Fact-checked by Grok 2 weeks ago

passwd

The passwd command is a standard utility in Unix-like operating systems for updating user account passwords and managing associated password attributes. It allows regular users to change their own s, while the () can modify s for any account without needing the current . When invoked, passwd prompts for the existing (if required) and the new one twice for , then updates the encrypted in the /etc/shadow file after enforcing system-defined rules, such as minimum , avoidance of dictionary words, and restrictions on personal information. Beyond basic password changes, passwd supports administrative functions like locking or unlocking accounts by prefixing the password field with an , expiring passwords to force immediate changes on next , or deleting passwords to enable passwordless access. It also displays account status, including whether a password is set, locked, or rounded to the nearest whole day for aging purposes, and integrates with system-defined password aging policies, such as minimum and maximum days between changes. Historically rooted in early Unix systems, passwd originally used DES-based but now supports stronger methods like SHA-512, depending on the system's ENCRYPT_METHOD setting, to enhance security against brute-force attacks. This command is essential for user management and is available across major distributions, including , , and variants.

User Account Files

/etc/passwd File

The /etc/ file serves as the primary plain-text database for account information in operating systems, located at /etc/passwd and containing one line per user account. This file is world-readable to allow utilities and applications to access basic user details without elevated privileges. Each entry consists of seven colon-separated fields that define essential attributes for and . The first field is the username, a unique string limited to a maximum of 32 characters in modern systems, though historically restricted to eight. The second field, the password placeholder, originally held the encrypted password but now typically contains 'x' to indicate that actual password hashes are stored elsewhere. The third field is the user ID (UID), a numeric value starting at 0 for the root superuser and generally ranging from 1000 upward for regular users. The fourth field specifies the primary group ID (GID), another numeric identifier linking the user to their default group. The fifth field, known as the GECOS field, provides optional comma-separated comments such as the user's full name, office location, or contact details. The sixth field denotes the home directory path, where the user's personal files and environment are typically stored. Finally, the seventh field indicates the login shell, the command interpreter executed upon login, defaulting to /bin/sh if left empty. A representative entry might appear as follows:
user:x:1000:1000:User Name:/home/user:/bin/bash
In this example, "user" is the username, "x" marks the password placeholder, 1000 is both the UID and GID, "User Name" is the GECOS comment, "/home/user" is the home directory, and "/bin/bash" is the shell. During system authentication, the /etc/passwd file is consulted to retrieve the UID and GID for mapping user identities to processes and resources after successful login verification. With the adoption of shadow password suites, password validation occurs separately, leaving this file focused on non-sensitive metadata. The file is owned by the root user and maintains permissions of 644 (read and write for owner, read-only for group and others) to balance accessibility and protection.

