systematic Kerberization

Matt Hansen helios82 at optushome.com.au
Wed May 12 05:15:49 UTC 2004


On Wed, 2004-05-12 at 12:44, Matthew Miller wrote:
> On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote:
> > The standard way I have seen it implemented on other versions of Linux
> > (here and other large organizations) is that the central authentication
> > is used first in the pam stack and if it fails/isnt available you get
> > authorized against the local password db which if it works lets you in.
> 
> "Other versions" including Red Hat Linux up until it suddenly stopped
> working circa version 7.3.
> 
> <https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55193>


That bug report is over 2 1/2 years old without a single comment from
Nalin. Maybe Nalin doesn't maintain it anymore or is too busy - but
either way, maybe it should be re-assigned to another engineer?

Regards,
-Matt
-- 
"Would you buy a car with the hood welded shut?"
 - Bob Young on the benefits of the open source development model.
mhelios - www.fedoraforum.org 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20040512/f4032d99/attachment.sig>


More information about the fedora-devel-list mailing list