trazoi wrote:
Sweet, thanks. I wasn't sure if they had full user rights, passwords and all. If they're there effectively just as labels to quarantine file access then I won't worry about them.
You can verify that none of them have passwords by looking at the second field in /etc/shadow.
man 5 shadow wrote:
If the password field contains some string that is not valid result of crypt(3), for instance ! or *, the user will not be able to use a unix password to log in, subject to pam(7).
A "valid result of crypt" looks something like $1$EPlC0/$zcsNziSht7Vt335LyraXZ/. Also you will often see in /etc/passwd such accounts having their shell set to /bin/false or /sbin/nologin which prevents a normal login. It is still possible (and common) for processes to run as these users. For example, postfix starts as root (it needs to in order to e.g. listen on port 25) but then drops most privileges and switches over to the postfix user. I don't know exactly what would happen if you removed the postfix user account, but I assume it isn't good...