{"id":2772,"date":"2020-02-06T01:00:12","date_gmt":"2020-02-06T00:00:12","guid":{"rendered":"https:\/\/www.linuxboxen.dk\/?p=2772"},"modified":"2020-02-06T01:00:12","modified_gmt":"2020-02-06T00:00:12","slug":"laas-en-bruger-konti","status":"publish","type":"post","link":"https:\/\/www.linuxboxen.dk\/?p=2772","title":{"rendered":"L\u00e5s en bruger konti ? Men hvilken muligheder."},"content":{"rendered":"<p>Hvis du administrere et linux system er det vigtigt at forst\u00e5 de muligheder der er for at l\u00e5se en brugers konti, der er flere muligheder. Men de har ikke alle sammen samme effekt. Hvis en bruger har ssh keys til login, s\u00e5 er det ikke alle kommandoer som blive blokeret som du sikkert \u00f8nsker.<\/p>\n<p>For at l\u00e5se en brugers konti, er der nogle muligheder.<\/p>\n<ol>\n<li>Med <a href=\"https:\/\/www.linuxboxen.dk\/passwd\/\">passwd<\/a> kommandoen.<br \/>\nVirker ikke med ssh keys.<\/li>\n<li>Med <a href=\"https:\/\/www.linuxboxen.dk\/chage\/\">chage<\/a> kommandoen.<br \/>\nVirker med ssh keys.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3>1. Med passwd kommandoen.<\/h3>\n<p>En af de simpleste m\u00e5der at l\u00e5se en brugers adgang til systemet er at bruge passwd kommandoen, med -l for lock.<\/p>\n<pre>$ passwd -l brugernavn\npasswd: password expiry information changed.<\/pre>\n<p>Dette g\u00f8r der skrives et ! i password feltet i \/etc\/shadow filen. Som s\u00e5 g\u00f8r at passworded ikke virker mere. Og konti er l\u00e5st.<\/p>\n<p>Du kan checke status p\u00e5 en bruger konti med -S for status.<\/p>\n<pre>$ passwd -S brugernavn\nbrugernavn L 10\/15\/2019 0 99999 7 -1<\/pre>\n<p>Her kan vi se at L viser at kontien er l\u00e5st. Ellers vil der st\u00e5 P eller NP for no password set. En af de gode ting ved denne metode et at det er nemt at l\u00e5se og l\u00e5se op igen.<\/p>\n<p>Du kan l\u00e5se konti op igen med -u for Unlock.<\/p>\n<pre>$ passwd -u brugernavn\npasswd: password expiry information changed<\/pre>\n<p>Men det virker ikke med SSH keys. Derfor ikke den bedste l\u00f8sning. S\u00e5 er l\u00f8sning nr 2 bedre.<\/p>\n<h3>2. Med chage kommandoen.<\/h3>\n<p>chage kommandoen bruges til at \u00e6ndre en brugers kodeord&#8217;s udl\u00f8bs dato.<\/p>\n<pre>$ chage -l brugernavn\nLast password change : Nov 23, 2018\nPassword expires : never\nPassword inactive : never\nAccount expires : never\nMinimum number of days between password change : 0\nMaximum number of days between password change : 99999\nNumber of days of warning before password expires : 7<\/pre>\n<p>Her kan du se data om en konti&#8217;s password politik.<\/p>\n<pre>$ sudu chage -E0 brugernavn<\/pre>\n<p>Dette vil g\u00f8re at bruger ikke kan login mere, da et 0 som beskriver antal dage siden 1\/1 1970 som kodeord er valid i.<\/p>\n<p>Du kan \u00e6ndre det tilbage ved at fjerne 0 fra shadow filen eller bruge kommandoen.<\/p>\n<pre>$ sudo chage -E-1 tadpole<\/pre>\n<p>Dette virker ogs\u00e5 med ssh keys. S\u00e5 brugeren ikke kan login.<\/p>\n<p>S\u00e5 denne metode er mere sikker at bruge en passwd kommandoen.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2772\" class=\"pvc_stats all  \" data-element-id=\"2772\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.linuxboxen.dk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hvis du administrere et linux system er det vigtigt at forst\u00e5 de muligheder der er for at l\u00e5se en brugers konti, der er flere muligheder. Men de har ikke alle sammen samme effekt. Hvis en bruger har ssh keys til login, s\u00e5 er det ikke alle kommandoer som blive blokeret som du sikkert \u00f8nsker. For [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2772\" class=\"pvc_stats all  \" data-element-id=\"2772\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.linuxboxen.dk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[5,2,6,8],"tags":[],"class_list":["post-2772","post","type-post","status-publish","format-standard","hentry","category-bash","category-tips","category-danskshell","category-shell"],"a3_pvc":{"activated":true,"total_views":13,"today_views":0},"_links":{"self":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/posts\/2772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2772"}],"version-history":[{"count":0,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=\/wp\/v2\/posts\/2772\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linuxboxen.dk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}