On Mon, 10 Jul 2006, Alan J. Flavell wrote: > > Hang on - it's not supposed to, is it? The whole point of /etc/shadow > is to hide the crypted tokens away. Then a mechanism is provided > (PAM) for checking passwords without having to expose the shadow file.
PAM works using shared libraries. It doesn't provide any route around Unix's usual security boundaries. > A quick google suggests > http://www.exim.org/pipermail/exim-users/Week-of-Mon-20011105/031830.html > hope that's right, anyway. That will be from the Exim 3 era when the Exim daemon kept root privilege. Tony. -- <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> http://dotat.at/ ${sg{\N${sg{\ N\}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}\ \N}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}} -- ## List details at http://www.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://www.exim.org/eximwiki/
