{ 101 comments… read them below or add one }

1 D3vi8ant April 11, 2007 at 3:31 pm

What does a symbol of ! or * indicate when placed before this after the user login name . . . after typing cat /etc/shadow?

Reply

2 nixCraft April 11, 2007 at 6:16 pm

! or * indicate that the user will not be able to use a unix/linux password to log in. In other words user login will be disabled.

HTH

Reply

3 Chandrima May 29, 2007 at 3:56 pm

Nice to get this information here, couldn’t understand it when our teacher taught it in class

Reply

4 r0ck80y August 1, 2007 at 8:26 am

If a user changes his password (using passwd command), how is the shadow file updated to include the new passwd? I mean, doesn’t the root/admin only have write permissions to this file?

Reply

5 nixCraft August 1, 2007 at 12:07 pm

passwd command has SUID (Saved User ID) enabled. When passwd command executed the effective user id (EUID) that is in force at the time is copied to the saved user id (i.e. root). Using this technique a normal user can update his/her password.

Reply

6 anonimus August 14, 2007 at 9:29 am

username:!!: …. or
username:!!$1$MvGJq5Nq$ersjw/IaU90l.n5sB/FFP1: …

I tried this on Linux machine and !! appeared after passwd -l username command – locking password.
After passwd -u username – unlock, !! disappeared again.
So this means that user cannot log in, so it is blocked, but I am not sure about all those rpm, nscd, nfsnobody and so on users.. they have only :!!: in password field in ect/shadow file. These users cannot log in, but are they entirely blocked?

Reply

7 Matthew Ford November 14, 2007 at 9:15 pm

The root user can still access accounts with blocked passwords, using su, but only if those accounts have a shell enabled in /etc/passwd (if the shell is /sbin/nologin, even root cannot access the account). I don’t know if there’s a difference between !! and * in the password field of the shadow file, though.

Reply

8 Julia B. November 15, 2007 at 8:54 pm

Is it possible to have etc/shadow file where all the passwords are encrypted however one password is simply a recognizable word?

Reply

9 nixCraft November 15, 2007 at 9:11 pm

one password is simply a recognizable word?
Noop.

Reply

10 Peter April 22, 2014 at 5:14 am

I am currently auditing a client and they have one password that shows up as a word, when all the others are encrypted. They confirmed that it was the correct password.

Reply

11 sunil March 3, 2008 at 2:11 pm

can any one make answer more clear how passwd changes the password although /etc/shadow has permissions ‘r——–’ with root as owner.

Reply

12 MaD dOG August 18, 2011 at 8:59 pm

the passwd command executes with root permissions since it is a setuid program. root owned processes can access the shadow file… they essentially are not effected by the file permissions.

Reply

13 Hogwu March 13, 2008 at 11:58 am

If there is an account in the etc/shadow file and the account does not have an equivalent in the etc/passwd file? Will the account work for login?

Reply

14 dean July 29, 2011 at 9:52 pm

Potentially, it can work. if there is another authentication directory other than “files” (/etc/passwd) specified in nsswitch, it can get the user info from that authentication directory, and the password info from /etc/shadow

Reply

15 jborody4378 January 15, 2013 at 5:25 pm

What does it mean then if there is an account in etc/passwd with a shell of /bin/false but no corresponding account listed in etc/shadow?

Reply

16 jarod04 April 4, 2008 at 9:05 am

@sunil

heya mate. the passwd command can only be run by root or as a root (using sudo). The root can access (including read and write) to any file even if he doesnt have the permissions. Thats why as a root, the /etc/shadow can be changed.

You can call it perks of the job…

HTH

Reply

17 jake the fake April 23, 2008 at 10:21 pm

sunil-

passwd command can be run by any user. when root runs it, they dont need to specify an old password to change it.

Reply

18 Pradeep July 16, 2008 at 5:04 am

Hey guys,

Can you please tell me if

1. \”!!\” means that the password is expired and the user will not be able to login?

2. \”*\” means that the userid is locked?

Reply

19 Sally July 18, 2008 at 9:00 am

the passd command is both SUID and SGID — these stand for Set User ID and Set Group ID. See permissions below;
% ls -l /usr/bin/passwd
54 -r-sr-sr-x 1 root sys 27228 Aug 16 2007 /usr/bin/passwd

Just to clarify the perms –
* user perms (root) – read, setuid on execute
* group perms (sys) – read, setgid on execute
* anyone perms – read and execute

So, when anyone runs the passwd command, they will effectively be running it as the root user and the sys group.

