Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
CARE

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Glossary
MoreInfo
Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
FAQ
Copyright Info
Terms of Use
Privacy Info
Disclaimer
WorkBoard
Thanks
Donations
Advertising
Masthead / Impressum
Your Account

Communication
Feedback
Forums
Private Messages
Surveys

Features
HOWTOs
News Archive
Submit News
Topics
User Articles
Web Links

Google
Google


The Web
linux-tutorial.info

Who's Online
There are currently, 196 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here

  

passmass



SYNOPSIS

       passmass [ host1 host2 host3 ...  ]


INTRODUCTION

       Passmass  changes a password on multiple machines.  If you
       have accounts on several machines that do not share  pass­
       word  databases,  Passmass  can  help you keep them all in
       sync.  This, in turn, will make it easier to  change  them
       more frequently.

       When  Passmass runs, it asks you for the old and new pass­
       words.  (If you  are  changing  root  passwords  and  have
       equivalencing,  the  old  password  is not used and may be
       omitted.)

       Passmass understands the "usual" conventions.   Additional
       arguments  may  be used for tuning.  They affect all hosts
       which follow until another  argument  overrides  it.   For
       example,  if  you are known as "libes" on host1 and host2,
       but "don" on host3, you would say:

            passmass host1 host2 -user don host3

       Arguments are:

              -user
                  User  whose  password  will  be  changed.    By
                  default, the current user is used.

              -rlogin
                  Use rlogin to access host.  (default)

              -slogin
                  Use slogin to access host.

              -telnet
                  Use telnet to access host.

              -program

                  Next  argument  is  a program to run to set the
                  password.  Default is "passwd".   Other  common
                  choices  are "yppasswd" and "set passwd" (e.g.,
                  VMS hosts).  A program name such  as  "password
                  fred"  can  be  used  to create entries for new
                  accounts (when run as root).

                  tionally prompted for a root password which  is
                  used  to  su after logging in.  root's password
                  is changed rather than  the  user's.   This  is
                  useful for hosts which do not allow root to log
                  in.


HOW TO USE

       The best way to run Passmass is to put the  command  in  a
       one-line  shell  script  or alias.  Whenever you get a new
       account on a new machine, add the appropriate arguments to
       the command.  Then run it whenever you want to change your
       passwords on all the hosts.


CAVEATS

       Using the same password on multiple hosts  carries  risks.
       In  particular, if the password can be stolen, then all of
       your accounts are at risk.  Thus, you should not use Pass­
       mass in situations where your password is visible, such as
       across a network which hackers are known to eavesdrop.

       On the other hand, if you have enough accounts  with  dif­
       ferent  passwords,  you may end up writing them down some­
       where - and that can be a security problem.  Funny  story:
       my college roommate had an 11"x13" piece of paper on which
       he had listed accounts and passwords all across the Inter­
       net.   This was several years worth of careful work and he
       carried it with him everywhere he went.  Well one day,  he
       forgot  to  remove  it from his jeans, and we found a per­
       fectly blank sheet of paper when we took out the wash  the
       following day!


SEE ALSO

       "Exploring  Expect:  A  Tcl-Based  Toolkit  for Automating
       Interactive Programs" by Don Libes, O'Reilly  and  Associ­
       ates, January 1995.


AUTHOR

       Don Libes, National Institute of Standards and Technology

                          7 October 1993              PASSMASS(1)
  

Looking for a "printer friendly" version?


Login
Nickname

Password

Security Code
Security Code
Type Security Code


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!


Amazon Wish List

Did You Know?
The Linux Tutorial can use your help.


Friends



Tell a Friend About Us

Bookmark and Share



Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.06 Seconds