/etc/shadow File

The /etc/shadow file is a text-based located at /etc/shadow in operating systems, designed to store sensitive password information and password aging metadata that cannot be safely kept in world-readable files. It enhances by separating hashed passwords from the publicly accessible /etc/passwd file, reducing the risk of unauthorized access to credential data. This file is owned by the and typically belongs to the shadow group, with permissions set to 640 (readable and writable by , readable by the shadow group) or 600 (readable and writable only by ), ensuring that only privileged processes can access its contents. Each line in the /etc/shadow file corresponds to a user account and consists of nine colon-separated fields, providing comprehensive details on password management. The fields are as follows:
FieldDescriptionExample Value
1. UsernameThe login name of the user, matching an entry in /etc/passwd.user
2. Encrypted passwordA hashed password using algorithms such as DES (traditional crypt), MD5 ($1$), SHA-256 ($5$), or SHA-512 ($6$); prefixed with the algorithm identifier, salt, and hash; disabled accounts use !, !!, or *.$6$salt$hashvalue
3. Last password changeNumber of days since January 1, 1970 (Unix epoch), when the password was last changed. A value of 0 means the password must be changed at the next login.18400
4. Minimum password ageMinimum number of days required between password changes; 0 allows immediate changes.0
5. Maximum password ageMaximum number of days a password remains valid before expiration; 99999 often indicates no expiration.99999
6. Password warning periodNumber of days to warn the user before password expiration.7
7. Password inactivity periodNumber of days after expiration before the account is locked.(empty)
8. Account expiration dateNumber of days since the epoch when the account expires.(empty)
9. ReservedA field for future use, typically left empty.(empty)
These fields enable fine-grained control over password policies, such as enforcing regular changes and automatic disabling to mitigate brute-force attacks and stale credentials. A representative entry might appear as:
user:$6$abc123$longhashhereabcde...:18400:0:99999:7:::
Here, the username is user; the encrypted uses SHA-512 ($6$) with abc123 and the subsequent ; the was last changed 18,400 days after the (around 2020); no minimum age is enforced; the expires after 99,999 days; warnings begin 7 days prior; and the remaining fields are empty, indicating no inactivity lock or account expiration. The /etc/shadow file integrates with /etc/passwd by having the latter's password field set to x, signaling authentication modules to consult /etc/shadow for verification. Programs like , , and , often via the Pluggable Authentication Modules () framework—specifically the pam_unix module—read this file to authenticate users against the stored hashes without exposing them system-wide. The shadow password system was introduced in the mid-1980s, first in ' , to address vulnerabilities in storing hashes within the readable /etc/passwd file, and was later standardized in System V Release 3.2 (1988) and adopted in BSD variants by 1990. This separation became a cornerstone of , influencing modern distributions and other systems.

The passwd Command

Syntax and Basic Usage

The passwd command is a setuid root binary located at /usr/bin/passwd, enabling non-root users to change their own passwords while allowing the root user to manage passwords for any user account. This design ensures that password updates, which require elevated privileges to modify system files, can be performed securely without granting full root access to ordinary users. The command integrates with Pluggable Authentication Modules (PAM) to handle authentication and enforce password policies during the change process. The basic syntax of the command is:
passwd [options] [username]
Omitting the username argument targets the current user's , making it suitable for interactive use by regular users. For , specifying a username allows changing another 's without needing the current of that . The command assumes the target is a local defined in the system's user database. In basic interactive usage, invoking passwd without options prompts the user first for their current (one attempt, skipped if run as ). It then requests the new twice for confirmation; if the entries match and satisfy PAM-enforced constraints—such as minimum length, complexity requirements, and aging rules—the command proceeds. Upon success, it computes and stores the hashed new in the /etc/shadow file. For scripted or non-interactive scenarios, the command supports reading the new from standard input, as in echo "newpassword" | passwd --stdin username, facilitating automation while still requiring appropriate privileges. The passwd command returns specific exit codes to indicate outcomes: 0 for , 1 for permission denied, 3 for unexpected failure with no changes made, and 4 for unexpected failure due to the password file being missing. These codes allow scripts and administrators to detect and handle errors programmatically.