Although the permissions of passwd are read (no write), root does have the ability to force write on any file on a UNIX system (locally mounted).

That is why when you run the passwd command, you effectively become root and the shadow file is updated.

Hope that helps.

Reply

20 Marilyn September 10, 2008 at 4:49 pm

username:Kz5iZvRZAyXkQ:14132::::90::

I use the passwd -x -1 [username] command to remove the expirations, etc., but that 90 keeps showing up. How the hell do I get rid of that damn number short of vi’ing the shadow file?

Reply

21 David November 18, 2008 at 5:56 pm

Does anyone know how to set a madatory minimum length for the root password. I typed in PASSWORD=14 in the ../etc/default/passwd file, but that only ALLOWS a 14 charachter password. It doesn’t require it.

Thanks,
David

Reply

22 nixCraft November 18, 2008 at 6:13 pm

@David,

To improve security, you need to use longer password. It can be enforced using Pluggable Authentication Module (PAM).

Reply

23 John December 10, 2008 at 11:55 am

“/etc/shadow file stores actual password in encrypted format”

I don’t think so, I’m pretty sure that /etc/shadow stores a hashed output from the users password, by default using ‘crypt’ in solaris and therefore limited to checking the first 8 chars of a password. You can invoke MD5 or SHA-1 instead, for better password checking. /etc/default/passwd contains the hints…..

Reply

24 Jon February 7, 2013 at 9:38 pm

You are right John, these passwords are one-way hashed, not encrypted.

Reply

25 Ricardo January 7, 2009 at 12:03 am

Is it possible to add an root entry to the /etc/passwd and /etc/shadow where there is no password, so that we can create a root that doesn’t have a password? thanks for the help

Reply

26 Matthew May 10, 2010 at 11:24 pm

edit /etc/shadow and remove the encrypted password.
vi /a/etc/shadow
An example from my lab looks like this.
root:ZW1NcbJpB8Yd6:14712:7:42:7:::
You will need to remove the section between the first colons. In this case ZW1NcbJpB8Yd6.
The new line should look like this.
root::14712:7:42:7:::

Reply

27 ARCHIT JAIN January 10, 2009 at 5:50 am

hi,
can one access /etc/shadow file even if one does not have root permissions…

Reply

28 shanks January 16, 2009 at 4:50 pm

Hey what is the mode of encryption in this shadow file?

Reply

29 waris February 23, 2009 at 3:29 pm

its ok but password means nothing could be done on it……….

Reply

30 navin April 8, 2009 at 5:32 pm

hi my linux friends

i m student of bannerjee sir plz help me about how to convert /etc/shadow file’s passwd into our normal form simply haching

Reply

31 divya April 21, 2009 at 3:12 pm

its very easy langauage even fresher can understand explation is given briefly

Reply

32 Abhishek May 26, 2009 at 11:24 am

Thanks a lot .. got hell lot of information

Reply

33 Dave June 16, 2009 at 9:51 pm

If I insert # comment lines, blank lines, or if I sort the contents differently, will this screw anything up? Will the system clobber comments, blank lines, or sort order? I could get the answer by experiment, but the risk of disaster is too high.

Reply

34 Keilaron September 12, 2009 at 3:20 pm

“if the shell is /sbin/nologin, even root cannot access the account”
False. Both su and sudo let you specify a shell/command, so you (not just root) can bypass what /etc/passwd says. The shell value there is only a default shell! It does NOT entirely prevent someone from logging in (very common myth)! In other words, if you have access to an account with su or sudo, you can log in to it regardless of what the default shell is set to. I do it all the time.
While it WOULD lock someone out of telnet, SSH2 allows you to specify an alternate shell to bypass /etc/passwd as well (although I’ve not had any success using this feature of SSH, so perhaps I’m misreading or not getting it right).

