be enough to update the shadow
file?
No.
You can't reverse a hash and to generate a new hash the code needs the
password for the user in plain.
Well, to be fair, the change to SHA-1 is because you can "reverse"
MD5 all too easily (where reverse just means that you find somethin
the PAM system has that knowledge including the plain text
>> password the user entered) just rehash it and update /etc/shadow.
>
>> This will gradually upgrade all hashes once a user uses an account.
>
> That would be downright sneaky :-)
That's quite common for w
ch will
> do just that on successful login. Once you *know* you have the right
> password (and the PAM system has that knowledge including the plain text
> password the user entered) just rehash it and update /etc/shadow.
>
> This will gradually upgrade all hashes once a user uses an acco
to...@tuxteam.de wrote:
> On Tue, Mar 13, 2018 at 05:25:18PM +0100, Sven Hartge wrote:
>> Adam Weremczuk wrote:
>>> I think it was me invoking "passwd" as root and aborting (ctrl+D)
>>> without making any changes. Would that be enough to update the
>&
On Tue 13 Mar 2018 at 15:18:35 (+), Adam Weremczuk wrote:
> Hi all,
>
> I've just spotted that on one of my old wheezy servers root entry in
> /etc/shadow was updated just over 3 weeks ago.
Take a look at the end of a file and see if a new user/system account
has been added
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Mar 13, 2018 at 05:25:18PM +0100, Sven Hartge wrote:
> Adam Weremczuk wrote:
>
> > I think it was me invoking "passwd" as root and aborting (ctrl+D)
> > without making any changes. Would that be enough to update
Quite possibly I changed it to the same password.
Not sure now as it was almost a month ago but can't find any better
explanation.
Of course hashes are meant to be irreversible.
I guess I'm trying to catch my own shadow ;)
On 13/03/18 16:19, to...@tuxteam.de wrote:
Still strang
Adam Weremczuk wrote:
> I think it was me invoking "passwd" as root and aborting (ctrl+D)
> without making any changes. Would that be enough to update the shadow
> file?
No.
You can't reverse a hash and to generate a new hash the code needs the
password for the user
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Mar 13, 2018 at 04:01:52PM +, Adam Weremczuk wrote:
> I think it was me invoking "passwd" as root and aborting (ctrl+D)
> without making any changes.
> Would that be enough to update the shadow file?
Hm. That depends
I think it was me invoking "passwd" as root and aborting (ctrl+D)
without making any changes.
Would that be enough to update the shadow file?
On 13/03/18 15:47, to...@tuxteam.de wrote:
What I don't understand is how the system changed the hashing
method without getting you invo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Mar 13, 2018 at 03:18:35PM +, Adam Weremczuk wrote:
> Hi all,
>
> I've just spotted that on one of my old wheezy servers root entry in
> /etc/shadow was updated just over 3 weeks ago.
>
> The root password is
Hi all,
I've just spotted that on one of my old wheezy servers root entry in
/etc/shadow was updated just over 3 weeks ago.
The root password is still the same and the lastchanged count is much
higher than 3 weeks.
The difference I've noticed is the hashed password string being m
On Sun, Jul 9, 2017 at 7:53 PM, Thomas Schmitt wrote:
> Hi,
>
[...]
>
> Joel Rees wrote:
>> (1) These messages may be a sort of generator for phishing targets.
>
> You mean that those who hit the "Smack Sender" button of their mail
> app show up as flotsam here and can be harvested without reveili
> From: scdbac...@gmx.net
> To: debian-user@lists.debian.org
>> this conversation has gone viral itself.
> It is technically interesting to see what people think how stupid we
> are. I wonder if there is any other purpose than to make me wonder ?
Politically, the motive may be by some who will nee
Hi,
Fungi4All wrote:
> I remember 2 months ago I had received a response from what appeared
> as a list member responding to some spam that was sent by me to the list.
The first thing i checked on the current spam was that it is really
distributed by the list and not sent to me directly.
"Receive
Can I suggest two possibilities not apparently being considered?
(1) These messages may be a sort of generator for phishing targets.
(This is not currently a likely scenario, but you want to consider it.)
(2) These might be either the body of a message sent by a spatter
steganography technique, o
On Tue, 28 May 2013, Andreas Meile wrote:
> I tried that out on a lab system where I replaced pam_unix.so into
> pam_unix2.so inside both common-auth and common-password config
> files.
