in reply to shadow passwd
This is just for generating the encrypted version of the plaintext password. Maybe you already knew that, but here it is anyway.my $plaintext = "tstpw82!"; srand(time() ^ ($$ + ($$ << 15))); my @chars = ('0'..'9','a'..'z','A'..'Z','!','+'); my $salt = $chars[int(rand(scalar @chars))] . $chars[int(rand(scalar @ +chars))]; print crypt($plaintext,$salt) . "\n";
To update shadow is a mission of it's own. Most of the time when I've done it in scripts, I use the following method:
Something like that... I'm sure some people will have plenty of stuff to say about this approach, but it works for me and I manage over 8000 user accounts. :)
... and no! That's not my real password in $plaintext! :)
update: In light of what cianoz wrote below, I must say that I was a bit one-track minded there. My post is valid for Solaris systems. :) I don't know if it's possible to implement MD5 passwords with some sort of PAM, and there's no such commmand as chpassword (I think).
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
RE: RE: shadow passwd
by Anonymous Monk on Oct 26, 2000 at 16:52 UTC |