Options and Advanced Features

The passwd command supports several command-line options that enable administrators to manage accounts beyond basic changes, such as locking, unlocking, or querying status. The -l or --lock option locks a account by prefixing the in the /etc/shadow file with an (!), preventing attempts until unlocked. Conversely, the -u or --unlock option removes this prefix to restore access. The -d or --delete option clears the password field, allowing without a , which is typically used for temporary access or in combination with other measures. To force a expiration, the -e or --expire option sets the last change date to zero in the shadow file, requiring an immediate change on next . The -S or --status option provides a report on the account's status, outputting details such as the username, status (e.g., P for set, L for locked, NP for no ), last change date, minimum days between changes, maximum days before expiration, warning days, and inactivity period; for example, user P 05/15/2023 0 99999 7 -1 indicates a set with no expiration constraints. When used with -a or --all, it reports status for all users. Administrators running as can specify a target username (e.g., passwd otheruser) to modify any account's without the current user's involvement. For non-interactive scripting, the --stdin option reads the new directly from standard input as a single line, facilitating automation while bypassing prompts. Additional administrative options allow direct manipulation of shadow file fields for password aging: -n or --mindays sets the minimum days required between password changes, -x or --maxdays establishes the maximum validity period, and -w or --warndays configures the advance warning days before expiration. These options update the corresponding fields in /etc/[shadow](/page/Shadow) without altering the itself. The passwd command integrates with Pluggable Authentication Modules () for advanced features like password quality enforcement, where modules such as pam_pwquality or pam_cracklib perform checks for strength, dictionary words, and complexity rules during password updates. For instance, pam_cracklib rejects passwords resembling entries or common patterns to mitigate brute-force risks. Input handling supports both cleartext passwords (prompted or via --stdin) and pre-encrypted hashes when provided by administrators, with managing the encryption using system-configured algorithms like SHA-512. Platform implementations vary slightly; in coreutils (common on distributions), options like -R or --root enable directory specification for restricted environments, while FreeBSD's passwd emphasizes / support with options like -l to update only local passwords and -y to force mode. These differences stem from project-specific enhancements, with BSD variants emphasizing / support. Common errors include "Authentication token manipulation error," which typically indicates failures in updating the shadow file due to permission issues (e.g., non-root access without ), full disk space, or filesystem read-only states; resolution often involves verifying write access to /etc/shadow and related directories.

Historical Development

Origins in Early Unix

The passwd system originated during the development of Unix at , part of , beginning in 1969 with initial work by on a computer. Unix evolved as a simplified alternative to the more complex system, on which Thompson and had previously collaborated, incorporating lessons in multi-user and file-based . By 1971, the first internal described a basic multi-user environment where user relied on a dedicated password file to support processes. The /etc/passwd file emerged as the core mechanism for user account management in early Unix, introduced around Version 3 in 1973 as an ASCII text file storing essential user details. Its original design featured colon-separated fields for each user, including the login name, encrypted password, user ID (UID), comment field (such as GCOS job information), home directory, and shell. The group ID (GID) field was added later in Version 7. Passwords were encrypted using an early one-way function based on a simulation of the M-209 cipher machine, where the password served as the key to encipher a constant value, producing an 8-character output stored in the file. This file was made world-readable to allow non-privileged programs, like the login(1) utility, to access user metadata such as UIDs and home directories for authentication and session setup, reflecting the simple security model of small-scale research systems at the time. Thompson and Ritchie, as primary architects, shaped this integrated approach to prioritize ease of implementation over stringent access controls. A key milestone came with the Seventh Edition of Unix in 1979, which introduced the seven-field format of /etc/passwd, adding the group ID (GID) field and integrating it more firmly with the login(1) program for verifying credentials during user sessions. However, the design exhibited initial limitations suited to its era: passwords lacked aging mechanisms or expiration policies, and the single, readable file combined authentication data with account information, creating risks as user bases grew beyond a handful of developers. These constraints stemmed from the system's origins in a trusted internal environment, where comprehensive separation of concerns was not yet prioritized.