>
> Result: The system nows recognizes all $2a$ (Blowfish) password
> hashes but does not longer accepts $6$ (SH
Hello Recoverym4n
Thanks for your hint.
- Original Message -
From:
To:
Sent: Monday, May 27, 2013 7:40 PM
Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3 to
Debian Wheezy)
Install 'libpam-unix2' package. Configure PAM as outlined
in /usr/share/
On Mon, 27 May 2013 16:23:20 +0200
"Andreas Meile" wrote:
> A "apt-cache search blowfish" shows me a lot of Blowfish related packages.
> So is there one on it which extends the login authentication routine also to
> process Blowfish hashes in /etc/shadow or i
On 05/27/2013 04:23 PM, Andreas Meile wrote:
> Hello Chris
>
> - Original Message - From: "Chris Davies"
> To:
> Sent: Monday, May 27, 2013 2:54 PM
> Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3
> to Debian Wheezy)
>
>
&g
Hello Chris
- Original Message -
From: "Chris Davies"
To:
Sent: Monday, May 27, 2013 2:54 PM
Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3 to
Debian Wheezy)
man 3 crypt contains a NOTES section that identifies the ID and describes
Andreas Meile asked about /etc/shadow:
> Is there a good overview WWW link about all these
> $$[$] formats?
man shadow says of the encrypted password field, "Refer to crypt(3)
for details on how this string is interpreted."
man 3 crypt contains a NOTES section that ident
Hello Debian users
I recently migrated an old SuSE Linux 9.3 box to Debian 7 Wheezy. There I
backuped the /etc/shadow file to import the existing passwords from my users
to the new Debian environment using a "vipw -s" command as part of the
migration.
Result: Classic UNIX hashes (fo
starting kuser from a terminal and see
if you get any error messages.
>> Just to make sure everything is as it should be. Please show the
>> output of 'ls -l /etc/shadow'.
> Here it is:
> ~# ls -l /etc/shadow
> -rw-r- 1 root shadow 850 2008-10-24 13:31 /etc/s
Goran Dobosevic wrote:
>
>
> Andrei Popescu wrote:
>> On Wed,29.Oct.08, 09:51:43, Goran Dobosevic wrote:
>>
>>
>>> no, before few days yes.
>>>
>>
>> Somebody who knows KDE might help here.
>>
>>
>&g
Andrei Popescu wrote:
On Wed,29.Oct.08, 09:51:43, Goran Dobosevic wrote:
no, before few days yes.
Somebody who knows KDE might help here.
permissions of /etc/shadow are defolt i don't know how to changed them :-)
Just to make sure everything is as it shou
On Wed,29.Oct.08, 09:51:43, Goran Dobosevic wrote:
> no, before few days yes.
Somebody who knows KDE might help here.
> permissions of /etc/shadow are defolt i don't know how to changed them :-)
Just to make sure everything is as it should be. Please show the output
of 'l
Andrei Popescu wrote:
On Wed,29.Oct.08, 07:15:12, Goran Dobosevic wrote:
Hi,
I'm new to linux and have Debian Lenny for 3 month. Today when i was open
kde user manager so i can add my self to fuse group I got this massages:
Error opening /etc/shadow for reading.
kde user manager was
On Wed,29.Oct.08, 07:15:12, Goran Dobosevic wrote:
> Hi,
> I'm new to linux and have Debian Lenny for 3 month. Today when i was open
> kde user manager so i can add my self to fuse group I got this massages:
> Error opening /etc/shadow for reading.
> kde user manager was open
Hi,
I'm new to linux and have Debian Lenny for 3 month. Today when i was
open kde user manager so i can add my self to fuse group I got this
massages:
Error opening /etc/shadow for reading.
kde user manager was open without root pasword
edit my accaunt->add to fuse group->ok
C
On Tue, Apr 10, 2007 at 05:52:19AM -0700, ann kok wrote:
> --- Douglas Allan Tutty <[EMAIL PROTECTED]> wrote:
> > On Mon, Apr 09, 2007 at 12:47:23PM -0700, ann kok
> > wrote:
> > >
> > > why the permission of the shadow file in debian is
> > > 64
:
> > Hi all
> >
> > why the permission of the shadow file in debian is
> > 640?
