Results 1 to 4 of 4
I have just discovered a very unusual thing. Trying to change any password on my gentoo laptop is now not possible using the standard passwd utility. It seems that every ...
Enjoy an ad free experience by logging in. Not a member yet? Register.
- 02-11-2007 #1
passwd: Critical error - immediate abort
# passwd passwd: Critical error - immediate abort
# ll /etc/passwd /etc/shadow -rw-r--r-- 1 root root 2219 Feb 11 21:53 /etc/passwd -rw------- 1 root root 1000 Feb 11 21:56 /etc/shadow
I have found references to this all over the internet, mainly old redhat. The only solution I could see was to make sure the source was compiled with the right dict reference or something but I can't see how this could suddenly be a problem.
The shadow file seems to be in order having checked it out, as does the passwd file. Both have what look like fully functional lines for the root user and my regular user.
The last thing I did before trying to change the passwd of a new test user was to run unshadow from jtr. I guess this could have corrupted the original files but they look perfectly intact so my guess is there may be some file lock on /etc/shadow so I did an lsof /etc/shadow but this revealed nothing. I can still add and delete users using useradd and userdel but I can't set their passwords.
Any ideas how to check out if there is a file lock or how to fix this problem?
- 12-12-2007 #2
- Join Date
- Dec 2007
I had the same problem by the looks of it, and found this blog post about it:
passwd is messed up?!?! | Uno-Code
Apparently there's a bug with cracklib, and you can work around it by remerging cracklib then shadow as a one-shot like this:
emerge -1 cracklib shadow
- 12-12-2007 #3
I fixed this at the time, I think I did re-emerge it...The Human Equation:
value(geeks) > value(mundanes)
- 04-22-2008 #4
- Join Date
- Apr 2008
If you do not want to use cracklib you can just disable it, what solves the problem too:
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required /lib/security/$ISA/pam_env.so
auth sufficient /lib/security/$ISA/pam_unix.so likeauth nullok
auth required /lib/security/$ISA/pam_deny.so
account required /lib/security/$ISA/pam_unix.so
account sufficient /lib/security/$ISA/pam_succeed_if.so uid < 100 quiet
account required /lib/security/$ISA/pam_permit.so
#password requisite /lib/security/$ISA/pam_cracklib.so retry=3
password required /lib/security/$ISA/pam_unix.so
password sufficient /lib/security/$ISA/pam_unix.so nullok use_authtok md5 shadow
password required /lib/security/$ISA/pam_deny.so
session required /lib/security/$ISA/pam_limits.so
session required /lib/security/$ISA/pam_unix.so