Evolution to Shadow Passwords

The shadow password system emerged in the mid-1980s to address security limitations in the original /etc/passwd file, where encrypted passwords were world-readable, enabling offline cracking by any user. It was first implemented in during this period and introduced in 1987 by Julianne Frances Haugh for after experiencing a system break-in; this suite separated sensitive password data into the /etc/shadow file, restricted to root access only, while retaining user account details in /etc/passwd for non-privileged processes like getpwent(). The approach was later adopted in System V Release 3.2 in 1988 and BSD 4.3 Reno in 1990, becoming a standard feature across Unix variants by the early . These functions for accessing the shadow database were formalized in the POSIX.1-2008 standard to ensure portability. Key drivers for the shift included heightened awareness of vulnerabilities highlighted by password-cracking tools, notably version 4.1 released in 1992 by Alec Muffett, which exploited the readability of DES-encrypted passwords in /etc/passwd to perform and brute-force attacks efficiently on commodity hardware.) This underscored the need for password aging mechanisms—tracking last change dates, minimum age, and expiration—to encourage frequent updates and limit reuse, features natively supported in /etc/shadow. Concurrently, the 1990s saw a transition from the vulnerable DES-based crypt(3) algorithm to hashing in many Unix systems, providing longer hashes (128 bits) and slower computation to deter exhaustive searches. Standardization efforts aligned shadow passwords with cryptographic requirements, including compliance for validated hashing modules used in federal systems, ensuring robust protection against key recovery attacks. In the 1990s, integration with networked authentication protocols like (Network Information Service) and LDAP (Lightweight Directory Access Protocol) extended shadow functionality to distributed environments, allowing synchronized password management across multiple hosts without exposing hashes over the network. Modern adaptations have focused on enhancing policy enforcement and resilience; the libpwquality library, developed in the early by , provides APIs for checking against configurable rules like scores and cracklib dictionaries during passwd operations. In the , distributions began adopting newer hashing: switched to yescrypt (a memory-hard ) as default in 2021, and added support in 2024 (version 8.10), both providing stronger protection against parallel attacks. support remains limited outside specialized modules. Along this timeline, the 2000s marked the widespread maturation of Pluggable Authentication Modules (PAM), first developed by in 1994, integrated into 2.6 in 1997, and adopted in open-source distributions starting in 1996, which replaced direct /etc/shadow access with modular interfaces for authentication, enabling extensions like multi-factor support without altering core files.

Security Considerations

Vulnerabilities in Traditional Systems

In early Unix systems, the /etc/ file stored encrypted alongside user account details in a world-readable format, enabling any local user or attacker with to copy the password hashes for offline cracking attempts. This design choice, intended to support utilities like that required to , exposed the system to significant risks, as attackers could extract and analyze the hashes without needing ongoing system access. The traditional encryption relied on the DES-based crypt() function, which used a 12-bit to vary the output and deter precomputed attacks; however, this short salt length proved insufficient against attacks, as it limited the number of unique hash variations to just 4,096 per , allowing attackers to generate feasible tables for common passwords. The crypt() algorithm itself was vulnerable due to its reliance on a modified encryption of a fixed 64-bit repeated 25 times, which was computationally inexpensive to reverse with growing capabilities by the early . Tools like , first released in 1996, specifically targeted these DES-based hashes from /etc/passwd files, enabling efficient brute-force and dictionary attacks that could crack weak or common passwords in hours or days on contemporary hardware. Variants of further optimized for DES cracking, demonstrating how the exposed, unsalted-equivalent hashes facilitated rapid compromise of user accounts. Although traditional systems included basic password aging mechanisms in the /etc/passwd file, their world-readable nature made them insecure, often leading to stale passwords that users rarely updated, increasing the likelihood of compromise from attacks or reused credentials. This gap contributed to historical incidents, such as the 1988 , which exploited weak default passwords like "guest" or simple variants of usernames to propagate across Unix networks, infecting an estimated 10% of the at the time. The passwd command's setuid root privilege allowed it to modify protected files like /etc/passwd, but this elevated execution model created risks for local if misconfigured, such as through improper permissions on supporting libraries or environment variables that could be manipulated by unprivileged users. In pre-2000 BSD variants, buffer overflows in the passwd —particularly when handling long GECOS fields or specifications—enabled local attackers to overwrite and execute arbitrary as , as seen in vulnerabilities affecting BSD 4.3 and earlier releases. These flaws in crypt() and related components, along with exposed files, have been linked to real-world reconnaissance in breaches where /etc/passwd leaks aided targeted or brute-force attempts against enumerated usernames. To address these issues, the shadow password system was introduced to segregate sensitive data.