> > and
> > how can I upgrade the kernel?
> > eg: 686 kernel
>
> 1.What do you think the permissions of shadow
> should be? The only
> user who needs to read
On Mon, 2007-04-09 at 17:37 -0700, Bob McGowan wrote:
[snip]
> One might wonder why it isn't just 600, if the only user needing access
> is root? The answer may be in the permissions and owner/group:
>
>-rw-r----- 1 root shadow
>
> It would appear there are (
Douglas Allan Tutty wrote:
On Mon, Apr 09, 2007 at 12:47:23PM -0700, ann kok wrote:
Hi all
why the permission of the shadow file in debian is
640?
---deleted
1. What do you think the permissions of shadow should be? The only
user who needs to read /etc/shadow is root, that is the
On Mon, Apr 09, 2007 at 12:47:23PM -0700, ann kok wrote:
> Hi all
>
> why the permission of the shadow file in debian is
> 640?
> and
> how can I upgrade the kernel?
> eg: 686 kernel
1. What do you think the permissions of shadow should be? The only
user who needs t
Hi all
why the permission of the shadow file in debian is
640?
and
how can I upgrade the kernel?
eg: 686 kernel
Thank you
Don't get soaked. Take a quick peek at the forecast
with the Yahoo! Search we
On Monday 25 September 2006 20:40, Steve Kemp wrote:
> > But these are in /etc/passwd There is no /etc/shadow file.
> > Apart from creating the /etc/shadow file, how do i create shadow
> > passwords?
>
> /sbin/shadowconfig on
Thanks Steve.
--
Regist
what I am missing? How can I automate the
shadow file modification?
Thank you so much
Kind Regards
Siju
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Mon, Sep 25, 2006 at 08:21:30PM +1000, M-L wrote:
> But these are in /etc/passwd There is no /etc/shadow file.
> Apart from creating the /etc/shadow file, how do i create shadow passwords?
/sbin/shadowconfig on
Steve
--
Debian GNU/Linux System Administration
http://www.
My Etch installer doesn't finish the installation, so i have to just reboot,
and create my own passwords and such from the shell, and a few other things
by hand.
But these are in /etc/passwd There is no /etc/shadow file.
Apart from creating the /etc/shadow file, how do i create s
edit and where to menction this. We are planning to migrate from redhat webserver to debian webserver with apache 2.x and i am planning to copy the existing shadow password file from redhat machine to debian machine.It will work without any problem in debian with the same user names and passwords
Just updated the exim4 package in sarge. It is now unable to
authenticate using PAM if shadow passwd is being used. Looks like a
perimission issue of some type (possbly coupled with now running as
Debian-exim)
is this a bug or is there a configuratiom missing?
thanks
--
To UNSUBSCRIBE
On Mon, 2003-12-01 at 02:59, LeVA wrote:
> Hello!
>
> I need to add users to a passwd/shadow file, but these files does not
> reside in /etc dir. Thus I can not use the adduser or useradd tool to
> add the users, because then they will be added to the /etc/passwd|shadow
> f
(IDU:IDG) to its.
If you would like its I send to you.
PS: My scritp is in portuguese from Brazil and sorry for my English.
Gilberto
Em Mon, 01 Dec 2003 08:59:37 +0100
LeVA <[EMAIL PROTECTED]> escreveu:
> Hello!
>
> I need to add users to a passwd/shadow file, but these files does
Hello!
I need to add users to a passwd/shadow file, but these files does not
reside in /etc dir. Thus I can not use the adduser or useradd tool to
add the users, because then they will be added to the /etc/passwd|shadow
file, and my passwd/shadow files are in another directory. These
passwd
Hello!
I need to add users to a passwd/shadow file, but these files does not
reside in /etc dir. Thus I can not use the adduser or useradd tool to
add the user, because they will add it to the /etc/passwd|shadow file. I
managed to create a passwd file, and wrote the user name and uid, and
Hello all,
Sorry it's my mistake.
I found the problem already, it's due to number of columns in /etc/shadow
created by my script is wrong. So when I copied it into the new server's
/etc/shadow,
it caused error.
Thanks.
Regards,
Simon.