Reply

35 UNIXKIDA May 28, 2014 at 11:37 am

Am I getting something different than Keilaron has said. I guess statement is true.
“if the shell is /sbin/nologin, even root cannot access the account”

[root@rhel6 ~]# cat /etc/passwd | grep -i shridhar
shridhar:x:504:510:shridhar:/bin/bash
[root@rhel6 ~]# usermod -s /sbin/nologin shridhar
[root@rhel6 ~]#
[root@rhel6 ~]# su shridhar
This account is currently not available.
[root@rhel6 ~]# su – shridhar
This account is currently not available.
[root@rhel6 ~]#

Reply

36 UNIXKIDA May 28, 2014 at 11:38 am

[root@rhel6 ~]# cat /etc/passwd | grep -i shridhar
shridhar:x:504:510:shridhar:/home/shridhar:/sbin/nologin
[root@rhel6 ~]# date
Wed May 28 17:07:58 IST 2014
[root@rhel6 ~]#

Reply

37 ABDUL AWAL December 4, 2009 at 1:16 am

i am a student and i m new in linux ..can anyone please explain me the term dns resolver by taking into account:
1.how it might be used to resolve the url:breo.beds.ac.uk
2.how it compares with the hosts file

Reply

38 Matthew May 10, 2010 at 11:32 pm

unix looks to /etc/hosts file as first point of name resolution. than /etc/resolv.conf is looked at where DNS server ip addresses are identified. The DNS server retains a database similiar to that of the /etc/hosts file. DNS server database has to be maintained with server names and ip addresses rather than system adminsitrator maintaining hundreds of /etc/hosts files on multiple machines.

Reply

39 Michael July 23, 2014 at 3:36 pm

Keep in mind, this is also impacted by the /etc/host.conf file, which states in which order to resolve host names.
there are 3 ways to resolve:
bind
hosts
NIS

Most distros will have bind, hosts as default which says “look in the hosts file first, than try DNS.

NIS is another resolver, formerly know as “yellow pages”

These 2 links may help:
http://www.tldp.org/LDP/nag/node82.html
http://www.freebsd.org/doc/handbook/network-nis.html

Reply

40 ABDUL AWAL December 4, 2009 at 1:26 am

can anyone xplain: what happening in the boxes areas shown in the startup script of a linux system:-

checking for hardware changes [ok]
bringing up loopback interface:[ok]
bringing up loopback interface eth0:
determining ip information for etho… done

starting snmpd:[failed]
starting cups[ok]
starting sshd:[failed]
starting sendmail:[failed]

Reply

41 RASEL December 4, 2009 at 11:33 am

can u explain how the /etc/shadow and /etc/passwd are used in the authentication process.why are two files used instead of one?how can i convert a system to use the /etc/shadow file to store password?

Reply

42 RASEL December 4, 2009 at 11:36 am

an example of absolute pathname is shown as /home/student/myprogms while a relative pathname can be shown as ../../documents can anyone discuss the differences between absolute and relative pathname and advantages.

Reply

43 Kriss December 30, 2009 at 10:55 am

Heyy

can anyone tell me what is the hash here?

username:$1$DKzYQ$HP9PrZA.mxe5/qviB3Kyw1:14266:0:99999:7:::

i tried to crack it with md5 but it says it’s not a valid hash. I tried different combinations but it’s the same thing.

Please help.
Thanks.

Reply

44 Mario January 3, 2010 at 9:31 pm

Hey Kriss,

you can’t just crack md5, since md5 is actually a cryptographic hash function and it operates only ONE way: text -> hash!

You might try the common words md5 database. Type “gdata md5 database” in your favourite search engine.
If you are (un)lucky this hash will be found in the database, and you will be able to see clear text.

Reply

45 realmoonstruck May 6, 2011 at 9:17 am

you can always try john the ripper to crack the hash

Reply

46 Srikanth March 2, 2010 at 8:13 am

Could you please tell me how to open it?

Reply

47 Keilaron March 11, 2010 at 11:56 pm

Srikanth – With any text editor. However, only root has access to it.

Reply

48 manish bagwari March 15, 2010 at 11:31 am

sir mcrypt command is is nice for encryption
that’s beautiful to use.
sir how to open shadow file if permission denied?

Reply

49 manish bagwari(graphic era university) March 15, 2010 at 11:35 am

sir how to use algorithm for encryption.
can we make algorithm ?
in unix how to use mod(%)?

Reply

50 pandeeswaran March 4, 2012 at 4:12 pm

Why do you bother to use % operator in calculations. $a % 2 are perfectly valid in bash shell.