Modern Best Practices

In modern Linux systems, password hashing for the /etc/shadow file should employ strong, adaptive algorithms to resist brute-force attacks, such as Argon2id, PBKDF2 with at least 600,000 iterations, bcrypt, or scrypt, as recommended by the OWASP Password Storage Cheat Sheet. Algorithms like MD5 and DES-based crypt must be avoided due to their vulnerability to modern hardware. Configuration is typically set in /etc/login.defs using the ENCRYPT_METHOD directive, for example, ENCRYPT_METHOD SHA512 for systems supporting SHA-512, which provides 256-bit security equivalent when combined with sufficient salt and rounds. Newer distributions may prefer yescrypt for its memory-hard properties, enhancing protection against GPU-accelerated cracking. Access controls for password files are essential to prevent unauthorized reads. The /etc/shadow file should have permissions set to 600 (readable and writable only by ) or 640 (readable by the group) to restrict access while allowing necessary operations, minimizing exposure in compromised environments. Integration with Pluggable Authentication Modules () via pam_pwquality enforces robust policies, such as a minimum length of 12 characters, requirements for diverse character classes (e.g., uppercase, lowercase, digits, symbols), and prohibition of password reuse within the last 5 changes. For , can stack modules like pam_google_authenticator alongside local passwords, ensuring layered security without relying solely on /etc/shadow. When using the passwd command, interactive mode is preferred for user-driven changes to avoid exposing passwords in process lists or logs; the --stdin option should only be used in secure, automated scripts with input from protected sources like /dev/urandom or encrypted vaults, and never in multi-user or networked contexts. Regular integrity audits are recommended using tools like pwck, which verifies consistency between /etc/passwd and /etc/shadow, checking for valid fields, duplicate entries, and proper formatting to detect tampering. For networked environments, local /etc/passwd and /etc/shadow files should not be directly exposed over protocols like NFS; instead, implement centralized authentication using integrated with or LDAP backends to manage credentials remotely while caching for offline access. This approach reduces the by avoiding replication of sensitive files across hosts. These practices align with NIST SP 800-63B guidelines (revision 4, 2024), which emphasize verifier-side storage of salted hashes resistant to offline attacks, minimum lengths of 8 characters for user-chosen passwords (with encouragement for longer passphrases up to 64 characters), avoidance of composition rules, and blacklisting of compromised passwords without mandatory periodic changes. Regarding post-quantum threats, memory-hard functions like or yescrypt in PAM configurations provide forward resistance, as they complicate exploitation on quantum hardware.

