您好,登錄后才能下訂單哦!
修改用戶密碼時(shí)提示如下報(bào)錯(cuò):
passwd: Authentication token manipulation error
解決辦法
檢查/etc/pam.d/passwd、/etc/pam.d/system-auth以下配置是否存在:
1、cat /etc/pam.d/passwd
#%PAM-1.0 auth required pam_stack.so service=system-auth account required pam_stack.so service=system-auth password required pam_stack.so service=system-auth password required pam_cracklib.so dcredit=-1 ucredit=-1 ocredit=-1 lcredit=-1 minlen=6 password required pam_unix.so use_authtok nullok md5 password required pam_unix.so remember=5 use_authtok 最后這三行有些老系統(tǒng)不支持,設(shè)置后也會(huì)導(dǎo)致上面的報(bào)錯(cuò) |
2、cat /etc/pam.d/system-auth
#%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authconfig is run. auth required /lib/security/$ISA/pam_env.so auth sufficient /lib/security/$ISA/pam_unix.so likeauth nullok auth required /lib/security/$ISA/pam_deny.so account required /lib/security/$ISA/pam_unix.so account sufficient /lib/security/$ISA/pam_succeed_if.so uid < 100 quiet account required /lib/security/$ISA/pam_permit.so password requisite /lib/security/$ISA/pam_cracklib.so retry=3 password sufficient /lib/security/$ISA/pam_unix.so nullok use_authtok md5 shadow password required /lib/security/$ISA/pam_deny.so session required /lib/security/$ISA/pam_limits.so session required /lib/security/$ISA/pam_unix.so |
3、也可以直接修改shadow文件密碼串
方法一)
perl -e 'print crypt("password","\$1\$2BDxrkQc\$"),"\n"'
注:這里的2BDxrkQc,是shadow中salt($3)的內(nèi)容,如果要隨機(jī)生成salt,可使用方法二。
方法二)
echo "password" | openssl passwd -1 -salt $(< /dev/urandom tr -dc '[:alnum:]' | head -c 32) -stdin
免責(zé)聲明:本站發(fā)布的內(nèi)容(圖片、視頻和文字)以原創(chuàng)、轉(zhuǎn)載和分享為主,文章觀點(diǎn)不代表本網(wǎng)站立場,如果涉及侵權(quán)請聯(lián)系站長郵箱:is@yisu.com進(jìn)行舉報(bào),并提供相關(guān)證據(jù),一經(jīng)查實(shí),將立刻刪除涉嫌侵權(quán)內(nèi)容。