Simon Tneoh Chee-Boon wrot
Hello all,
After I created users on a new server, I tried to copy their data from
an old server's /etc/shadow
to this new server's /etc/shadow file, so that user can login with the
same password to this new server.
I tried it, but it failed and given me this error message:
Auth
Hi Sunny,
funny you should ask... I looked into this a week ago.
dpkg-reconfigure passwd
(See ya next time at the nylug list :-))
-Kev
On Sat, 6 Sep 2003, Sunny Dubey wrote:
> Hi guys
>
> I have a debian woody machine, that doesn't use MD5 nor shadow. So I was
> wondering h
Hi guys
I have a debian woody machine, that doesn't use MD5 nor shadow. So I was
wondering how I could get my debian machine to use MD5 and shadow.
I know I can't convert passwords from one form to another, but that isn't a
problem for me.
Thanks for any info!!!
Sunny Dubey
"Mark A. F." <[EMAIL PROTECTED]> writes:
>
> Here are the forced Shadow RAM settings:
>
> F000 - (System BIOS)
> E800 - EFFF (Rapid Resume BIOS)
> E000 - E7FF (System POST)
>
> Upper Memory Boundary F200
>
> I am workin
On Fri, Feb 28, 2003 at 03:48:51AM -0500, Mark L. Kahnt wrote:
> "Who knows what system data lies in the heart of the BIOS - the Shadow
> RAM knows - Haaa, Haaa, Haaa"
That laugh is not evil enough :-)
--
Nathan Norman - Incanus Networking mailto:[EMAIL PROTECTED]
There'
On Fri, Feb 28, 2003 at 03:48:51AM -0500, Mark L. Kahnt wrote:
> "Who knows what system data lies in the heart of the BIOS - the Shadow
> RAM knows - Haaa, Haaa, Haaa"
>
> If you don't get that one, you don't know your classic radio dramas.
Or managed to so far
On Thu, 2003-02-27 at 21:05, Mark A. F. wrote:
> Hi. I am not able to disable shadow RAM through the BIOS on my IBM Aptiva 2161
> Pentium 166 PC.
>
> Here are the forced Shadow RAM settings:
>
> F000 - (System BIOS)
> E800 - EFFF (Rapid Resume BIOS)
>
On Thu, Feb 27, 2003 at 09:05:18PM -0500, Mark A. F. wrote:
> What misbehaviors might I experience due to these settings?
While I haven't personally had experiance with such (broken) hardware
that shadowing couldn't be turned off, I would expect one of three
things to happen...
1) It Just Works(t
Hi. I am not able to disable shadow RAM through the BIOS on my IBM Aptiva 2161
Pentium 166 PC.
Here are the forced Shadow RAM settings:
F000 - (System BIOS)
E800 - EFFF (Rapid Resume BIOS)
E000 - E7FF (System POST)
Upper Memory Boundary F200
I am working through my
services numbers?
2.
Does the following response to ypcat shadow expected?
$ ypcat shadow
No such map shadow. Reason: No such map in server's domain
$
Is this message is another way of saying `permission denied'?
I believe that a map shadow is there. Should I add a
Hi,
I am about to physically change some machines from slink to potato.
Can I simply copy the passwd, shadow, gshadow and group files over to the
new machine and have it work, or do I have to laboriousely enter them again.
The allowed downtime of these machines is zero, so I do not want to just
Joey,
Do; man pwconvand you can read all about turning on shadow
passwords, and you guessed it pwunconcv turns it back off.
John
-Original Message-
From: Joey Hess [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 28, 2001 9:35 PM
To: Ross Smith
Cc: debian-user
Ross Smith wrote:
> But I can't find any mention of turning on shadow passwords.
>
> Any help would be greatly appreciated.
its even easier then that! check the manpage on pwconv.
nate
--
:::
ICQ: 75132336
http://www.aphroland.org/
http://www.linuxpowered.net/
[EMAIL PROTECTED]
Ross Smith wrote:
> But I can't find any mention of turning on shadow passwords.
shadowconfig on
Note that you can also use dpkg-reconfigure base-config to re-see some
of the questions it asked at install time.
--
see shy jo
I recently installed 2.2r0 and said no to the shadow/MD5 questions during
installation 'cause I was gonna install NIS.