References

  1. [1]
    passwd(1) - Linux manual page - man7.org
    passwd command changes passwords for user accounts. · passwd also changes the account or associated password validity period. · Password Changes If the account ...
  2. [2]
    Managing Linux users with the passwd command - Red Hat
    Jan 1, 2021 · The passwd command changes passwords for user accounts. A normal user may only change the password for their own account, while the superuser may change the ...
  3. [3]
    passwd - man pages section 1: User Commands - Oracle Help Center
    The passwd command changes the password or lists password attributes associated with the user's login name . Additionally, authorized users can use passwd ...
  4. [4]
    Using the passwd command - IBM
    The passwd command changes the login password or password phrase for the user ID specified. If userid is omitted, the login name associated with the current ...
  5. [5]
    passwd(5) - Linux manual page - man7.org
    The /etc/passwd file is a text file that describes user login accounts for the system. It should have read permission allowed for all users (many utilities, ...
  6. [6]
    Understanding the /etc/passwd File - Linuxize
    Dec 1, 2019 · /etc/passwd is a plain text-based database that contains information for all user accounts on the system. It is owned by root and has 644 permissions.
  7. [7]
    Understanding the /etc/passwd File - phoenixNAP
    Jul 13, 2023 · The /etc/passwd file is a plain text file with information for all user accounts. It includes a list of user accounts on the system, as well as details such as ...What Is /etc/passwd File? · How to Read /etc/passwd File? · Method 5: Text Editor
  8. [8]
    shadow(5) - Linux manual page - man7.org
    Each line of this file contains 9 fields, separated by colons (“:”), in the following order: login name It must be a valid account name, which exists on the ...
  9. [9]
    Understanding the /etc/shadow File - Linuxize
    Dec 27, 2019 · /etc/shadow is a text file that contains information about the system's users' passwords. It is owned by user root and group shadow, and has 640 permissions.
  10. [10]
    6.3.2.2. /etc/shadow | Red Hat Enterprise Linux | 4
    Feb 11, 2005 · /etc/shadow, readable only by root, stores password and aging info for each user, including encrypted passwords and password change dates.
  11. [11]
    Understanding /etc/shadow file format on Linux - nixCraft
    Sep 26, 2025 · The /etc/shadow is a text-based password file. The shadow file stores the hashed passphrase (or “hash”) format for Linux user account with additional ...
  12. [12]
    Description - man pages section 4: File Formats
    /etc/shadow is an access-restricted file storing encrypted passwords and related info. It has fields like username, password, lastchg, min, max, warn, inactive ...
  13. [13]
    2 Authentication with PAM - SUSE Documentation
    pam_unix checks the user's login and password against /etc/passwd and /etc/shadow . The whole stack of auth modules is processed before sshd gets any ...
  14. [14]
    Anatomy of a Linux Pluggable Authentication Modules (PAM ...
    Jul 29, 2020 · For example, when verifying a password, the user might be defined in the local /etc/passwd and /etc/shadow files, or they might only be defined ...
  15. [15]
    UNIX: The /etc/shadow File in Depth - MangoLassi
    Feb 15, 2016 · UNIX History Lesson: The shadow password system was first introduced in the mid-1980s by Sun's SunOS UNIX system and by 1990 was widely copied ...Missing: 1987 | Show results with:1987
  16. [16]
    [PDF] Introduction to the Shadow Password Suite - USENIX
    The Shadow Password Suite began as a library providing the routines required for the /etc/shadow file by the Unix[1] System V Release 3.2 operating system.
  17. [17]
    When did Unix stop storing passwords in clear text?
    Sep 21, 2019 · Unix started using hashing in Unix Third Edition, but the /etc/shadow file, which moved passwords to a separate file, appeared in the mid-1980s.Difference between ! vs !! vs * in /etc/shadowEvolution of Operating systems from UnixMore results from unix.stackexchange.comMissing: BSD | Show results with:BSD
  18. [18]
    How to make setuid / suid shell scripts work the way setuid binaries ...
    Aug 6, 2024 · This is contrary to how setuid is handled for binaries (e.g., /usr/bin/passwd ), which run as the user that owns them, regardless of which user ...
  19. [19]
    pam_pwquality(8) - Linux man page - Die.net
    The first action is to prompt for a single password, check its strength and then, if it is considered strong, prompt for the password a second time (to verify ...
  20. [20]
    Features/PasswordQualityChecking - Fedora Project Wiki
    When passwords are changed through the PAM (Pluggable Authentication Modules) with the passwd command pam_cracklib or pam_passwdqc modules are used for this ...
  21. [21]
  22. [22]
    Users getting message "passwd: Authentication token manipulation ...
    Aug 6, 2024 · passwd: Authentication token manipulation error root can change passwords for local users. Newly added users can also change their password.
  23. [23]
    [PDF] The UNIX Time- Sharing System
    This paper discusses the nature and implementation of the file system and of the user command interface. Key Words and Phrases: time-sharing, operating system, ...Missing: /etc/ history
