Hello,
I thought I would use MD5 Passwords because of this line in
/etc/pam.d/common-passwd:
password required pam_unix.so nullok obscure min=4 max=8 md5
But today I discovered that the format in /etc/shadow is crypt, because it
is like $1$salt$hash !
What did I do wrong ?
Thanks
On Fri, 15 Jul 2005, [EMAIL PROTECTED] wrote:
I thought I would use MD5 Passwords because of this line in
/etc/pam.d/common-passwd:
password required pam_unix.so nullok obscure min=4 max=8 md5
But today I discovered that the format in /etc/shadow is crypt, because it
is like $1$salt$hash
Ola,
alguem sabe como eu habilito/desabilido os MD5 passwords? Estou tendo
problemas com NIS e acho que a causa e essa. Tem tambem algum comando
para ver se estao sendo utilizados MD5 passwords? Grato.
--
Ivan Bittencourt de Araujo e S Neto [EMAIL PROTECTED]
The debian installer warns about possible compatibility problems using MD5
passwords in conjuction with NIS. Does NIS itself have difficulty dealing
with MD5 or is this warning just a reference to the possibility that some NIS
clients using the passwd map may not be set up to recognize MD5
Dave Sherohman wrote:
The debian installer warns about possible compatibility problems using MD5
passwords in conjuction with NIS. Does NIS itself have difficulty dealing
with MD5 or is this warning just a reference to the possibility that some NIS
clients using the passwd map may not be set
Ross Smith wrote:
But I can't find any mention of turning on shadow passwords.
Any help would be greatly appreciated.
its even easier then that! check the manpage on pwconv.
nate
--
:::
ICQ: 75132336
http://www.aphroland.org/
http://www.linuxpowered.net/
[EMAIL PROTECTED]
On Wed, Mar 28, 2001 at 09:28:36PM -0600, John Patton wrote:
Okay, I know how to tell pam to use md5 passwords, but has
anybody actually done this after using regular crypt
passwords? I have a number of accounts with existing
passwords in /etc/shadow... what happens to them? I've been
wanting
@lists.debian.org
Subject: Re: Installing shadow/md5 passwords after the fact?
Ross Smith wrote:
But I can't find any mention of turning on shadow passwords.
shadowconfig on
Note that you can also use dpkg-reconfigure base-config to re-see some
of the questions it asked at install time.
--
see shy
I recently installed 2.2r0 and said no to the shadow/MD5 questions during
installation 'cause I was gonna install NIS.
Now I'd like to turn on shadow MD5 passwords. It seems that turning on MD5
passwords is as simple as
# /etc/pam.d/login:
password required pam_unix.so nullok obscure
Ross Smith wrote:
But I can't find any mention of turning on shadow passwords.
shadowconfig on
Note that you can also use dpkg-reconfigure base-config to re-see some
of the questions it asked at install time.
--
see shy jo
Okay, I know how to tell pam to use md5 passwords, but has
anybody actually done this after using regular crypt
passwords? I have a number of accounts with existing
passwords in /etc/shadow... what happens to them? I've been
wanting to upgrade to md5 passwords for a while, but I'm
afraid
On Wed, Mar 28, 2001 at 09:28:36PM -0600, John Patton wrote:
Okay, I know how to tell pam to use md5 passwords, but has
anybody actually done this after using regular crypt
passwords? I have a number of accounts with existing
passwords in /etc/shadow... what happens to them? I've been
wanting
On Wed, 17 Sep 1997, Galen Hazelwood wrote:
The version of su you're using (from shellutils) isn't part of the
shadow password suite. It's smart enough to use shadow password
functions if it finds them in the library, which it does, but other
shadow features (ENV_SUPATH, SU_WHEEL, MD5
for MD5 passwords?
su also seems to ignore ENV_SUPATH and SU_WHELL. Looks to me that su
doesn't pay any attention to this file.
Should this be logged as a bug? Has it been already?
Actually, the secure-su package is built to respect those files. The su
in the default packages is the GNU one
passwords?
I have the following packages installed:
shellutils_1.16-2 (containing su)
login_961025-2
passwd_961025-2
This may not help you, but it is fixed in shellutils_1.16-5.deb, which is
linked against libc6.
Alll programs linked against libc6 should work with MD5 passwords
I just detected the MD5_CRYPT_ENAB option in /etc/login.defs and
enabled it. Login works fine with the new passwords but su seems to
have no idea of MD5.
Is there a working version of su for MD5 passwords?
I have the following packages installed:
shellutils_1.16-2 (containing su)
login_961025
On 16 Sep 1997, Torsten Hilbrich wrote:
I just detected the MD5_CRYPT_ENAB option in /etc/login.defs and
enabled it. Login works fine with the new passwords but su seems to
have no idea of MD5.
Is there a working version of su for MD5 passwords?
su also seems to ignore ENV_SUPATH
The version of su you're using (from shellutils) isn't part of the
shadow password suite. It's smart enough to use shadow password
functions if it finds them in the library, which it does, but other
shadow features (ENV_SUPATH, SU_WHEEL, MD5 passwords) aren't available.
If you want them, you
On 16 Sep 1997, Torsten Hilbrich wrote:
I just detected the MD5_CRYPT_ENAB option in /etc/login.defs and
enabled it. Login works fine with the new passwords but su seems to
have no idea of MD5.
Is there a working version of su for MD5 passwords?
I have the following packages installed
19 matches
Mail list logo