[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: Shadow over NIS

Jim Dennis wrote:
> >
> > Ok my NIS server exported:
> >
> > passwd.byname (mangled passwd due to shadow passwd on server)
> > passwd.byuid (same as above)
> > shadow.byname (mangled password field, if port > 1024)
> >
> > Now on my own machine:
> >
> > Using the stock /lib/libpwdb.0.54, all users (other than root)
> > can not login. So I hack the libpwdb nis/password.c to replace
> > passwd.byname password field if it were 1 char long and contains
> > 'x' only, with the one from shadow.byname password field.
>         I think it should try the shadow.byname patch if

Any pointer to this patch?

>         the field contains *any* single character.
>         I often use a '*' rather than an 'x'.

But '*' char is to lock out a particular account... I haven't
searched the rfc* for shadow and/or NIS stuffs... but I think
traditional passwd field for unix should contains at least
13 chars... the first 2 is the salt.

+---| Netscape Communicator 4.x |---| Powered by Linux 2.1.x |---+
|/v\ Agus Budy Wuysang                   MIS Department          |
| |  Phone:  +62-21-344-1316 ext 317     GSM: +62-816-1972-051   |
+--------| http://www.rad.net.id/users/personal/s/supes |--------+
Version: 3.1
GCS/IT dx s: a- C+++ UL++++$ P- L+++(++++) E--- W++ N+++ o? K? w-- O-
M- V-- PS+ PE Y-- PGP t+@ 5 X+ R- tv- b+ DI? D++(+) G e++ h* r+ y++

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index] []