Zip Linux Password

1 view
Skip to first unread message

Jessica Wilson

unread,
Aug 3, 2024, 5:38:55 PM8/3/24
to laycopine

2. Type in the passwd command to start the password change process. Passwd may look like a spelling mistake, but it is the command to work with passwords on the terminal.

4. Type in your new password, press Enter. Then type it in again to confirm that it is correct. Note that Linux will not echo (print) the password to the screen, nor will it show any asterisk indicating password length.

There may come a time when a user account will need to be temporarily locked, preventing them from logging in. For this we can use the -l argument to lock the account. Here we are locking Tom out of their account.

If you want to list the password status for all users, then the -a switch is just the thing. This switch is used with -S to list the status of every user, even the users that you never knew existed. These extra users are used for specific tasks, such as printers and networking.

Les Pounder is an associate editor at Tom's Hardware. He is a creative technologist and for seven years has created projects to educate and inspire minds both young and old. He has worked with the Raspberry Pi Foundation to write and deliver their teacher training program \"Picademy\"."}), " -0-10/js/authorBio.js"); } else console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); Les PounderSocial Links NavigationLes Pounder is an associate editor at Tom's Hardware. He is a creative technologist and for seven years has created projects to educate and inspire minds both young and old. He has worked with the Raspberry Pi Foundation to write and deliver their teacher training program "Picademy".

Multitasking refers to an operating system in which multiple processes, also called tasks, can execute (i.e., run) on a single computer seemingly simultaneously and without interfering with each other. Each process has the illusion that it is the only process on the computer and that it has exclusive access to all the services of the operating system.

Because there could be multiple users on the system, it is, therefore, necessary to manage their authentication. Authentication is primarily handled with passwords and public keys. One of the many tools available we use to set up passwords is the passwd command.

The passwd command changes passwords for user accounts. A normal user may only change the password for their own account, while the superuser may change the password for any account. passwd also changes the account or associated password validity period. This task is achieved through calls to the Linux-PAM and libuser API.

The -l option is used to lock the password of a specified account, and it is available to root only. The result is that the user cannot use the password to log in to the system but can use other means such as SSH public key authentication.

This option is used to disable an account after the password has been expired for a number of days. After a user account has had an expired password for INACTIVE days, the user may no longer sign on to the account.

I work as Unix/Linux Administrator with a passion for high availability systems and clusters. I am a student of performance and optimization of systems and DevOps. I have passion for anything IT related and most importantly automation, high availability, and security. More about me

The opinions expressed on this website are those of each author, not of the author's employer or of Red Hat. The content published on this site are community contributions and are for informational purpose only AND ARE NOT, AND ARE NOT INTENDED TO BE, RED HAT DOCUMENTATION, SUPPORT, OR ADVICE.

After a reboot of the computer the client always wants to authorizes through the browser. (When setting up the client, It did not ask me for username or password, only for the server address).
There is an entry in my kdewallet (Contents tab) but in the Applications tab there is an entry only in the upper field ("These applications are currently connected to this wallet") and not the lower one ("These applications are authorized to acess this wallet"). This is weird, because I actually granted access to owncloud multiple times.
Syncing of my folders works fine once authorized.

Thank you @Robert_Grantham for your quick response! I have installed libgnome-keyring-common using the above command. (The funny thing is, the package seahorse depends on gnome-keyring but not on libgnome-keyring-common.)

Edit: I have to back up a little bit. The password is only remembered until I log out of the Ubuntu session. So it remembers the password when restarting the program but not when restarting the PC.

Sorry @Fresh_Dumbledore for taking over your thread. I was thinking we may be affected by the same bug. You said below that you already have all mentioned packages. But did you install gnome-keyring, or the KDE equivalent kwallet? See also here: github.com/frankosterfeld/qtkeychain/issues/45

I don't think that you can compare the windows and the linux clients, those are probably using completely different methods to save the password (I think something something like e.g. seahorse/gnome-keyring doesn't exist on windows).

When the desktop app tries to auth through the browser, it probably uses Oauth2 as the authentication path, instead of the locally stored password. Please try to disable the Oauth2 app in your owncloud installation, this should force the client to use the local password, e.g. from gnome keyring or KDE kwallet

This is inaccurate: sync client's OAuth2 integration is not orthogonal with the keychain component on your OS. The client does actually store there the refresh token that is used to grant a new auth. token and (like the user password) keep itself authorized. Disabling OAuth2 on the server should not cause the client to behave differently in this scenario.

well, on my 10.0.8 it does behave like this. Disabling Oauth2 causes the 2.4.1 client to use the local kwallet password on startup. In my case it is KDE (OpenSUSE Leap 423), which should be more or less the same as the Mint/Gnome scenario described here

I am not a regular user of any keyring solution but understand that the client does store its password in that keyring.
The problem is that I have activated autologin in my XFCE4(lightdm). Because of that the keyring popsup everytime and ask for my user accounts password.

To best manage your own user account or the accounts of other users, it is helpful to know the most important utilities of Linux. This includes passwd, which you can use to change your Linux password, among other things. You can learn the individual steps here.

The passwd program package, which allows you to easily change your own password or the passwords of an entire group, as well as set other commands, is included in most Linux installations. Our guide refers to the Ubuntu installations - Ubuntu is one of the most versatile, free distributions of Linux with long-term support and biannual updates.

If you want to change the password of another user, then you need the root privileges. This means that you are the only user of the computer who has unlimited rights to all system files and resources. Keep your password ready for this reason.

I had the same problem but tried something else. If you entered the root password at the beginning of installation then enter root as the user, and the root password you entered at the start of installation. That should work.

I checked more than half a century worth Unix experience and neither my colleagues, nor myself has ever set a password on a group (sg and gpasswd). What would be a typical use case for a group password or is it pretty much only there because of historic reasons?

I think they were a natural idea in mimicking the model of user's having passwords, that it made sense to duplicate that use case model to groups as well. But in practice they're really not all that useful for anything.

The idea with a group password is that if you needed to gain access to a particular group (one that you weren't listed as being a member of), you could do so using the newgrp command, and be challenged with a password to gain access to these alternative groups.

Most environments I've come across have typically put people in secondary groups, and then given these groups access to files on the filesystem, and this has satisfied pretty much all the usage that needs to occur.

With the advent of sudo additional permissions could be handed out on an as needed basis to groups, further undermining any use cases that group passwords may have provided. If you needed to allow users more permissions, it was much easier to create roles in sudo and then just allow there username or group that they were in, permissions to elevate there permissions so that they could perform a particular task.

Finally the ability to create Access Control Lists (ACLs) really gave the last bit of flexibility that the User/Group/Other permissions model couldn't provide alone, relegating any possible need for group passwords to obscurity.

Here's a practical use for group passwords, that I implemented for myself on our work server, since the logs indicated my account was being brute-forced (or could have been a dictionary attack).
I used ssh-keygen and puttygen respectively to generate key pairs for use from my workstation and home computer. The key I use from home requires a password. I added both of the public keys to the .ssh/authorized_keys, created a group marionette with a password and no members. As root I used visudo to add the following lines.

I have disabled my account's password, you no one can log into it that way. I now login only with my keys and entering the password-protected group with newgrp marionette allows me to become root using sudo -i.
Without the NOPASSWD: option it will require your user account password. If it is disabled and this group does not have NOPASSWD, you will not be able to sudo -i. It will also require your user account password if your command list does not have /bin/bash or whatever shell your root is using by default.

c80f0f1006
Reply all
Reply to author
Forward
0 new messages