefer</dc:creator>
      <dc:date>2010-02-16T02:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583301#M39748</link>
      <description>&amp;gt; On the RHEL client in /etc/nsswitch.conf, put&lt;BR /&gt;&lt;BR /&gt;&amp;gt; passwd: files nis&lt;BR /&gt;&lt;BR /&gt;&amp;gt; This will cause the system to prefer the&lt;BR /&gt;&amp;gt; local password and shadow files over the NIS&lt;BR /&gt;&amp;gt; server. If and only if the account does not &lt;BR /&gt;&amp;gt; appear in the files, then it will consult &lt;BR /&gt;&amp;gt; the NIS server. The root and utility &lt;BR /&gt;&amp;gt; accounts should be in the files; users will &lt;BR /&gt;&amp;gt; typically be in the NIS map;&lt;BR /&gt;&lt;BR /&gt;This is the config I'm using-- perhaps it's already working as expected.  I will admit I have not yet done an actual simulated network outage to verify that the root account is still accessible...</description>
      <pubDate>Tue, 16 Feb 2010 19:59:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583301#M39748</guid>
      <dc:creator>Steve Bonds</dc:creator>
      <dc:date>2010-02-16T19:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583302#M39749</link>
      <description>Shalom Steve,&lt;BR /&gt;&lt;BR /&gt;Nice first name.&lt;BR /&gt;&lt;BR /&gt;Noted.  In this case the NIS master is an HP-UX system, but I've seen no signs that there's a problem on that end.&lt;BR /&gt;&lt;BR /&gt;This is the only way to go with NIS. HP-UX can't function with a Linux master if the master is using the default shadow password configuration.&lt;BR /&gt;&lt;BR /&gt;This issue may be due to issues with Linux NIS. I'd be satisfied however calling it a day and pulling back the md5 option.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 16 Feb 2010 22:16:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583302#M39749</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2010-02-16T22:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: Linux NIS "Authentication token manipulation error"</title>
      <link>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583303#M39750</link>
      <description>&amp;gt; Nice first name.&lt;BR /&gt;&lt;BR /&gt;I agree!&lt;BR /&gt;&lt;BR /&gt;&amp;gt; This issue may be due to issues with Linux&lt;BR /&gt;&amp;gt; NIS. I'd be satisfied however calling it a&lt;BR /&gt;&amp;gt; day and pulling back the md5 option.&lt;BR /&gt;&lt;BR /&gt;That's pretty much where I'm ending up.  I'll check that I can log in fine without a network, but otherwise I'll just stick with local crypt() style passwords while forced to use NIS.  Clearly those will not be the weak link in system security!  :-)&lt;BR /&gt;&lt;BR /&gt;Thanks again for the help, everyone!&lt;BR /&gt;&lt;BR /&gt;  -- Steve&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Feb 2010 22:19:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/linux-nis-quot-authentication-token-manipulation-error-quot/m-p/4583303#M39750</guid>
      <dc:creator>Steve Bonds</dc:creator>
      <dc:date>2010-02-16T22:19:51Z</dc:date>
    </item>
  </channel>
</rss>

