- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Lame password checking.
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 06:17 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 06:19 AM
08-28-2002 06:19 AM
Re: Lame password checking.
Is there a way to strengthen the password rules used at the time a user is picking a new password? I'm using HP-UX 11.0 on Trusted System. I have been searching the docs and the forum for quite a while to find some mention of where this actually occurs and if there is a way to substitute a new program to accept or reject user picked passwords.
Thanks,
Eric
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 06:27 AM
08-28-2002 06:27 AM
Re: Lame password checking.
AFAIK, the only way to do this would be to write a wrapper script around the passwd command that will do the checking & accept/reject the supplied PW before it's actually passed to passwd.
Search the forum, there have been several threads on this subject in the last 6 mos or so.
Rgds,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 07:05 AM
08-28-2002 07:05 AM
Re: Lame password checking.
Also I occasionally take a look through the bad login attempts with lastb command as you can often locate any users here that use simple passwords as they will invariablly use a password as their login by mistake at some point. You can then try and work out who and issue a friendly reminder.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 07:13 AM
08-28-2002 07:13 AM
Re: Lame password checking.
Any examples out there?
Eric
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 08:00 AM
08-28-2002 08:00 AM
Re: Lame password checking.
This is probably undocumented, but have a look at editing the file
/tcb/files/auth/system/default
- specifically the line that reads:
:u_restrict:u_nullpw@:u_genchars@:u_genletters:
I can't remember what combination there is, but you can specify minimum length, min number of letters, minimum number of numbers, and even requires non-char, non-int value (such as an "_" or a ":").
Also, you may want to download Crack! or John the Ripper, which are password cracking tools, and running them once a month with a script that emails the offensive... I mean offending ;-) user that his password sux and he needs to change it - but that's my BOFH side talking.
Cheers!
James
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 08:02 AM
08-28-2002 08:02 AM
Re: Lame password checking.
Cheers!
James
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 08:52 AM
08-28-2002 08:52 AM
Re: Lame password checking.
The following doc (along with the man page for default(4) and prpwd(4)) explains the entries found in the system/default file -> KBRC00008662.
Password triviality checks for the following: login names or circular shifts of login names, palindromes or any word recognised by spell.
Unfortunately the standard spell dictionary is of benefit for password checking as passwords must contain at least one non-alpha character. It is therefore necessary to create a specialist dictionary containing all the permutations that you wish to check for, ie replacing all the letter 'i's with 1's and similar substitutions.
I'd also suggest you check the man page for security (check docs.hp.com as it is currently only documented at 11i I believe) as there are some features that could be useful (if you have the latest pam patch)
regards,
Darren.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2002 09:39 AM
08-28-2002 09:39 AM
Re: Lame password checking.
Found a PAM module called pam_passwdqc (Google search for it.. even supports HP-UX) that does exactly what I want!
FYI.. u_genchar etc. controlls wether or not the user can pick that option (i.e. "Generate character password", "Generate prononcable", etc.)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-01-2002 01:23 AM
09-01-2002 01:23 AM
SolutionA site's security policies sometimes require new passwords
to contain specific numbers or types of characters, such as
at least two digits and at least one special character.
Resolution:
In addition to the standard password requirements,
optional entries in the file /etc/default/security specify
the minimum number of required characters of each type
(upper case characters, lower case characters, digits
and special characters) in a new password.
PASSWORD_MIN_UPPER_CASE_CHARS=N
PASSWORD_MIN_LOWER_CASE_CHARS=N
PASSWORD_MIN_DIGIT_CHARS=N
PASSWORD_MIN_SPECIAL_CHARS=N
The default value for N is 0. These parameters have
effect only when a password is changed. On untrusted
systems, these parameters do not apply to the root user.
The file /etc/default/security should be owned by root and
have 0644 permissions.
As an example, to require passwords at least 8 characters
long, composed of at least 5 upper case characters, 2
lower case characters and a digit, include the following
lines in /etc/default/security, as specified above:
PASSWORD_MIN_UPPER_CASE_CHARS=5
PASSWORD_MIN_LOWER_CASE_CHARS=2
PASSWORD_MIN_DIGIT_CHARS=1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-01-2002 03:54 AM
09-01-2002 03:54 AM
Re: Lame password checking.
Have you thought about LDAP login?
live free or die
harry
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-03-2002 06:27 AM
09-03-2002 06:27 AM
Re: Lame password checking.
Harry, I'm currently looking at LDAP-UX integration with Active Directory which would remove the password issue for me totally. I have to get the NT guys to do some stuff first, unfortunately..
Thanks for all the great info!
Eric