Seems that I have to add an option "nis" to pam_unix.so to
make it work (better). My common-passwd is now:

password [success=1 default=ignore]     pam_unix.so obscure sha512 nis
password requisite                      pam_deny.so
password required                       pam_permit.so

The other common-* config files are unchanged. Now the
token manipulation error is gone:

        % passwd
        Changing password for hdunkel.
        (current) UNIX password: abc
        Enter new UNIX password: xyz
        Retype new UNIX password: xyz
        passwd: password updated successfully

Looking at the NIServer I see that /etc/shadow is changed,
even though NIS merges passwd and shadow into a single
database. Seems OK to me.

It is just weird that passwd asks for the NIS root password,
if I try to change the local root password:

        # passwd
        Changing password for root.
        NIS server root password:
        Enter new UNIX password:
        Retype new UNIX password:
        passwd: password updated successfully

It still accepts and changes the local root password, so
this is not a big issue.

Question: On Debian /etc/pam.d/common-passwd is generated
using pam-auth-update and some templates in /usr/..., AFAICS.
What is the _real_ place to add the "nis" (or other options)
to pam_unix.so? Shouldn't it be set by default, if NIS is
installed?


Regards

Harri

Attachment: pam_config.tar.gz
Description: application/gzip

Reply via email to