Re: Changing to MD5 shadow passwords?

2001-03-20 Thread Kevin Long

- Original Message -
From: Ethan Benson [EMAIL PROTECTED]
To: debian-user@lists.debian.org
Sent: Monday, March 19, 2001 5:50 PM
Subject: Re: Changing to MD5 shadow passwords?

md5 hashes should work regardless of what hash passwd will create.
however some time ago it was discovered that pam created bogus md5
hashes due to an endianess bug, backward compatability was retained
for awhile but it might be gone now.

How would I upgrade if I had a broken pam?
Could anyone point me to some docs on this.  I really don't want to have to
try and upgrade to RH7 -- debian is much smoother in upgrading.  And RH7
would probably break under the bogus md5's anyway right?

also you can't just drop redhat passwd files onto debian, you will
break your system.  you can only take the ordinary user accounts from
redhat and add them to the debian passwd files.  that is uids above
500 from redhat are ok, any uid below 500 is not.

How badly would it break?  Could I fix it easier than having to rebuild
hundreds of users and get them to reset all their passwords.



Re: Changing to MD5 shadow passwords?

2001-03-20 Thread Ethan Benson
On Tue, Mar 20, 2001 at 05:00:39PM -0600, Kevin Long wrote:
 
 - Original Message -
 From: Ethan Benson [EMAIL PROTECTED]
 To: debian-user@lists.debian.org
 Sent: Monday, March 19, 2001 5:50 PM
 Subject: Re: Changing to MD5 shadow passwords?
 
 md5 hashes should work regardless of what hash passwd will create.
 however some time ago it was discovered that pam created bogus md5
 hashes due to an endianess bug, backward compatability was retained
 for awhile but it might be gone now.
 
 How would I upgrade if I had a broken pam?
 Could anyone point me to some docs on this.  I really don't want to have to
 try and upgrade to RH7 -- debian is much smoother in upgrading.  And RH7
 would probably break under the bogus md5's anyway right?

probably.  check the pam mailing list archives, they compatility
might still be in pam_pwdb (which sucks donkey balls) but i doubt its
in pam_unix since it just uses standard libc calls.  

 also you can't just drop redhat passwd files onto debian, you will
 break your system.  you can only take the ordinary user accounts from
 redhat and add them to the debian passwd files.  that is uids above
 500 from redhat are ok, any uid below 500 is not.
 
 How badly would it break?  Could I fix it easier than having to rebuild
 hundreds of users and get them to reset all their passwords.

all you need to do is delete all the redhat system accounts, that is
every user and group with a uid and gid below 500.  then add the
remaining users to your debian stock password files.  

it doesn't matter that your users have uids of 500, its system
accounts like bin daemon sys and such that are different on debian and
redhat.  replacing debian system accounts wtih redhat system accounts
will ruin your system. 

though i prefer to get uids reallocated starting at 1000 where they
belong.  i just used an awk script to add the user accounts to debian
and reset gecos and password feilds.  easy and pie.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpQJVsP6yx0w.pgp
Description: PGP signature


Changing to MD5 shadow passwords?

2001-03-19 Thread R. Ransbottom
I would like to convert all of my 
Debian 2.0 and 2.2 systems to MD5 
shadow passwords.  If I understand
the docs correctly all that needs doing
is to add md5 to the apropriate lines
in /etc/pam.d/passwd and /etc/pam.d/login.

Is this correct?

rob Live the dream.



Re: Changing to MD5 shadow passwords?

2001-03-19 Thread Ethan Benson
On Mon, Mar 19, 2001 at 10:04:20AM -0500, R. Ransbottom wrote:
 I would like to convert all of my 
 Debian 2.0 and 2.2 systems to MD5 
 shadow passwords.  If I understand
 the docs correctly all that needs doing
 is to add md5 to the apropriate lines
 in /etc/pam.d/passwd and /etc/pam.d/login.
 
 Is this correct?

yes, check all the files in /etc/pam.d for `password' lines, add md5
to all password lines with pam_unix.so as the module.  

note that passwords are only converted to md5 after the user changes
thier password.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgp2DQgbXWWK0.pgp
Description: PGP signature