- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Password History on Trusted Systems
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 02:57 PM
10-02-2001 02:57 PM
Password History on Trusted Systems
Thanks for you help in advance.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 03:02 PM
10-02-2001 03:02 PM
Re: Password History on Trusted Systems
All the passwd 'shadowed' data is in maintained in /tcb/files/auth/*.
Clay
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 03:07 PM
10-02-2001 03:07 PM
Re: Password History on Trusted Systems
I suppose I should add that this database does not know what the old passwds were; it only saves the old passwd hashes. If a user attempts to use an old passwd, crypt() is called using the 'salt' from each old entry and if the new passwd hash matches any of the old passwd hashes, the passwd is rejected.
Clay
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 03:23 PM
10-02-2001 03:23 PM
Re: Password History on Trusted Systems
Thank you for your prompt (immediate!!!) reply.
Let me elaborate further so that you might better understand the problem.
The password change (and reference to "crypt()" will occur on a central server for a series of trusted hosts; the central server itself is NOT a trusted host. For the sake of simplicity (11 lines of "C"; 100 lines of comments to accompany them), I am using a "static" salt.
I'm scanning the /tcb/files/auth/* directories but only see the "user" references. It is possible (but unlikely) that no password changes have taken place.
Perhaps I'm being dense?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 03:24 PM
10-02-2001 03:24 PM
Re: Password History on Trusted Systems
Knowledge Base (KB) document #KBRC00000915 provides some useful information, although you may already be aware of it:
/begin_quote/
Password history check of up to 10 passwords.
The system administrator can enable the password history feature to discourage users from reusing previously used passwords. To enable the password history feature, the system administrator should create a file
(or open the file if it already exists) named
/etc/default/security and append to it one line containing:
PASSWORD_HISTORY_DEPTH=number
The line contains three keywords: PASSWORD_HISTORY_DEPTH, =, and a decimal number which is the desired depth for the password history check. If the number is 2, the user's new password will be checked against two previously used passwords. One is the current password, and the other one is the password used before the current password. A configuration of password history depth of 2 prevents users from alternating between two passwords. The maximum password history depth supported is 10 and the minimum password history depth supported is 1. A depth configuration of more than 10 will be
treated as 10, and a depth configuration of less than 1 will be treated as 1.
The password history depth configuration is on a system basis and is supported in trusted system for users in files repository only. This feature does not support the users in NIS or NISPLUS repositories. Once the feature is enabled, all the users on the system are subject to the same check. If the password history configuration file /etc/default/security does not exist, or if the file exists but the required line is missing, or if the line exists but any of the three required keywords is missing, the password history check feature is automatically disabled. When the feature is disabled, the password history check depth is set to 1 and a password change is subject to all of the other rules for a new password including a check with the current password.
/end_quote/
...and from KB document #8606141855
/begin_quote/
The PASSWORD_HISTORY_DEPTH feature does not work correctly when
the initial user tcb u_pwd entry is equal to a asterisk (u_pwd=*).
This is the initial produced when using /usr/sbin/useradd to create
an account.
This is not a problem if SAM is used to create a user becauseaan initial password is assigned and therefore u_pwd=
...To repair a corrupted password history
database it is necessary to remove each file in
/tcb/files/auth/system/pwhist which has a corrupted user entry, or to remove all files in that directory. This destroys the password history maintained in those files. It does not affect the current passwords.
/end_quote/
Does this help?
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 03:30 PM
10-02-2001 03:30 PM
Re: Password History on Trusted Systems
I always appreciate a complete answer and am willing to scan through anything I might already know looking for what I don't.
In this case, you provided me with the very detail I had missed: "/tcb/files/auth/system/pwhist/* which contains the very "history" of passwords I was interested in.
Thanks very much.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-02-2001 03:42 PM
10-02-2001 03:42 PM
Re: Password History on Trusted Systems
...glad to have helped. I learned something alone the way, too, so thank YOU.
...JRF...