Now I'd like to turn on shadow & MD5 passwords. It seems that turning on MD5
passwords is as simple as
# /etc/pam.d/login:
password required pam_unix.so
I'm having trouble getting INN to run such that it requires userid/password
to get access to it. I suspect this is because it doesn't have permission
to read the /etc/shadow file, but I don't know why. I've tried adding
news to the shadow group. I've tried setting t
On Tue, Mar 20, 2001 at 05:00:39PM -0600, Kevin Long wrote:
>
> - Original Message -
> From: "Ethan Benson" <[EMAIL PROTECTED]>
> To:
> Sent: Monday, March 19, 2001 5:50 PM
> Subject: Re: Changing to MD5 shadow passwords?
>
> md5 hashes sh
- Original Message -
From: "Ethan Benson" <[EMAIL PROTECTED]>
To:
Sent: Monday, March 19, 2001 5:50 PM
Subject: Re: Changing to MD5 shadow passwords?
md5 hashes should work regardless of what hash passwd will create.
however some time ago it was dis
On Mon, Mar 19, 2001 at 10:04:20AM -0500, R. Ransbottom wrote:
> I would like to convert all of my
> Debian 2.0 and 2.2 systems to MD5
> shadow passwords. If I understand
> the docs correctly all that needs doing
> is to add md5 to the apropriate lines
> in /etc/pam.d/pas
I would like to convert all of my
Debian 2.0 and 2.2 systems to MD5
shadow passwords. If I understand
the docs correctly all that needs doing
is to add md5 to the apropriate lines
in /etc/pam.d/passwd and /etc/pam.d/login.
Is this correct?
rob Live the dream.
A few month ago I had the same problem, and a lot of people here solved
all my doubts... there are the abstract of the 'Samba Passwords Amazing
History':
Situation:
1. Samba allows the use of PAM (aka shadow passwords if you
configure it) and authentification through
is no /etc/samba/smbpasswd
and this was an option from sambaconfig.
I have read that the problem may be that Samba is not complied for shadow
passwords? I believe I chose these when originally installing potato. I do not
know how to create /etc/samba/smbpasswd. The command smbpasswd reports an err
Ciao Richard Cobbe,
> department's NIS server on a Solaris box upstairs. This works just fine
> with RH 6.2, so I'm guessing it'll be fine with potato, but confirmation
> before the install would be nice.
>
> Will that work?
I don't know if this may be usefull, but here there is the following
s
>>>>> "Paul" == Paul Schulz <[EMAIL PROTECTED]> writes:
Paul> I can ypcat all of the other maps, except for shadow. (This
Paul> is expected as there is some encryption happening.) I need
Paul> to have an /etc/shadow file on the client. If I
Greetings,
Does anyone have shadow passwords working under NIS? on a default
potato install?
I have two freshly squeezed potato boxes, on which I am trying to
set up NIS (server, client).
I have followed the setup documentation (which is good)
'/usr/doc/nis/nis.debian.howto.gz'
e
Richard Cobbe wrote:
Lo, on Thursday, January 25, Nate Amsden did write:
Pedro Pereira wrote:
Hi.
I have NIS installed and working good on my LAN.
But I'd like to install shadow passwords as well.
I've tried it, but as I compile the NIS maps, the users aren't no longe
Nate Amsden wrote:
> you can search the www for how to do NIS+ in linux but the process seems
> quite involved if your not using a supported distro like SuSE (since i
> think
> most of the NIS+ development is done by SuSE employees ..) i tried doing
> it with debian 2.0 ..and..ended up reinstallin
Lo, on Thursday, January 25, Nate Amsden did write:
> Pedro Pereira wrote:
> >
> > Hi.
> > I have NIS installed and working good on my LAN.
> > But I'd like to install shadow passwords as well.
> > I've tried it, but as I compile the NIS maps, t
Pedro Pereira wrote:
>
> Hi.
> I have NIS installed and working good on my LAN.
> But I'd like to install shadow passwords as well.
> I've tried it, but as I compile the NIS maps, the users aren't no longer
> able to login :(
> Could somebody please help me?
Hi.
I have NIS installed and working good on my LAN.
But I'd like to install shadow passwords as well.
I've tried it, but as I compile the NIS maps, the users aren't no longer
able to login :(
Could somebody please help me?
Thanks.