Reply

51 Mario March 15, 2010 at 12:08 pm

@manish bagwari:
Shadow file can only be opened by a super user (already mentioned in Keilaron comment). So sudo vi /etc/shadow (and enter password, if your username is added to sudoers), or first become super user with use of the su command (must know root password), and then open the file via vi /etc/shadow.

Mod (%) in korn shell can be used in following way: mymodulus=$(( 15 % 7 ))
If you meant something else by “unix”, please let me know.

Reply

52 manish bagwari(graphic era university) March 16, 2010 at 7:58 am

sir i have used su command ,after giving passwd it diplayed authentication failure
sir, what to do?
And how we can koow the root passwd.

Reply

53 Mario March 16, 2010 at 9:26 am

Well, without correct super user password, you can NOT read requested file!
If you truly are authorised to use the system in super user mode, someone should have provided you with the password; or created rules in sudoers configuration file.

If you installed the system by your self, and just forgot the password, you will probably have to boot it using rescue CD and then reset super user password. This procedure is well documented on the web.

Reply

54 manish bagwari(graphic era university) March 23, 2010 at 9:10 am

how to know the root password in unix sir when i used su command then it display athentication failure (in my own system ) siir what to do?

Reply

55 manish bagwari(graphic era university) March 23, 2010 at 9:37 am

sir , how to know root passwd.
su cmmand replys authentication failure
what to do?

Reply

56 Steve K April 1, 2010 at 8:27 pm

I had a problem with the screensaver under Ubuntu 9.10 not taking my password. I fixed it by changing the permissions of /etc/shadow to:
-r--r----- 1 root shadow 1807 2010-03-26 00:33 /etc/shadow

Reply

57 tatineni April 4, 2010 at 5:37 pm

In the figure the encrypted password is really shot when compared with the password field in my shadow password i cant really understand what is the type of encryption

hackme:$6$OBEzW/iiKRe/ww$vfnfEFg41l1dK4zE4YM9PiRKs7ic5lvg1WgFWgi.VF0O/MYCZPELqedCmSybFQ5.0twYbc1fU6VnXqdACqELj0:14703:0:99999:7:::

can anyone pls help me understand this

cheers.
Linux learner

Reply

58 tatineni April 4, 2010 at 5:42 pm

From my password field i can identify $6$ which indicates it as a SHA based scheme but when i converted my original password using some online converters i didn’t got the same encrypted password as that of my shadow password

Reply

59 bodo April 6, 2010 at 7:57 am

geez man – its called “one way function” for a reason.

Reply

60 Keilaron April 11, 2010 at 6:19 pm

Tatineni: There’s some additional modifications that occur to the password before it is placed in the shadow file. I’m not sure what they are, but yes, it seems the hashes created by md5/sha1/ are not inserted as-is into the shadow file. I’m not sure what it is, but it’s not base64 encoding, that much I know.

Reply

61 Al b. April 14, 2010 at 3:19 pm

I think a !! just means that acount never had a password since it was first created by the system.

Reply

62 manoj August 29, 2010 at 8:23 am

what happen if you remove shadow file et all? would you able to login into?

Reply

63 lesca September 23, 2010 at 4:29 am

!! measns user account has not been initialed or has not been locked.
! means group password is not available.
* means login disabled.

Hope it would be helpful

Reply

64 Sanjay November 1, 2010 at 2:23 pm

why /etc/shadow- and /etc/passwd- file ?

# ls -l /etc/passwd*
-rw-r–r– 1 root root 2230 2007-08-17 19:20 /etc/passwd
-rw-r–r– 1 root root 2187 2007-08-17 15:03 /etc/passwd-

# ls -l /etc/shadow*
-r——– 1 root root 1420 2010-02-07 03:30 /etc/shadow
-r——– 1 root root 1358 2007-08-17 15:03 /etc/shadow-

Reply

65 Chompi December 2, 2010 at 9:49 pm

“Understanding /etc/shadow file”???

I still don’t see how the passwd string given to passwd iss converted to the string in the shadow file.

Reply

66 Sylvain Lévesque January 10, 2011 at 7:54 pm

man shadow

Reply

67 XtreMist January 18, 2011 at 1:14 pm

Well Tell me any good way to by pass the shadow file when it is lock !!! ?

