Bruno Negrao wrote:
Yes Nate, I checked it - since the user is created, if I cut and paste the
crypted password from the /etc/shadow of the origin machine and paste it to
the /etc/shadow of the second machine, the user can logon with the same
password!!

A better way might be to use usermod with the '-p' option. There is
more opportunity to destroy the shadow password file using an editor.

root # usermod -p 'some encrypted password' username

This will allow you to script the whole process as well.

for user in user1 user2 user3
do
    password=$(egrep "^$user:" old_shadow_file | cut -d: -f2)
    usermod -p "$password" $user
done

Best Regards
Willem Brown
--
iServe (Pty) Ltd.
http://www.iserve.co.za/

Tel: +27 (0)11 258-7800
Fax: +27 (0)11 258-7888
Cell: +27 (0)83 271-0839



--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to