  24. [24]
    Unix Manual, first edition - Nokia
    The first edition of the Unix Programmer's Manual, dated November 3, 1971, is available here in image, Postscript, and PDF format.
  25. [25]
    [PDF] UNIX Programmer's Manual: Third Edition - Free
    Feb 5, 1973 · the user must supply a password. If the password is correct, su will execute the shell with the. UID set to that of the super-user. To ...
  26. [26]
    [PDF] Password Security: A Case History
    This paper describes the history of the design of the password security scheme on a remotely accessed time- sharing system. The present design was the ...
  27. [27]
    crypt(3) - Linux manual page - man7.org
    crypt() is the password hashing function. It is based on the Data Encryption Standard algorithm with variations intended (among other things) to discourage use ...Synopsis Top · Description Top · Notes Top
  28. [28]
    Chapter 4. Hardening Your System with Tools and Services | 7
    The pam_pwquality module is used to check a password's strength against a set of rules. Its procedure consists of two steps: first it checks if the provided ...
  29. [29]
    passlib.hash.des_crypt - DES Crypt - Read the Docs
    The 12-bit salt is considered to small to defeat rainbow-table attacks (most modern algorithms provide at least a 48-bit salt). The fact that it only uses ...
  30. [30]
    Of History & Hashes: A Brief History of Password… - TrustedSec
    May 30, 2015 · ... password hash. In the classic DES Unix password hash scheme, a 12 bit random number was tacked on to increase the storage space required for ...Missing: Third TUHS
  31. [31]
    [PDF] UNIX Password Encryption Considered Insecure - phwl
    the DES algorithm in the UNIX crypt() function lies in the salting of the encryption. Stored together with the encrypted password is a 12-bit salt encoded.Missing: weaknesses | Show results with:weaknesses
  32. [32]
    john-users - Re: When was John created? - Openwall
    Sep 10, 2015 · ... date of John the Ripper, but have so far been unsuccessful. John the Ripper 1.0 was released in 1996 as a drop-in replacement for Cracker ...
  33. [33]
    John the Ripper documentation - Openwall
    John the Ripper is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS.Examples · Command line options · FAQ · Cracking modesMissing: 1996 | Show results with:1996
  34. [34]
    The secrets of password aging on Unix systems - Network World
    Apr 10, 2017 · This particular user can see that his/her password was just recently changed (hopefully, they knew that) and that it expires in another month.Missing: lack | Show results with:lack
  35. [35]
    The Morris Worm: how it Affected Computer Security and ... - People
    Dec 24, 2000 · The worm took advantage of the exploits in Unix's sendmail, fingerd, rsh/rexec and weak passwords. It only affected DEC's VAX and Sun ...
  36. [36]
    How does the 'passwd' command gain root user permissions?
    Nov 9, 2013 · How does Linux know that it has to give euid 0 (uid of root) to only certain process like passwd, setuid, etc. If a process can gain root ...why do we need the SUID permission? [closed]How passwd command from non-root account succeedsMore results from unix.stackexchange.com
  37. [37]
    bsd bsd 4.3 vulnerabilities and exploits - Vulmon
    Buffer overflow in passwd in BSD based operating systems 4.3 and previous versions allows local users to gain root privileges by specifying a long shell or ...
  38. [38]
    What can hackers do with ability to read /etc/passwd?
    Jun 30, 2015 · The reason for this was that /etc/passwd needed to be world readable for tools like 'finger' and 'ident' to work. Once passwords were segregated ...Privilege escalation using passwd fileHow can I keep usernames out of /etc/passwd on LINUX [duplicate]More results from security.stackexchange.com
  39. [39]
    Password Storage - OWASP Cheat Sheet Series
    This cheat sheet advises you on the proper methods for storing passwords for authentication. When passwords are stored, they must be protected from an attacker.Background · Methods for Enhancing... · Password Hashing Algorithms
  40. [40]
    login.defs(5) - Linux manual page - man7.org
    ENCRYPT_METHOD (string) This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line).
  41. [41]
    etc/shadow permissions security best practice (000 vs. 600 vs. 640)
    Oct 30, 2019 · The idea behind setting /etc/shadow permissions to 000 is to protect that file from being accessed by daemons, even when running as root.Why would 000 on /etc/shadow permissions lead to me not being ...permissions on /etc/shadow - Unix & Linux Stack ExchangeMore results from unix.stackexchange.com
  42. [42]
    Creating a Password Policy in Linux - Putorius
    Mar 24, 2019 · Use `pam_pwquality` to set password policies in Linux. Options include `minlen`, `ucredit`, `dcredit`, `ocredit`, and `minclass` to configure  ...
  43. [43]
  44. [44]
    Chapter 3. Understanding SSSD and its benefits
    With SSSD, it is not necessary to maintain both a central account and a local user account for offline authentication. The conditions are: In a particular ...
  45. [45]
    NIST Special Publication 800-63B
    This document provides recommendations on types of authentication processes, including choices of authenticators, that may be used at various Authenticator ...4.2.2 · 4.3.2