[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Shadow over NIS



Ok my NIS server exported:

passwd.byname (mangled passwd due to shadow passwd on server)
passwd.byuid (same as above)
shadow.byname (mangled password field, if port > 1024)

Now on my own machine:

Using the stock /lib/libpwdb.0.54, all users (other than root)
can not login. So I hack the libpwdb nis/password.c to replace
passwd.byname password field if it were 1 char long and contains
'x' only, with the one from shadow.byname password field.

It worked, but out of all curiosity is there a cleaner solution
(sort of configurations changes only) I have overlooked?

-- 
+---| Netscape Communicator 4.x |---| Powered by Linux 2.1.x |---+
|/v\ Agus Budy Wuysang                   MIS Department          |
| |  Phone:  +62-21-344-1316 ext 317     GSM: +62-816-1972-051   |
+--------| http://www.rad.net.id/users/personal/s/supes |--------+
-----BEGIN GEEK CODE BLOCK-----
Version: 3.1
GCS/IT dx s: a- C+++ UL++++$ P- L+++(++++) E--- W++ N+++ o? K? w-- O-
M- V-- PS+ PE Y-- PGP t+@ 5 X+ R- tv- b+ DI? D++(+) G e++ h* r+ y++
------END GEEK CODE BLOCK------



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index] []