> 
> 
>     /usr/sbin/vipw <<xxxFUNNYxxx
        ok, but according to vipw(8), you can't use this on systems
        that use extended security attributes.
        If you have encrypted password data on /tcb/files/auth.db
        I guess your only option is use usermod/useradd/userdel,
        right? (or other graphical tools, I mean, you can't manually
        (nor programatically) manipulate this auth.db)
> 
> 3.  awk -F: '{ if (substr($1,1,3) == "pwc") printf
> "%s:%s:%s:%s:%s:/auth/users/%s:%s\n", $1, $2, $3, $4, $5, $1, %7; else print
> $0 }' < old-password > new-password     # this one came from Allen
> Johannesen
        BTW, is there a way to manually lock passwd file so users won't
        mess it by running passwd command?
        maybe "touch /etc/ptmp" would be enough?
-- 
finger spd_at_gtc1.cps.unizar.es for PGP       /              So be easy and free
.mailcap tip of the day:                   /      when you're drinking with me
application/ms-tnef; cat '%s' > /dev/null / I'm a man you don't meet every day
text/x-vcard; cat '%s' > /dev/null       /            (the pogues)
Received on Tue Nov 21 2000 - 10:20:35 NZDT