usermod -s /usr/bin/passwd some_user
(assuming that passwd is located in /usr/bin on your system). Or, you
could just edit the /etc/passwd file and replace /bin/false with
/usr/bin/passwd.
John Blumel
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
it seems to work ok. How would you evaluate
this as a security risk? Theoretically, the worst case is that someone
changes the password that they've stolen and I have to reset it but how
much should I worry about buffer overflow or other attacks with passwd
or replacements as the shell?
John Bl
sing
Auth-Type = System and having them telnet to the RADIUS server and change their
password.
Thanks.
John Blumel
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
other than simply using
Auth-Type = System and having them telnet to the RADIUS server and change their
password.
Thanks.
John Blumel
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html