Reply

68 Urchin February 3, 2011 at 9:40 pm

Link.

It turns out that a “salt” is used to make the hash. This ‘salt’ is a random string which is different every time a password is generated.
When you look at the hash in your passwd file it has the following scheme:
$*1$*2$*3

*1 is an integer showing the hash type used (1=md5, according to one of the replies 6=SHA)
*2 is the salt
*3 is the hashed password (with the used salt)

according to the link the following command will output the correct hash:
openssl passwd -1 -salt *2
(the -1 is for md5, not sure how to use this with other hash types)
—–

To be clear on hash versus encryption:
A hash is one way. With hashes it is not unlikely that two different inputs lead to the same hash, therefore it is impossible to retrieve a password from a hash. A good hash algorithm makes it unlikely to find 2 different inputs for the same hash. One could say that on creation of the hash some information needed to reverse the process is removed and can not be recovered.

With encryption it is two way. You will need some kind of key to decrypt (most likely a hashed password), but this key will always result in one way to the unencrypted state (ie input). In other words all information to decrypt is still available.
—-
For a root password reset have a look at (you will need physical access to the box):
Link.

Reply

69 Hasan May 3, 2011 at 9:11 am

The “Last password change” field for some users are 0 or around 6000 days or some are even blank. However, for all the above users, the “Max” field is 28 days.
Can anyone pls explain how this is possible? Thx

Reply

70 gregory June 3, 2011 at 7:22 pm

I’m trying to unshadow my passwd file on mac os x 10.6.7 (MBP if it helps) I can’t seem to locate the shadow file in etc/ can you help me? I’m trying to do this for use with john the ripper to test the passwords on my server, and I am new to john the ripper.

Reply

71 vignemail1 August 2, 2011 at 8:00 am

There are no /etc/shadow file on Mac OS X. All passwords are stored by a daemon (DirectoryService if i’m remember correctly) which store passwords in many hashed kinds (MD5, CRYPT-DES, SHA, LM, KRB5, …) for all services who need it. All request for changing password are redirected to this daemon who update all hashes “in-the-fly”. Same thing for authentication

Reply

72 Scott June 26, 2011 at 4:35 am

PS: The first dollar sign signifies the hashing algorithm:

$1 – md5
$2a – blowfish
$6 – sha-512

Most modern linux distros use $6 in /etc/shadow for user accounts

Reply

73 jocurds June 26, 2011 at 9:34 am

for etc/shadow file for user accounts with ‘NP’ (no password) also means that the account is disabled? kindly advise.

Reply

74 jocurds June 26, 2011 at 9:36 am

by the way this is for solaris 8.

Reply

75 Anon November 29, 2011 at 7:35 pm

Not technically disabled, just not able to login. Account passwd has not been set but can be set by root.

Reply

76 zimmy August 8, 2011 at 6:18 am

HI all
can anybody help me

supose any user passwd expire so hw cn we get inforamation regarding this
we dont no wt is user name then hw cn we identify that this user’s passwd hass been expired

mail me pls
zimmyyash@gmail.com

thxx in advance

Reply

77 Abhishek August 18, 2011 at 4:53 pm

Hi…can any one tell me…is there any procedure or any scriprt or tool through which i can change the password setting..i mean when i type the password in linux nthng displayed,is there any way to change it with * symbol…so next tym instead of nthyng i will get ******** like this form….thnx in advance…

Reply

78 Felix Uy Ventula Jr. December 21, 2011 at 8:19 am

With this instance you need to break the encription layer before we can proceed to the inquiries you like. Then it time we can formulate that kind of scripting code and it depends to the one you like systems.

Reply

79 bonnieallen September 29, 2011 at 12:22 am

How do I change my password

Reply

80 CallMeBob October 12, 2011 at 8:20 pm

typically you’d just login and type “passwd”, then give your old password and a new password and it would be set for you.

Reply

81 Felix Uy Ventula Jr. December 21, 2011 at 8:17 am

just do the reset password command in the unix command line.
$ User ID= Username
$ resetpassword

Reply

82 Dileepa November 17, 2011 at 8:09 am

Hi

Can anybody tell me how to calculate the date the password has been change. I mean how to get the actual password change date.

root:ZW1NcbJpB8Yd6:14712:

according to this log password has been change on 14712- but how do i know which date, which month and which year password changed.

