HPE GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Shadow/LDAP password encryption/aging + not up...
Operating System - HP-UX
1830872
Members
2218
Online
110017
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-11-2004 09:10 AM
10-11-2004 09:10 AM
Shadow/LDAP password encryption/aging + not updating shadowlastchange
Hello All,
I have shadowPW, ldapux, related software bundles, and patches installed on our HP-UX 11.11 machine. I've been trying to get password encryption (currently being stored in the LDAP server in clear text) and password aging/shadowLastChange update working under OpenLDAP.
The password encryption isn't so much of an issue as I do have very strict ACL's in place on the LDAP server and once this is ready for production I will be turning on SASL. However, if it is possible I'd like to get it working.
The password aging/shadowLastChange is another matter. When logging in as an LDAP user if the shadowMAX is expired I'm not being prompted to change the password and changing the password the shadowLastChange attribute is not being updated. I've done tcpdumps both on the HP-UX machine and on a working linux client and the only thing different is the call to update the shadowLastChange field.
Testing a local user with the shadowMAX expired the results are the same, I never get prompted to change the password (I did modify the shadowLastChange field by hand to -shadowMAX -1). I also went in through SAM to see if maybe there was something I forgot to do (or special with HP-UX/Shadow) and turned on password aging there. It used the same password aging policy as prior to shadowPW....password aging parameters located in the password field.
Any help, or just a shove in the right direction would be greatly appreciated. If any more information or software/patch version are needed just let me know. I'd much rather get this working with OpenLDAP.
- Chris
I have shadowPW, ldapux, related software bundles, and patches installed on our HP-UX 11.11 machine. I've been trying to get password encryption (currently being stored in the LDAP server in clear text) and password aging/shadowLastChange update working under OpenLDAP.
The password encryption isn't so much of an issue as I do have very strict ACL's in place on the LDAP server and once this is ready for production I will be turning on SASL. However, if it is possible I'd like to get it working.
The password aging/shadowLastChange is another matter. When logging in as an LDAP user if the shadowMAX is expired I'm not being prompted to change the password and changing the password the shadowLastChange attribute is not being updated. I've done tcpdumps both on the HP-UX machine and on a working linux client and the only thing different is the call to update the shadowLastChange field.
Testing a local user with the shadowMAX expired the results are the same, I never get prompted to change the password (I did modify the shadowLastChange field by hand to -shadowMAX -1). I also went in through SAM to see if maybe there was something I forgot to do (or special with HP-UX/Shadow) and turned on password aging there. It used the same password aging policy as prior to shadowPW....password aging parameters located in the password field.
Any help, or just a shove in the right direction would be greatly appreciated. If any more information or software/patch version are needed just let me know. I'd much rather get this working with OpenLDAP.
- Chris
Never jump into a foxhole with someone braver than you!
1 REPLY 1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-28-2004 05:39 AM
10-28-2004 05:39 AM
Re: Shadow/LDAP password encryption/aging + not updating shadowlastchange
Hi Chris,
First, I'm assuming that you're using native LDAP-UX, and not the NIS/LDAP Gateway. Assuming so...
The /etc/shadow co-existance feature of LDAP-UX does not work as you might be assuming. /etc/shadow is only supported for applying security policy to local accounts. The shadow schema in LDAP is not used by LDAP-UX, for number of reasons, mostly related to security and managability.
The goal of the LDAP-UX product is to defer to a centrally managed security policy, which means it needs to be enforced by the LDAP server, not the HP-UX host. Configuring pam_ldap is your first step. But you also need to enable password/account policy enforcement on the LDAP server. I'm not aware of a specific plugin for OpenLDAP that supports the /etc/shadow schema, but I'm guessing one does exist. And I'm also farily certain that a plugin exists to support the IETF password policy model (http://www.ietf.org/internet-drafts/draft-behera-ldap-password-policy-08.txt) that is under development (but I don't have a pointer to any plugin specifically.)
Anyway, hope that helps.
Bob
First, I'm assuming that you're using native LDAP-UX, and not the NIS/LDAP Gateway. Assuming so...
The /etc/shadow co-existance feature of LDAP-UX does not work as you might be assuming. /etc/shadow is only supported for applying security policy to local accounts. The shadow schema in LDAP is not used by LDAP-UX, for number of reasons, mostly related to security and managability.
The goal of the LDAP-UX product is to defer to a centrally managed security policy, which means it needs to be enforced by the LDAP server, not the HP-UX host. Configuring pam_ldap is your first step. But you also need to enable password/account policy enforcement on the LDAP server. I'm not aware of a specific plugin for OpenLDAP that supports the /etc/shadow schema, but I'm guessing one does exist. And I'm also farily certain that a plugin exists to support the IETF password policy model (http://www.ietf.org/internet-drafts/draft-behera-ldap-password-policy-08.txt) that is under development (but I don't have a pointer to any plugin specifically.)
Anyway, hope that helps.
Bob
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP