On Sun, 21 Nov 1999, you wrote:
> Chmouel Boudjnah wrote:
>
> > what wuftp version you use ? i think i have fixed all these thing in
> > wu-ftpd-2.6-2mdk.
>
> Where can I find it? I've look on the mdk ftp site and some mirrors and
> can't find 2.6-2.
>
Try rpmfind.net.
John
> -What would that be? I've enabled the MD5+shadow and reset my password
> -but I still can't ftp in as myself.
> Is the ftpd package installed? It is not installed by default.
After you try logging in with FTP (and it fails), and error
message should be written to the file /var/log/mes
Chmouel Boudjnah wrote:
> what wuftp version you use ? i think i have fixed all these thing in
> wu-ftpd-2.6-2mdk.
Where can I find it? I've look on the mdk ftp site and some mirrors and
can't find 2.6-2.
--
==
Sheldon
Do you have ftpd commented out in /etc/inetd.conf?
Is the ftpd package installed? It is not installed by default.
On Sun, 21 Nov 1999, you wrote:
-Steve,
-
-> Even IF you turn on MD5, you can still have legacy passwords in
-> /etc/passwd. There's also a conversion utility to convert a legacy
-
On Sun, 21 Nov 1999, you wrote:
> > what wuftp version you use ? i think i have fixed all these thing in
> > wu-ftpd-2.6-2mdk.
>
> Where can I get it? It's not on your ftp server or on a couple of the
> mirrors
> I checked.
>
Have you tried looking in "cooker"??? Try going to www.rpmfind.net
and
Chmouel Boudjnah wrote:
>
> Sheldon Lee Wen <[EMAIL PROTECTED]> writes:
>
> > Steve,
> >
> > > Even IF you turn on MD5, you can still have legacy passwords in
> > > /etc/passwd. There's also a conversion utility to convert a legacy
> > > passwd file to shadowed.
> >
> > What would that be? I've
Steve,
> Even IF you turn on MD5, you can still have legacy passwords in
> /etc/passwd. There's also a conversion utility to convert a legacy
> passwd file to shadowed.
What would that be? I've enabled the MD5+shadow and reset my password
but I still can't ftp in as myself.
Sheldon.
--
==
> - Further testing is necessary to identify the exact cause of this
> -bug.
>
> It should be fixed of course but why would anyone want to not use MD5
> and shadow passwords?
If you have a passwd file maintenance system with dozens (or
hundreds) of users, you may not want to force ev
On Wed, 17 Nov 1999, you wrote:
-> I thought 'normal users' are by default allowed to ftp to their home
-> directory.
-
- They are. It breaks if you turn off MD5 and/or Shadowed
-passwords.
-
- Further testing is necessary to identify the exact cause of this
-bug.
It should be fixed
I REPEAT: This is broken if you did not enable MD5 and/or Shadow password
support when you installed Mandrake.
See prior messages for details.
--Derek
On Wed, 17 Nov 1999, Stephen Carville wrote:
> On Wed, 17 Nov 1999, you wrote:
> -does the anonftp allow for more than anonymous ftp?
> I thought 'normal users' are by default allowed to ftp to their home
> directory.
They are. It breaks if you turn off MD5 and/or Shadowed
passwords.
Further testing is necessary to identify the exact cause of this
bug.
--Derek
I just finished a thread dealing with this.
The problem probably has something to do with PAM config.
This happened to me when I disabled MD5 and Shadow Passwords. To fix the
problem, run "setup" as root, then change your Auth Config to enable MD5
and shadow passwords.
--Derek
On Wed, 17 Nov
On Wed, 17 Nov 1999, you wrote:
-does the anonftp allow for more than anonymous ftp?
No and you probably shouldn't use anonymous ftp for this.
-I have been trying
-to allow a user ftp access to a web directory and haven't been
-successful.
Check that he had a password (ftp will not allow a u
Timothy Litwiller wrote:
> does the anonftp allow for more than anonymous ftp? I have been trying
> to allow a user ftp access to a web directory and haven't been
> successful.
I thought 'normal users' are by default allowed to ftp to their home
directory.
What is the problem:
Are they not abl
does the anonftp allow for more than anonymous ftp? I have been trying
to allow a user ftp access to a web directory and haven't been
successful.
On Thu, 18 Nov 1999, you wrote:
-Stephen Carville wrote:
-
-> The MD5 hash is a much stronger method at least in the sense it is
-> more resistant to dictionary attacks. In some recent tests I did
-> using a PII-450 running Mandrake 6.0 and john the ripper, the MD5 hash
-> look about 10 times as
Derek Simkowiak wrote:
>
> > Even IF you turn on MD5, you can still have legacy passwords in
> > /etc/passwd. There's also a conversion utility to convert a legacy
> > passwd file to shadowed.
>
> Can you tell me where to find this utility? What is it called?
I believe it's called pwc
On Thu, 18 Nov 1999, Derek Simkowiak wrote:
> > Even IF you turn on MD5, you can still have legacy passwords in
> > /etc/passwd. There's also a conversion utility to convert a legacy
> > passwd file to shadowed.
>
> Can you tell me where to find this utility? What is it called?
pwconv
> Even IF you turn on MD5, you can still have legacy passwords in
> /etc/passwd. There's also a conversion utility to convert a legacy
> passwd file to shadowed.
Can you tell me where to find this utility? What is it called?
Thank You,
Derek Simkowiak
[EMAIL PROTECTED]
Stephen Carville wrote:
> The MD5 hash is a much stronger method at least in the sense it is
> more resistant to dictionary attacks. In some recent tests I did
> using a PII-450 running Mandrake 6.0 and john the ripper, the MD5 hash
> look about 10 times as long to yield as DES
Can you give som
At 11:11 AM 11/18/1999 +0100, you wrote:
>:~>> It should be fixed of course but why would anyone want to not use MD5
>:~>> and shadow passwords?
>:~>
>:~>If you have a passwd file maintenance system with dozens (or
>:~>hundreds) of users, you may not want to force everybody to re-create their
On Thu, 18 Nov 1999, Denis Havlik wrote:
> :~>> It should be fixed of course but why would anyone want to not use MD5
> :~>> and shadow passwords?
> :~>
> :~> If you have a passwd file maintenance system with dozens (or
> :~>hundreds) of users, you may not want to force everybody to re-create
On Wed, 17 Nov 1999, Derek Simkowiak wrote:
> > - Further testing is necessary to identify the exact cause of this
> > -bug.
> >
> > It should be fixed of course but why would anyone want to not use MD5
> > and shadow passwords?
>
> If you have a passwd file maintenance system with do
On Thu, 18 Nov 1999, you wrote:
-:~>> It should be fixed of course but why would anyone want to not use MD5
-:~>> and shadow passwords?
-:~>
-:~>If you have a passwd file maintenance system with dozens (or
-:~>hundreds) of users, you may not want to force everybody to re-create their
-:~>passw
Derek Simkowiak wrote:
>
> > - Further testing is necessary to identify the exact cause of this
> > -bug.
> >
> > It should be fixed of course but why would anyone want to not use MD5
> > and shadow passwords?
>
> If you have a passwd file maintenance system with dozens (or
> hundred
:~>> It should be fixed of course but why would anyone want to not use MD5
:~>> and shadow passwords?
:~>
:~> If you have a passwd file maintenance system with dozens (or
:~>hundreds) of users, you may not want to force everybody to re-create their
:~>passwords when you can just copy the old p
26 matches
Mail list logo