Thank you

Reply

83 Brian November 29, 2011 at 4:14 pm

Dileepa, (November 17, 2011)

On linux you can use the date command to convert the EPOCH days to the date.
The time reported back is not valid, since I am using a full day for seconds.

date -d @`echo 14712*86400|bc`
Mon Apr 12 20:00:00 EDT 2010

Reply

84 jitendra December 29, 2011 at 6:27 pm

what is main file /etc/passwd or /etc/shadow

Reply

85 joe January 1, 2012 at 10:27 am

thankx for tell us meaning of last 2 spaces usually blank

Reply

86 Purna February 2, 2012 at 10:16 am

Thanks for posting!!!

Reply

87 ashish February 7, 2012 at 8:38 am

i am having a real problem.. can i encrypt a given string just in the manner linux does so that i can match that encrypted string with real encrypted password??

Reply

88 Shirish March 29, 2012 at 1:38 pm

How I tweak to allow user to login by blank password .. Have done it years back … forget .. Please remind !

–Shirish

Reply

89 Mahesh Chadare May 16, 2012 at 7:22 am

Thank u very much .First time i got clear idea about password expiry date ,account disable date and password inactive period

Reply

90 Mohammed Sami May 17, 2012 at 6:11 am

Hi All,

while you are trying to change password for any user logged in with root user. And if you get error saying “Permission Denied”. Then you just need to edit /etc/shadow file and clear the password. If in the password section you find *LK* then you just delete them and re-try changing password. It shouldb be fine.

Cheers

Reply

91 garry July 24, 2012 at 10:56 am

what about 7th and 8th comment ….it is not shown in the format

Reply

92 elavarasan August 2, 2012 at 4:51 am

my acer lap linex os not open but i enter correct username and password so,my computer totally dead ,how to solve this problem??????……………please help anybody

Reply

93 Kevin October 17, 2012 at 7:57 pm

Hello there,
I’m trying to understand field 3. Can you explain how 13064 in field 3, ended up with Jan 1, 1970 as its date.

Thanks in advance,
student

Reply

94 Moe November 1, 2012 at 9:08 pm

13064 days since <—- the epoch (Jan 1, 1970) that the password has changed. Which gives you Oct 8, 2005.

Reply

95 John October 18, 2012 at 2:48 pm

Kevin,

It didn’t end up with Jan 1 1970.

As it says above, this field is the days since Jan 1, 1970 that password was last changed.

13064 means the 8th of October 2005.

Link [timeanddate.com]

I hope this helps.

John

Reply

96 Priya October 26, 2012 at 5:29 am

Hi,

Can you tell me, Why /etc/shadow file doesn’t have any permissions for owner, group owner and others.

Reply

97 Nepto November 17, 2012 at 4:02 am

Because it would be security flaw.

File /etc/shadow contains password hashes of system users, so it is not desirable that anyone can see that file.

However usual permissions are with no permissions for others, with read-only permission for shadow group and with read-write permission for superuser (root).

Reply

98 ger January 16, 2013 at 5:58 am

I’m running solaris 10.. i messed up the /etc/shadow file using vi now i can’t use root to log on.. is there a way to get into it or am i going to have to reimage the server?

Options?

Reply

99 rohit July 16, 2013 at 7:02 am

hash code is the second field in that line…

its the content between 1st and 2nd delimiter ‘:’

content before the 1st ‘:’ is field 1

and content after second ‘:’ is field 2

Reply

100 basu April 7, 2014 at 4:50 am

how to make password change mandatory for every time a user logs in in linux .using command .

Reply

101 Rick Carrick April 15, 2014 at 5:30 pm

basu said on April 7, 2014:
how to make password change mandatory for every time a user logs in in linux .using command .

There isn’t a command to do that every time that user logs in, and if there were one, it would probably cause that user a denial of access. But, to force the user to change their password on the NEXT time they log in, use the command:

“passwd -f ” (as root)

That will force them to change their password the next time they log in ONLY, but not every time. A system Admin will typically use that command when changing a users password, perhaps tell the user the password in a voice mail then let them know that as soon as they log in they will be forced to change the password.

Reply

Leave a Comment

Tagged as: , , , , , , , , , , , , , , , , , ,

Previous Faq:

Next Faq: