How to set a short password on Ubuntu?Ubuntu 14.04.1 howto set a short non complex password for very kiddies?Why does Ubuntu 12.04 have more stringent complexity requirements, and how to to remove them?How to clear password history?How do I create a short password in Ubuntu 16.04?Revert password back to originalSimple password problemAltering authentication process to incorporate PIN features.Why do I need a strong password for my Ubuntu user account?Having an Issue in restricting length of passwordLogin Screen — Do not hit enter keyLong passphrase for login and short password for screensaverDisable password length/complexity in RaringSet password security with pam.dUbuntu will not set Account Password

Why do the new Star Trek series have so few episodes in each season?

Letters associated with prime numbers

Why are the Ukraine related congressional hearings behind closed doors?

Why did the people of Zion never find evidence of the previous cycles?

Why does the Joker do this to Bob?

Did the Allies reverse the threads on secret microfilm-hiding buttons to thwart the Germans?

How does kinetic energy work in braking a vehicle?

Reduce noise in a raster (DEM) with r

Simple code that checks if you're old enough to drive

Why would Climate activists disrupt public transport?

Why are so many cities in the list of 50 most violent cities in the world located in South and Central America?

How to deal with non-stop callers in the service desk

Is dark matter inside galaxies different from dark matter in intergalactic space?

How do I figure out how many hydrogens my compound actually has using a mass and NMR spectrum?

Why does Bane's stock exchange robbery actually work to bankrupt Bruce Wayne?

How to move a paragraph and paste it without an initial newline first

Scrum Team and Product Owner working against each other

Dynamic SOQL in Map with unknow sobject?

Can I take the high-speed bullet train Beijing–Hong Kong under Chinese 144 h visa-free transit rules?

Term for anticipating counterarguments and rebutting them

Why do some switching regulator require tantalum or electrolytic capacitors instead of ceramic?

Sci-fi book trilogy about space travel & 'jacking'

The professor for one of my classes has no direction

Why was the "Cave of the Patriarchs" forbidden to Jews?



How to set a short password on Ubuntu?


Ubuntu 14.04.1 howto set a short non complex password for very kiddies?Why does Ubuntu 12.04 have more stringent complexity requirements, and how to to remove them?How to clear password history?How do I create a short password in Ubuntu 16.04?Revert password back to originalSimple password problemAltering authentication process to incorporate PIN features.Why do I need a strong password for my Ubuntu user account?Having an Issue in restricting length of passwordLogin Screen — Do not hit enter keyLong passphrase for login and short password for screensaverDisable password length/complexity in RaringSet password security with pam.dUbuntu will not set Account Password






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;









102

















When I install the Ubuntu, I set a short password(<4). Now I want to change the other short password by "passwd" or change passphrase on "Password and Keys" program, it needs a password >4 char.










share|improve this question





















  • 2





    Why do u want to set a short password? That is not safe, try you change the password from root account even if you forced to do.

    – karthick87
    Aug 25 '12 at 18:48






  • 18





    @karthick87 because my home computer is not Fort Knox. If strangers are messing with my desktop then I have bigger concerns than my computer.

    – Torben Gundtofte-Bruun
    Sep 18 '13 at 18:24






  • 4





    @karthick87 Why a short password? Ubuntu might run as a virtual machine and your virtualization software lacks copy and paste functionality for the command line of Linux guests (like Parallels desktop for Mac 8.0 does miss), then you want to access Ubuntu with a short password, or even better without a password at all.

    – Pro Backup
    Feb 12 '14 at 10:08











  • @karthick87 Fixing the parameters of what a password should be like, makes a password easier to guess and therefore less secure.

    – DustWolf
    Dec 9 '16 at 13:16











  • Why short ? My password has 1,4 GB ! - It is fun !

    – dschinn1001
    May 30 at 15:28

















102

















When I install the Ubuntu, I set a short password(<4). Now I want to change the other short password by "passwd" or change passphrase on "Password and Keys" program, it needs a password >4 char.










share|improve this question





















  • 2





    Why do u want to set a short password? That is not safe, try you change the password from root account even if you forced to do.

    – karthick87
    Aug 25 '12 at 18:48






  • 18





    @karthick87 because my home computer is not Fort Knox. If strangers are messing with my desktop then I have bigger concerns than my computer.

    – Torben Gundtofte-Bruun
    Sep 18 '13 at 18:24






  • 4





    @karthick87 Why a short password? Ubuntu might run as a virtual machine and your virtualization software lacks copy and paste functionality for the command line of Linux guests (like Parallels desktop for Mac 8.0 does miss), then you want to access Ubuntu with a short password, or even better without a password at all.

    – Pro Backup
    Feb 12 '14 at 10:08











  • @karthick87 Fixing the parameters of what a password should be like, makes a password easier to guess and therefore less secure.

    – DustWolf
    Dec 9 '16 at 13:16











  • Why short ? My password has 1,4 GB ! - It is fun !

    – dschinn1001
    May 30 at 15:28













102












102








102


29






When I install the Ubuntu, I set a short password(<4). Now I want to change the other short password by "passwd" or change passphrase on "Password and Keys" program, it needs a password >4 char.










share|improve this question















When I install the Ubuntu, I set a short password(<4). Now I want to change the other short password by "passwd" or change passphrase on "Password and Keys" program, it needs a password >4 char.







password






share|improve this question














share|improve this question











share|improve this question




share|improve this question










asked Aug 25 '12 at 18:30









Lei MingLei Ming

6242 gold badges6 silver badges5 bronze badges




6242 gold badges6 silver badges5 bronze badges










  • 2





    Why do u want to set a short password? That is not safe, try you change the password from root account even if you forced to do.

    – karthick87
    Aug 25 '12 at 18:48






  • 18





    @karthick87 because my home computer is not Fort Knox. If strangers are messing with my desktop then I have bigger concerns than my computer.

    – Torben Gundtofte-Bruun
    Sep 18 '13 at 18:24






  • 4





    @karthick87 Why a short password? Ubuntu might run as a virtual machine and your virtualization software lacks copy and paste functionality for the command line of Linux guests (like Parallels desktop for Mac 8.0 does miss), then you want to access Ubuntu with a short password, or even better without a password at all.

    – Pro Backup
    Feb 12 '14 at 10:08











  • @karthick87 Fixing the parameters of what a password should be like, makes a password easier to guess and therefore less secure.

    – DustWolf
    Dec 9 '16 at 13:16











  • Why short ? My password has 1,4 GB ! - It is fun !

    – dschinn1001
    May 30 at 15:28












  • 2





    Why do u want to set a short password? That is not safe, try you change the password from root account even if you forced to do.

    – karthick87
    Aug 25 '12 at 18:48






  • 18





    @karthick87 because my home computer is not Fort Knox. If strangers are messing with my desktop then I have bigger concerns than my computer.

    – Torben Gundtofte-Bruun
    Sep 18 '13 at 18:24






  • 4





    @karthick87 Why a short password? Ubuntu might run as a virtual machine and your virtualization software lacks copy and paste functionality for the command line of Linux guests (like Parallels desktop for Mac 8.0 does miss), then you want to access Ubuntu with a short password, or even better without a password at all.

    – Pro Backup
    Feb 12 '14 at 10:08











  • @karthick87 Fixing the parameters of what a password should be like, makes a password easier to guess and therefore less secure.

    – DustWolf
    Dec 9 '16 at 13:16











  • Why short ? My password has 1,4 GB ! - It is fun !

    – dschinn1001
    May 30 at 15:28







2




2





Why do u want to set a short password? That is not safe, try you change the password from root account even if you forced to do.

– karthick87
Aug 25 '12 at 18:48





Why do u want to set a short password? That is not safe, try you change the password from root account even if you forced to do.

– karthick87
Aug 25 '12 at 18:48




18




18





@karthick87 because my home computer is not Fort Knox. If strangers are messing with my desktop then I have bigger concerns than my computer.

– Torben Gundtofte-Bruun
Sep 18 '13 at 18:24





@karthick87 because my home computer is not Fort Knox. If strangers are messing with my desktop then I have bigger concerns than my computer.

– Torben Gundtofte-Bruun
Sep 18 '13 at 18:24




4




4





@karthick87 Why a short password? Ubuntu might run as a virtual machine and your virtualization software lacks copy and paste functionality for the command line of Linux guests (like Parallels desktop for Mac 8.0 does miss), then you want to access Ubuntu with a short password, or even better without a password at all.

– Pro Backup
Feb 12 '14 at 10:08





@karthick87 Why a short password? Ubuntu might run as a virtual machine and your virtualization software lacks copy and paste functionality for the command line of Linux guests (like Parallels desktop for Mac 8.0 does miss), then you want to access Ubuntu with a short password, or even better without a password at all.

– Pro Backup
Feb 12 '14 at 10:08













@karthick87 Fixing the parameters of what a password should be like, makes a password easier to guess and therefore less secure.

– DustWolf
Dec 9 '16 at 13:16





@karthick87 Fixing the parameters of what a password should be like, makes a password easier to guess and therefore less secure.

– DustWolf
Dec 9 '16 at 13:16













Why short ? My password has 1,4 GB ! - It is fun !

– dschinn1001
May 30 at 15:28





Why short ? My password has 1,4 GB ! - It is fun !

– dschinn1001
May 30 at 15:28










7 Answers
7






active

oldest

votes


















174


















Use following command in Terminal:



sudo passwd <user>


Replace <user> with the username whose password you wish to change.



This works because passwd suppresses all checks for length or entropy when you use it as the root user.




Warning: if the target user has an encrypted home directory, this will
cause problems!
(see comments below)







share|improve this answer























  • 26





    It does work. If you are root it will not force you to fallow the password strength requirements.

    – user72421
    Aug 25 '12 at 19:56






  • 3





    This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

    – Eliah Kagan
    Sep 8 '12 at 1:35






  • 12





    This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

    – guntbert
    Jan 16 '14 at 22:37






  • 3





    @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

    – fuenfundachtzig
    Aug 28 '14 at 8:55






  • 2





    Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

    – FuePi
    Sep 23 '15 at 8:21


















36


















By default, Ubuntu requires a minimum password length of 6 characters, as well as some basic entropy checks. These values are controlled in the file /etc/pam.d/common-password, which is outlined below.



password [success=2 default=ignore] pam_unix.so obscure sha512


If you would like to adjust the minimum length to 4 characters, add the appropriate variable (minlen=4) to the end of the line. The modification is outlined below.



password [success=2 default=ignore] pam_unix.so obscure sha512 minlen=4


Source.






share|improve this answer























  • 1





    I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

    – John S Gruber
    Aug 25 '12 at 19:42






  • 3





    remove "obscure" for also disable complexity check

    – Pisu
    Jul 3 '13 at 8:38






  • 5





    sudo passwd user seems more useful

    – gyozo kudor
    Mar 3 '14 at 14:50


















23


















Bring up a terminal and edit /etc/pam.d/common-password



Change this line:



password [success=1 default=ignore] pam_unix.so obscure sha512


to:



password [success=1 default=ignore] pam_unix.so obscure sha512 minlen=4


Password also need a certain amount of complexity, as specified by the obscure parameter above.



password [success=1 default=ignore] pam_unix.so minlen=2 sha512


removes that check also.



This all presupposes that you think this is wise.



See man pam_unix



These work on my system.






share|improve this answer




























  • this works for ubuntu12.04

    – David
    May 23 '13 at 14:37











  • valid for 13.04 too

    – Torben Gundtofte-Bruun
    Sep 18 '13 at 18:33











  • valid for 15.10 (Wily), too.

    – kmonsoor
    Jul 22 '16 at 13:29


















2


















This can be done with PAM pwdfile module.



The way described here changes only the desktop login (lightdm service), but can be applied to other services as well if you wish.



Also, this allows you to have your original strong password for "sudo", while maintaining a fairly easy way to login to Ubuntu desktop.



Commands can be issued in the terminal program.



Installing the software



First, we install a software package named libpam-pwdfile:



sudo apt-get install libpam-pwdfile


Creating the user-password file



We will then create the user/password file. You will be prompted to enter a new PIN password. Your password will be encrypted and saved to a file named passwd.like



pinpass=$(mkpasswd -5)
echo "$pinpass" | sudo tee /etc/passwd.like


Alternatively, you may use: openssl passwd -1 yourpinpasswordhere and create a file named /etc/passwd.like and that password.



Setting up the desktop login service



The next step is to prepare the desktop login service to accept the PIN password before other password procedures. I've mentioned already the name of the desktop login service, lightdm.



Take a look at the file:



cat /etc/pam.d/lightdm


If you don't have this file, then your desktop (login) service is a different one, and you should find your desktop manager before going further. As explained before, this guide is for Ubuntu 16.04 but can be used for other login services as well.



It could be useful if you also create a backup:



sudo cp /etc/pam.d/lightdm /etc/pam.d/lightdm.backup


Now, you may edit the file using nano or gedit or any other text editor:



sudo gedit /etc/pam.d/lightdm


At the top of the file mine had:



#%PAM-1.0
auth requisite pam_nologin.so
auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
@include common-auth


I have modified it like so:



#%PAM-1.0
auth requisite pam_nologin.so
auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
auth required pam_pwdfile.so pwdfile=/etc/passwd.like
auth required pam_permit.so
#@include common-auth


Save the file and close your text editor.



Log out and log back in.



You should be able to use the PIN password you set. By following this guide, the PIN password is only used for the desktop login service, not for the password of sudo commands.



Source: http://blog.radevic.com/2017/11/how-to-set-pin-password-or-short.html






share|improve this answer





















  • 1





    interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

    – Miladiouss
    Feb 1 '18 at 8:17


















1


















You can also use the -f option.



$passwd -f username
Changing password for user username.
New password:
Retype new password:





share|improve this answer

































    0


















    To set up a simple password, I tried the simple sudo passwd username method, but it failed on my Ubuntu Server 12.04 LTS.



    So I tried to remove the obscure option from /etc/pam.d/common-passwd config file, but it still failed.



    So I also removed the obscure option from /usr/share/pam-configs/unix config file. And then it worked :-)



    I do agree that it should be simplier, when acting as su to set up a weak password, whatever the reason why one wants to do it! A warning saying "weak password, confirm?" would be perfect...






    share|improve this answer




























    • Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

      – LMSingh
      Mar 8 '17 at 3:21











    • In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

      – LMSingh
      Mar 8 '17 at 3:30












    • On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

      – Gino
      Dec 17 '17 at 19:45



















    0


















    In Ubuntu 18.04 none of other solutions worked for me. I had to replace both of these lines:



    password requisite pam_cracklib.so retry=3 minlen=8 difok=3 dcredit=-1 enforce_for_root lcredit=-1 ocredit=-1 reject_username ucredit=-1
    password [success=1 default=ignore] pam_unix.so obscure use_authtok try_first_pass sha512


    in /etc/pam.d/common-password with:



    password [success=1 default=ignore] pam_unix.so minlen=2 sha512


    These changes let me changed my password easily and after changing password I restored file to it's original form.






    share|improve this answer

























      protected by Community Jul 30 at 5:03



      Thank you for your interest in this question.
      Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).



      Would you like to answer one of these unanswered questions instead?














      7 Answers
      7






      active

      oldest

      votes








      7 Answers
      7






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      174


















      Use following command in Terminal:



      sudo passwd <user>


      Replace <user> with the username whose password you wish to change.



      This works because passwd suppresses all checks for length or entropy when you use it as the root user.




      Warning: if the target user has an encrypted home directory, this will
      cause problems!
      (see comments below)







      share|improve this answer























      • 26





        It does work. If you are root it will not force you to fallow the password strength requirements.

        – user72421
        Aug 25 '12 at 19:56






      • 3





        This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

        – Eliah Kagan
        Sep 8 '12 at 1:35






      • 12





        This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

        – guntbert
        Jan 16 '14 at 22:37






      • 3





        @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

        – fuenfundachtzig
        Aug 28 '14 at 8:55






      • 2





        Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

        – FuePi
        Sep 23 '15 at 8:21















      174


















      Use following command in Terminal:



      sudo passwd <user>


      Replace <user> with the username whose password you wish to change.



      This works because passwd suppresses all checks for length or entropy when you use it as the root user.




      Warning: if the target user has an encrypted home directory, this will
      cause problems!
      (see comments below)







      share|improve this answer























      • 26





        It does work. If you are root it will not force you to fallow the password strength requirements.

        – user72421
        Aug 25 '12 at 19:56






      • 3





        This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

        – Eliah Kagan
        Sep 8 '12 at 1:35






      • 12





        This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

        – guntbert
        Jan 16 '14 at 22:37






      • 3





        @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

        – fuenfundachtzig
        Aug 28 '14 at 8:55






      • 2





        Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

        – FuePi
        Sep 23 '15 at 8:21













      174














      174










      174









      Use following command in Terminal:



      sudo passwd <user>


      Replace <user> with the username whose password you wish to change.



      This works because passwd suppresses all checks for length or entropy when you use it as the root user.




      Warning: if the target user has an encrypted home directory, this will
      cause problems!
      (see comments below)







      share|improve this answer
















      Use following command in Terminal:



      sudo passwd <user>


      Replace <user> with the username whose password you wish to change.



      This works because passwd suppresses all checks for length or entropy when you use it as the root user.




      Warning: if the target user has an encrypted home directory, this will
      cause problems!
      (see comments below)








      share|improve this answer















      share|improve this answer




      share|improve this answer








      edited Apr 13 '17 at 12:24









      Community

      1




      1










      answered Aug 25 '12 at 19:08









      user72421user72421

      2,5011 gold badge9 silver badges8 bronze badges




      2,5011 gold badge9 silver badges8 bronze badges










      • 26





        It does work. If you are root it will not force you to fallow the password strength requirements.

        – user72421
        Aug 25 '12 at 19:56






      • 3





        This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

        – Eliah Kagan
        Sep 8 '12 at 1:35






      • 12





        This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

        – guntbert
        Jan 16 '14 at 22:37






      • 3





        @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

        – fuenfundachtzig
        Aug 28 '14 at 8:55






      • 2





        Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

        – FuePi
        Sep 23 '15 at 8:21












      • 26





        It does work. If you are root it will not force you to fallow the password strength requirements.

        – user72421
        Aug 25 '12 at 19:56






      • 3





        This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

        – Eliah Kagan
        Sep 8 '12 at 1:35






      • 12





        This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

        – guntbert
        Jan 16 '14 at 22:37






      • 3





        @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

        – fuenfundachtzig
        Aug 28 '14 at 8:55






      • 2





        Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

        – FuePi
        Sep 23 '15 at 8:21







      26




      26





      It does work. If you are root it will not force you to fallow the password strength requirements.

      – user72421
      Aug 25 '12 at 19:56





      It does work. If you are root it will not force you to fallow the password strength requirements.

      – user72421
      Aug 25 '12 at 19:56




      3




      3





      This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

      – Eliah Kagan
      Sep 8 '12 at 1:35





      This works fine for me. I'm able to set a user's password to a using this method, on an Ubuntu 12.04 LTS system.

      – Eliah Kagan
      Sep 8 '12 at 1:35




      12




      12





      This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

      – guntbert
      Jan 16 '14 at 22:37





      This will cause problems when you have an encrypted home directory, as it breaks the automatic decryption of the ecryptfs passphrase.

      – guntbert
      Jan 16 '14 at 22:37




      3




      3





      @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

      – fuenfundachtzig
      Aug 28 '14 at 8:55





      @guntbert is right: Forcing the password this way the user won't be able to login again if his/her home directory is encrypted, so this is not the right solution in these cases.

      – fuenfundachtzig
      Aug 28 '14 at 8:55




      2




      2





      Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

      – FuePi
      Sep 23 '15 at 8:21





      Be aware that this doesn't update the gnome keyring, which leads to an error like "The password for the gnome keyring is not the same as the login password."

      – FuePi
      Sep 23 '15 at 8:21













      36


















      By default, Ubuntu requires a minimum password length of 6 characters, as well as some basic entropy checks. These values are controlled in the file /etc/pam.d/common-password, which is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512


      If you would like to adjust the minimum length to 4 characters, add the appropriate variable (minlen=4) to the end of the line. The modification is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512 minlen=4


      Source.






      share|improve this answer























      • 1





        I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

        – John S Gruber
        Aug 25 '12 at 19:42






      • 3





        remove "obscure" for also disable complexity check

        – Pisu
        Jul 3 '13 at 8:38






      • 5





        sudo passwd user seems more useful

        – gyozo kudor
        Mar 3 '14 at 14:50















      36


















      By default, Ubuntu requires a minimum password length of 6 characters, as well as some basic entropy checks. These values are controlled in the file /etc/pam.d/common-password, which is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512


      If you would like to adjust the minimum length to 4 characters, add the appropriate variable (minlen=4) to the end of the line. The modification is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512 minlen=4


      Source.






      share|improve this answer























      • 1





        I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

        – John S Gruber
        Aug 25 '12 at 19:42






      • 3





        remove "obscure" for also disable complexity check

        – Pisu
        Jul 3 '13 at 8:38






      • 5





        sudo passwd user seems more useful

        – gyozo kudor
        Mar 3 '14 at 14:50













      36














      36










      36









      By default, Ubuntu requires a minimum password length of 6 characters, as well as some basic entropy checks. These values are controlled in the file /etc/pam.d/common-password, which is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512


      If you would like to adjust the minimum length to 4 characters, add the appropriate variable (minlen=4) to the end of the line. The modification is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512 minlen=4


      Source.






      share|improve this answer
















      By default, Ubuntu requires a minimum password length of 6 characters, as well as some basic entropy checks. These values are controlled in the file /etc/pam.d/common-password, which is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512


      If you would like to adjust the minimum length to 4 characters, add the appropriate variable (minlen=4) to the end of the line. The modification is outlined below.



      password [success=2 default=ignore] pam_unix.so obscure sha512 minlen=4


      Source.







      share|improve this answer















      share|improve this answer




      share|improve this answer








      edited Aug 25 '12 at 19:48

























      answered Aug 25 '12 at 19:17









      NlightNFotisNlightNFotis

      2,2761 gold badge12 silver badges26 bronze badges




      2,2761 gold badge12 silver badges26 bronze badges










      • 1





        I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

        – John S Gruber
        Aug 25 '12 at 19:42






      • 3





        remove "obscure" for also disable complexity check

        – Pisu
        Jul 3 '13 at 8:38






      • 5





        sudo passwd user seems more useful

        – gyozo kudor
        Mar 3 '14 at 14:50












      • 1





        I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

        – John S Gruber
        Aug 25 '12 at 19:42






      • 3





        remove "obscure" for also disable complexity check

        – Pisu
        Jul 3 '13 at 8:38






      • 5





        sudo passwd user seems more useful

        – gyozo kudor
        Mar 3 '14 at 14:50







      1




      1





      I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

      – John S Gruber
      Aug 25 '12 at 19:42





      I couldn't get min= to work and it doesn't match the man page, despite the Wiki page. Seems to be minlen=

      – John S Gruber
      Aug 25 '12 at 19:42




      3




      3





      remove "obscure" for also disable complexity check

      – Pisu
      Jul 3 '13 at 8:38





      remove "obscure" for also disable complexity check

      – Pisu
      Jul 3 '13 at 8:38




      5




      5





      sudo passwd user seems more useful

      – gyozo kudor
      Mar 3 '14 at 14:50





      sudo passwd user seems more useful

      – gyozo kudor
      Mar 3 '14 at 14:50











      23


















      Bring up a terminal and edit /etc/pam.d/common-password



      Change this line:



      password [success=1 default=ignore] pam_unix.so obscure sha512


      to:



      password [success=1 default=ignore] pam_unix.so obscure sha512 minlen=4


      Password also need a certain amount of complexity, as specified by the obscure parameter above.



      password [success=1 default=ignore] pam_unix.so minlen=2 sha512


      removes that check also.



      This all presupposes that you think this is wise.



      See man pam_unix



      These work on my system.






      share|improve this answer




























      • this works for ubuntu12.04

        – David
        May 23 '13 at 14:37











      • valid for 13.04 too

        – Torben Gundtofte-Bruun
        Sep 18 '13 at 18:33











      • valid for 15.10 (Wily), too.

        – kmonsoor
        Jul 22 '16 at 13:29















      23


















      Bring up a terminal and edit /etc/pam.d/common-password



      Change this line:



      password [success=1 default=ignore] pam_unix.so obscure sha512


      to:



      password [success=1 default=ignore] pam_unix.so obscure sha512 minlen=4


      Password also need a certain amount of complexity, as specified by the obscure parameter above.



      password [success=1 default=ignore] pam_unix.so minlen=2 sha512


      removes that check also.



      This all presupposes that you think this is wise.



      See man pam_unix



      These work on my system.






      share|improve this answer




























      • this works for ubuntu12.04

        – David
        May 23 '13 at 14:37











      • valid for 13.04 too

        – Torben Gundtofte-Bruun
        Sep 18 '13 at 18:33











      • valid for 15.10 (Wily), too.

        – kmonsoor
        Jul 22 '16 at 13:29













      23














      23










      23









      Bring up a terminal and edit /etc/pam.d/common-password



      Change this line:



      password [success=1 default=ignore] pam_unix.so obscure sha512


      to:



      password [success=1 default=ignore] pam_unix.so obscure sha512 minlen=4


      Password also need a certain amount of complexity, as specified by the obscure parameter above.



      password [success=1 default=ignore] pam_unix.so minlen=2 sha512


      removes that check also.



      This all presupposes that you think this is wise.



      See man pam_unix



      These work on my system.






      share|improve this answer
















      Bring up a terminal and edit /etc/pam.d/common-password



      Change this line:



      password [success=1 default=ignore] pam_unix.so obscure sha512


      to:



      password [success=1 default=ignore] pam_unix.so obscure sha512 minlen=4


      Password also need a certain amount of complexity, as specified by the obscure parameter above.



      password [success=1 default=ignore] pam_unix.so minlen=2 sha512


      removes that check also.



      This all presupposes that you think this is wise.



      See man pam_unix



      These work on my system.







      share|improve this answer















      share|improve this answer




      share|improve this answer








      edited Aug 25 '12 at 19:41

























      answered Aug 25 '12 at 19:33









      John S GruberJohn S Gruber

      11.9k3 gold badges30 silver badges59 bronze badges




      11.9k3 gold badges30 silver badges59 bronze badges















      • this works for ubuntu12.04

        – David
        May 23 '13 at 14:37











      • valid for 13.04 too

        – Torben Gundtofte-Bruun
        Sep 18 '13 at 18:33











      • valid for 15.10 (Wily), too.

        – kmonsoor
        Jul 22 '16 at 13:29

















      • this works for ubuntu12.04

        – David
        May 23 '13 at 14:37











      • valid for 13.04 too

        – Torben Gundtofte-Bruun
        Sep 18 '13 at 18:33











      • valid for 15.10 (Wily), too.

        – kmonsoor
        Jul 22 '16 at 13:29
















      this works for ubuntu12.04

      – David
      May 23 '13 at 14:37





      this works for ubuntu12.04

      – David
      May 23 '13 at 14:37













      valid for 13.04 too

      – Torben Gundtofte-Bruun
      Sep 18 '13 at 18:33





      valid for 13.04 too

      – Torben Gundtofte-Bruun
      Sep 18 '13 at 18:33













      valid for 15.10 (Wily), too.

      – kmonsoor
      Jul 22 '16 at 13:29





      valid for 15.10 (Wily), too.

      – kmonsoor
      Jul 22 '16 at 13:29











      2


















      This can be done with PAM pwdfile module.



      The way described here changes only the desktop login (lightdm service), but can be applied to other services as well if you wish.



      Also, this allows you to have your original strong password for "sudo", while maintaining a fairly easy way to login to Ubuntu desktop.



      Commands can be issued in the terminal program.



      Installing the software



      First, we install a software package named libpam-pwdfile:



      sudo apt-get install libpam-pwdfile


      Creating the user-password file



      We will then create the user/password file. You will be prompted to enter a new PIN password. Your password will be encrypted and saved to a file named passwd.like



      pinpass=$(mkpasswd -5)
      echo "$pinpass" | sudo tee /etc/passwd.like


      Alternatively, you may use: openssl passwd -1 yourpinpasswordhere and create a file named /etc/passwd.like and that password.



      Setting up the desktop login service



      The next step is to prepare the desktop login service to accept the PIN password before other password procedures. I've mentioned already the name of the desktop login service, lightdm.



      Take a look at the file:



      cat /etc/pam.d/lightdm


      If you don't have this file, then your desktop (login) service is a different one, and you should find your desktop manager before going further. As explained before, this guide is for Ubuntu 16.04 but can be used for other login services as well.



      It could be useful if you also create a backup:



      sudo cp /etc/pam.d/lightdm /etc/pam.d/lightdm.backup


      Now, you may edit the file using nano or gedit or any other text editor:



      sudo gedit /etc/pam.d/lightdm


      At the top of the file mine had:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      @include common-auth


      I have modified it like so:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      auth required pam_pwdfile.so pwdfile=/etc/passwd.like
      auth required pam_permit.so
      #@include common-auth


      Save the file and close your text editor.



      Log out and log back in.



      You should be able to use the PIN password you set. By following this guide, the PIN password is only used for the desktop login service, not for the password of sudo commands.



      Source: http://blog.radevic.com/2017/11/how-to-set-pin-password-or-short.html






      share|improve this answer





















      • 1





        interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

        – Miladiouss
        Feb 1 '18 at 8:17















      2


















      This can be done with PAM pwdfile module.



      The way described here changes only the desktop login (lightdm service), but can be applied to other services as well if you wish.



      Also, this allows you to have your original strong password for "sudo", while maintaining a fairly easy way to login to Ubuntu desktop.



      Commands can be issued in the terminal program.



      Installing the software



      First, we install a software package named libpam-pwdfile:



      sudo apt-get install libpam-pwdfile


      Creating the user-password file



      We will then create the user/password file. You will be prompted to enter a new PIN password. Your password will be encrypted and saved to a file named passwd.like



      pinpass=$(mkpasswd -5)
      echo "$pinpass" | sudo tee /etc/passwd.like


      Alternatively, you may use: openssl passwd -1 yourpinpasswordhere and create a file named /etc/passwd.like and that password.



      Setting up the desktop login service



      The next step is to prepare the desktop login service to accept the PIN password before other password procedures. I've mentioned already the name of the desktop login service, lightdm.



      Take a look at the file:



      cat /etc/pam.d/lightdm


      If you don't have this file, then your desktop (login) service is a different one, and you should find your desktop manager before going further. As explained before, this guide is for Ubuntu 16.04 but can be used for other login services as well.



      It could be useful if you also create a backup:



      sudo cp /etc/pam.d/lightdm /etc/pam.d/lightdm.backup


      Now, you may edit the file using nano or gedit or any other text editor:



      sudo gedit /etc/pam.d/lightdm


      At the top of the file mine had:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      @include common-auth


      I have modified it like so:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      auth required pam_pwdfile.so pwdfile=/etc/passwd.like
      auth required pam_permit.so
      #@include common-auth


      Save the file and close your text editor.



      Log out and log back in.



      You should be able to use the PIN password you set. By following this guide, the PIN password is only used for the desktop login service, not for the password of sudo commands.



      Source: http://blog.radevic.com/2017/11/how-to-set-pin-password-or-short.html






      share|improve this answer





















      • 1





        interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

        – Miladiouss
        Feb 1 '18 at 8:17













      2














      2










      2









      This can be done with PAM pwdfile module.



      The way described here changes only the desktop login (lightdm service), but can be applied to other services as well if you wish.



      Also, this allows you to have your original strong password for "sudo", while maintaining a fairly easy way to login to Ubuntu desktop.



      Commands can be issued in the terminal program.



      Installing the software



      First, we install a software package named libpam-pwdfile:



      sudo apt-get install libpam-pwdfile


      Creating the user-password file



      We will then create the user/password file. You will be prompted to enter a new PIN password. Your password will be encrypted and saved to a file named passwd.like



      pinpass=$(mkpasswd -5)
      echo "$pinpass" | sudo tee /etc/passwd.like


      Alternatively, you may use: openssl passwd -1 yourpinpasswordhere and create a file named /etc/passwd.like and that password.



      Setting up the desktop login service



      The next step is to prepare the desktop login service to accept the PIN password before other password procedures. I've mentioned already the name of the desktop login service, lightdm.



      Take a look at the file:



      cat /etc/pam.d/lightdm


      If you don't have this file, then your desktop (login) service is a different one, and you should find your desktop manager before going further. As explained before, this guide is for Ubuntu 16.04 but can be used for other login services as well.



      It could be useful if you also create a backup:



      sudo cp /etc/pam.d/lightdm /etc/pam.d/lightdm.backup


      Now, you may edit the file using nano or gedit or any other text editor:



      sudo gedit /etc/pam.d/lightdm


      At the top of the file mine had:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      @include common-auth


      I have modified it like so:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      auth required pam_pwdfile.so pwdfile=/etc/passwd.like
      auth required pam_permit.so
      #@include common-auth


      Save the file and close your text editor.



      Log out and log back in.



      You should be able to use the PIN password you set. By following this guide, the PIN password is only used for the desktop login service, not for the password of sudo commands.



      Source: http://blog.radevic.com/2017/11/how-to-set-pin-password-or-short.html






      share|improve this answer














      This can be done with PAM pwdfile module.



      The way described here changes only the desktop login (lightdm service), but can be applied to other services as well if you wish.



      Also, this allows you to have your original strong password for "sudo", while maintaining a fairly easy way to login to Ubuntu desktop.



      Commands can be issued in the terminal program.



      Installing the software



      First, we install a software package named libpam-pwdfile:



      sudo apt-get install libpam-pwdfile


      Creating the user-password file



      We will then create the user/password file. You will be prompted to enter a new PIN password. Your password will be encrypted and saved to a file named passwd.like



      pinpass=$(mkpasswd -5)
      echo "$pinpass" | sudo tee /etc/passwd.like


      Alternatively, you may use: openssl passwd -1 yourpinpasswordhere and create a file named /etc/passwd.like and that password.



      Setting up the desktop login service



      The next step is to prepare the desktop login service to accept the PIN password before other password procedures. I've mentioned already the name of the desktop login service, lightdm.



      Take a look at the file:



      cat /etc/pam.d/lightdm


      If you don't have this file, then your desktop (login) service is a different one, and you should find your desktop manager before going further. As explained before, this guide is for Ubuntu 16.04 but can be used for other login services as well.



      It could be useful if you also create a backup:



      sudo cp /etc/pam.d/lightdm /etc/pam.d/lightdm.backup


      Now, you may edit the file using nano or gedit or any other text editor:



      sudo gedit /etc/pam.d/lightdm


      At the top of the file mine had:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      @include common-auth


      I have modified it like so:



      #%PAM-1.0
      auth requisite pam_nologin.so
      auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
      auth required pam_pwdfile.so pwdfile=/etc/passwd.like
      auth required pam_permit.so
      #@include common-auth


      Save the file and close your text editor.



      Log out and log back in.



      You should be able to use the PIN password you set. By following this guide, the PIN password is only used for the desktop login service, not for the password of sudo commands.



      Source: http://blog.radevic.com/2017/11/how-to-set-pin-password-or-short.html







      share|improve this answer













      share|improve this answer




      share|improve this answer










      answered Feb 1 '18 at 7:35









      Savvas RadevicSavvas Radevic

      6,6121 gold badge32 silver badges44 bronze badges




      6,6121 gold badge32 silver badges44 bronze badges










      • 1





        interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

        – Miladiouss
        Feb 1 '18 at 8:17












      • 1





        interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

        – Miladiouss
        Feb 1 '18 at 8:17







      1




      1





      interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

      – Miladiouss
      Feb 1 '18 at 8:17





      interesting stuff. Can you please look at the related question that I just posted right after your answer, accidentally? Thanks.

      – Miladiouss
      Feb 1 '18 at 8:17











      1


















      You can also use the -f option.



      $passwd -f username
      Changing password for user username.
      New password:
      Retype new password:





      share|improve this answer






























        1


















        You can also use the -f option.



        $passwd -f username
        Changing password for user username.
        New password:
        Retype new password:





        share|improve this answer




























          1














          1










          1









          You can also use the -f option.



          $passwd -f username
          Changing password for user username.
          New password:
          Retype new password:





          share|improve this answer














          You can also use the -f option.



          $passwd -f username
          Changing password for user username.
          New password:
          Retype new password:






          share|improve this answer













          share|improve this answer




          share|improve this answer










          answered Feb 16 at 1:19









          Will AEWill AE

          111 bronze badge




          111 bronze badge
























              0


















              To set up a simple password, I tried the simple sudo passwd username method, but it failed on my Ubuntu Server 12.04 LTS.



              So I tried to remove the obscure option from /etc/pam.d/common-passwd config file, but it still failed.



              So I also removed the obscure option from /usr/share/pam-configs/unix config file. And then it worked :-)



              I do agree that it should be simplier, when acting as su to set up a weak password, whatever the reason why one wants to do it! A warning saying "weak password, confirm?" would be perfect...






              share|improve this answer




























              • Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

                – LMSingh
                Mar 8 '17 at 3:21











              • In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

                – LMSingh
                Mar 8 '17 at 3:30












              • On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

                – Gino
                Dec 17 '17 at 19:45
















              0


















              To set up a simple password, I tried the simple sudo passwd username method, but it failed on my Ubuntu Server 12.04 LTS.



              So I tried to remove the obscure option from /etc/pam.d/common-passwd config file, but it still failed.



              So I also removed the obscure option from /usr/share/pam-configs/unix config file. And then it worked :-)



              I do agree that it should be simplier, when acting as su to set up a weak password, whatever the reason why one wants to do it! A warning saying "weak password, confirm?" would be perfect...






              share|improve this answer




























              • Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

                – LMSingh
                Mar 8 '17 at 3:21











              • In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

                – LMSingh
                Mar 8 '17 at 3:30












              • On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

                – Gino
                Dec 17 '17 at 19:45














              0














              0










              0









              To set up a simple password, I tried the simple sudo passwd username method, but it failed on my Ubuntu Server 12.04 LTS.



              So I tried to remove the obscure option from /etc/pam.d/common-passwd config file, but it still failed.



              So I also removed the obscure option from /usr/share/pam-configs/unix config file. And then it worked :-)



              I do agree that it should be simplier, when acting as su to set up a weak password, whatever the reason why one wants to do it! A warning saying "weak password, confirm?" would be perfect...






              share|improve this answer
















              To set up a simple password, I tried the simple sudo passwd username method, but it failed on my Ubuntu Server 12.04 LTS.



              So I tried to remove the obscure option from /etc/pam.d/common-passwd config file, but it still failed.



              So I also removed the obscure option from /usr/share/pam-configs/unix config file. And then it worked :-)



              I do agree that it should be simplier, when acting as su to set up a weak password, whatever the reason why one wants to do it! A warning saying "weak password, confirm?" would be perfect...







              share|improve this answer















              share|improve this answer




              share|improve this answer








              edited Jul 2 '13 at 12:08









              Aditya

              9,74313 gold badges56 silver badges89 bronze badges




              9,74313 gold badges56 silver badges89 bronze badges










              answered Jul 2 '13 at 12:05









              user171987user171987

              11




              11















              • Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

                – LMSingh
                Mar 8 '17 at 3:21











              • In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

                – LMSingh
                Mar 8 '17 at 3:30












              • On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

                – Gino
                Dec 17 '17 at 19:45


















              • Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

                – LMSingh
                Mar 8 '17 at 3:21











              • In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

                – LMSingh
                Mar 8 '17 at 3:30












              • On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

                – Gino
                Dec 17 '17 at 19:45

















              Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

              – LMSingh
              Mar 8 '17 at 3:21





              Narrow minded people have given negative votes on this excellent answer. The reference to "obscure" in /usr/share/pam-configs/unix is very important and relevant to some situations. Just because it doesn't work for you doesn't mean it's not a good answer. Lighten up on the negative votes guys and welcome someone with a viewpoint that's different than yours! You might be better informed at the end of the day.

              – LMSingh
              Mar 8 '17 at 3:21













              In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

              – LMSingh
              Mar 8 '17 at 3:30






              In support of user171987's answer read the page at wiki.ubuntu.com/PAMConfigFrameworkSpec#config_file_format . It shows how the PAM configuration works and explains the profiles and their usage. The folder pam-configs holds various configurations and "unix" is just one of them.

              – LMSingh
              Mar 8 '17 at 3:30














              On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

              – Gino
              Dec 17 '17 at 19:45






              On Ubuntu 18, it looks like it's sufficient to simply remove the 'obscure' option from /etc/pam.d/common-passwd -- there's no need to overly complicate things by also editing /usr/share/pam-configs/unix

              – Gino
              Dec 17 '17 at 19:45












              0


















              In Ubuntu 18.04 none of other solutions worked for me. I had to replace both of these lines:



              password requisite pam_cracklib.so retry=3 minlen=8 difok=3 dcredit=-1 enforce_for_root lcredit=-1 ocredit=-1 reject_username ucredit=-1
              password [success=1 default=ignore] pam_unix.so obscure use_authtok try_first_pass sha512


              in /etc/pam.d/common-password with:



              password [success=1 default=ignore] pam_unix.so minlen=2 sha512


              These changes let me changed my password easily and after changing password I restored file to it's original form.






              share|improve this answer






























                0


















                In Ubuntu 18.04 none of other solutions worked for me. I had to replace both of these lines:



                password requisite pam_cracklib.so retry=3 minlen=8 difok=3 dcredit=-1 enforce_for_root lcredit=-1 ocredit=-1 reject_username ucredit=-1
                password [success=1 default=ignore] pam_unix.so obscure use_authtok try_first_pass sha512


                in /etc/pam.d/common-password with:



                password [success=1 default=ignore] pam_unix.so minlen=2 sha512


                These changes let me changed my password easily and after changing password I restored file to it's original form.






                share|improve this answer




























                  0














                  0










                  0









                  In Ubuntu 18.04 none of other solutions worked for me. I had to replace both of these lines:



                  password requisite pam_cracklib.so retry=3 minlen=8 difok=3 dcredit=-1 enforce_for_root lcredit=-1 ocredit=-1 reject_username ucredit=-1
                  password [success=1 default=ignore] pam_unix.so obscure use_authtok try_first_pass sha512


                  in /etc/pam.d/common-password with:



                  password [success=1 default=ignore] pam_unix.so minlen=2 sha512


                  These changes let me changed my password easily and after changing password I restored file to it's original form.






                  share|improve this answer














                  In Ubuntu 18.04 none of other solutions worked for me. I had to replace both of these lines:



                  password requisite pam_cracklib.so retry=3 minlen=8 difok=3 dcredit=-1 enforce_for_root lcredit=-1 ocredit=-1 reject_username ucredit=-1
                  password [success=1 default=ignore] pam_unix.so obscure use_authtok try_first_pass sha512


                  in /etc/pam.d/common-password with:



                  password [success=1 default=ignore] pam_unix.so minlen=2 sha512


                  These changes let me changed my password easily and after changing password I restored file to it's original form.







                  share|improve this answer













                  share|improve this answer




                  share|improve this answer










                  answered Feb 19 at 9:47









                  Rehan HaiderRehan Haider

                  1414 bronze badges




                  1414 bronze badges


















                      protected by Community Jul 30 at 5:03



                      Thank you for your interest in this question.
                      Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).



                      Would you like to answer one of these unanswered questions instead?



                      Popular posts from this blog

                      Tamil (spriik) Luke uk diar | Nawigatjuun

                      Align equal signs while including text over equalitiesAMS align: left aligned text/math plus multicolumn alignmentMultiple alignmentsAligning equations in multiple placesNumbering and aligning an equation with multiple columnsHow to align one equation with another multline equationUsing \ in environments inside the begintabularxNumber equations and preserving alignment of equal signsHow can I align equations to the left and to the right?Double equation alignment problem within align enviromentAligned within align: Why are they right-aligned?

                      Training a classifier when some of the features are unknownWhy does Gradient Boosting regression predict negative values when there are no negative y-values in my training set?How to improve an existing (trained) classifier?What is effect when I set up some self defined predisctor variables?Why Matlab neural network classification returns decimal values on prediction dataset?Fitting and transforming text data in training, testing, and validation setsHow to quantify the performance of the classifier (multi-class SVM) using the test data?How do I control for some patients providing multiple samples in my training data?Training and Test setTraining a convolutional neural network for image denoising in MatlabShouldn't an autoencoder with #(neurons in hidden layer) = #(neurons in input layer) be “perfect”?