Skip to Main Content

Infrastructure Software

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

users are unable to change their passwords

TamerElkadiMar 27 2018 — edited Mar 28 2018

Hello

Local users are getting permission denied when trying to change their passwords.

Users type passwd then enter their old password, after that they get a permission denied message.

cat /etc/default/passwd

#ident  "@(#)passwd.dfl 1.7     04/04/22 SMI"

#

# Copyright 2004 Sun Microsystems, Inc.  All rights reserved.

# Use is subject to license terms.

#

MAXWEEKS=

MINWEEKS=

PASSLENGTH=8

# NAMECHECK enables/disables login name checking.

# The default is to do login name checking.

# Specifying a value of "NO" will disable login name checking.

#

#NAMECHECK=NO

# HISTORY sets the number of prior password changes to keep and

# check for a user when changing passwords.  Setting the HISTORY

# value to zero (0), or removing/commenting out the flag will

# cause all users' prior password history to be discarded at the

# next password change by any user.  No password history will

# be checked if the flag is not present or has zero value.

# The maximum value of HISTORY is 26.

#

# This flag is only enforced for user accounts defined in the

# local passwd(4)/shadow(4) files.

#

HISTORY=12

#

# Password complexity tunables.  The values listed are the defaults

# which are compatible with previous releases of passwd.

# See passwd(1) and pam_authtok_check(5) for use warnings and

# discussion of the use of these options.

#

MINDIFF=3

MINALPHA=2

MINNONALPHA=1

MINUPPER=0

MINLOWER=0

MAXREPEATS=0

MINSPECIAL=0

MINDIGIT=0

#WHITESPACE=YES

#

#

# passwd performs dictionary lookups if DICTIONLIST or DICTIONDBDIR

# is defined. If the password database does not yet exist, it is

# created by passwd. See passwd(1), pam_authtok_check(5) and

# mkdict(1) for more information.

#

#DICTIONLIST=

#DICTIONDBDIR=/var/passwd

cat /etc/default/login

#ident  "@(#)login.dfl  1.14    04/06/25 SMI"

#

# Copyright 2004 Sun Microsystems, Inc.  All rights reserved.

# Use is subject to license terms.

# Set the TZ environment variable of the shell.

#

#TIMEZONE=EST5EDT

# ULIMIT sets the file size limit for the login.  Units are disk blocks.

# The default of zero means no limit.

#

#ULIMIT=0

# If CONSOLE is set, root can only login on that device.

# Comment this line out to allow remote login by root.

#

#CONSOLE=/dev/console

# PASSREQ determines if login requires a password.

#

PASSREQ=YES

# ALTSHELL determines if the SHELL environment variable should be set

#

ALTSHELL=YES

# PATH sets the initial shell PATH variable

#

#PATH=/usr/bin:

# SUPATH sets the initial shell PATH variable for root

#

#SUPATH=/usr/sbin:/usr/bin

# TIMEOUT sets the number of seconds (between 0 and 900) to wait before

# abandoning a login session.

#

TIMEOUT=300

# UMASK sets the initial shell file creation mode mask.  See umask(1).

#

#UMASK=022

# SYSLOG determines whether the syslog(3) LOG_AUTH facility should be used

# to log all root logins at level LOG_NOTICE and multiple failed login

# attempts at LOG_CRIT.

#

SYSLOG=YES

# SLEEPTIME controls the number of seconds that the command should

# wait before printing the "login incorrect" message when a

# bad password is provided.  The range is limited from

# 0 to 5 seconds.

#

#SLEEPTIME=4

# DISABLETIME  If present, and greater than zero, the number of seconds

# login will wait after RETRIES failed attempts or the PAM framework returns

# PAM_ABORT. Default is 20. Minimum is 0. No maximum is imposed.

#

DISABLETIME=20

# RETRIES determines the number of failed logins that will be

# allowed before login exits. Default is 5 and maximum is 15.

# If account locking is configured (user_attr(4)/policy.conf(4))

# for a local user's account (passwd(4)/shadow(4)), that account

# will be locked if failed logins equals or exceeds RETRIES.

#

#RETRIES=5

#

# The SYSLOG_FAILED_LOGINS variable is used to determine how many failed

# login attempts will be allowed by the system before a failed login

# message is logged, using the syslog(3) LOG_NOTICE facility.  For example,

# if the variable is set to 0, login will log -all- failed login attempts.

#

#SYSLOG_FAILED_LOGINS=5

Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on Apr 25 2018
Added on Mar 27 2018
5 comments
734 views