--
Pedro Pereira
[EMAIL PROTECTED]
Linux do DEEC - FEUP
> look at /usr/share/base-passwd/*.master and make sure your passwd files
> are consistent, resolve any conflicts by relocating your accounts/groups
> to higher uid/gid ranges.
Also get rid of your 'ppp' group and put the users who you want to have ppp
privileges is the dip group (gid 30). It exi
On Tue, Jan 09, 2001 at 10:24:14AM +1100, Marc-Adrian Napoli wrote:
> hi,
>
> why, when i have the following:
>
> machine:/etc# ls -la shadow
> -rw-r-1 root root 1761 Jan 9 10:34 shadow
>
> and then i run "passwd" to change my pasword are
On Tue, Jan 09, 2001 at 10:24:14AM +1100, Marc-Adrian Napoli wrote:
> why, when i have the following:
>
> machine:/etc# ls -la shadow
> -rw-r-1 root root 1761 Jan 9 10:34 shadow
>
> and then i run "passwd" to change my pasword are the p
hi,
why, when i have the following:
machine:/etc# ls -la shadow
-rw-r-1 root root 1761 Jan 9 10:34 shadow
and then i run "passwd" to change my pasword are the permissions changed as
such:
machine:/etc# ls -la shadow
-rw-r-1 root ppp 1761 Ja
On Wed, Oct 18, 2000 at 11:33:17PM -0400, Chris Gray wrote:
> On Wed, Oct 18, 2000 at 11:04:32PM -0400, Chris Gray wrote:
> > On Wed, Oct 18, 2000 at 04:48:16PM -0700, Peter Jay Salzman wrote:
> > > sorry, but i'm trying to write some tools for beowulf administration.
> > >
> > > consider the prog
On Wed, Oct 18, 2000 at 11:04:32PM -0400, Chris Gray wrote:
> On Wed, Oct 18, 2000 at 04:48:16PM -0700, Peter Jay Salzman wrote:
> > sorry, but i'm trying to write some tools for beowulf administration.
> >
> > consider the program:
> > printf("Usage: encrypt salt password\n");
On Wed, Oct 18, 2000 at 04:48:16PM -0700, Peter Jay Salzman wrote:
> sorry, but i'm trying to write some tools for beowulf administration.
>
> consider the program:
> printf("Usage: encrypt salt password\n");
> strncpy(password, crypt(argv[1], salt), 49);
argv[
}
here's an example:
# ./a.out 12345678 mypassword
$1$12345678$f8QoJuo0DpBRfQSD0vglc1
this is suspicious to begin with. the salt appears in the encrypted
password?ok, whatever. i put it in /etc/shadow and try to log in using
a password of "mypassword"
$
I'm trying to get 'potato' up-and-running on a box that thought it
would have Windoze, a Compaq Presario 4660. CMOS says 2 instances of
shadow RAM are present, but doesn't provide a way to turn that
'feature' off. Debian gets as far as the line about "freeing u
startx.log` .
> Using xdm neither unprivileged-user or root can login
Does xdm report something?
> Using startx just root can login
What do you mean by "can login"? Start X?
> I read in the LinuxFAQ that it might be due to use of non-shadow
> password programs (as startx
it might be due to use of non-shadow
> password programs (as startx, X, xinit, etc). Since I'm using
> shadow-password "protection" in my system, I think this could be the
> problem.
>
> Does anybody know what version of xfree86 has this shadow-password
> c
Could anybody help me? I can't start an X session as unprivileged
user.
Using xdm neither unprivileged-user or root can login
Using startx just root can login
I read in the LinuxFAQ that it might be due to use of non-shadow
password programs (as startx, X, xinit, etc). Since I'm usi
On Fri, May 12, 2000 at 11:58:36AM +0800, Andrew McRobert wrote:
> hi all
>
> ... does anyone know the configure option to compile samba with shadow
> password support? (It's not listed on the samba.org site with all the other
> options).
>
Can you even do this? I th
hi all
... does anyone know the configure option to compile samba with shadow
password support? (It's not listed on the samba.org site with all the other
options).
thanks
ANdrew
-
Andrew McRobert LLB B.Sc(Comp. Sci)
IT Officer, School o
On Sat, Jan 08, 2000 at 10:00:09PM +, Joseph Heenan wrote:
> I'm running the latest potato, and it behaves correctly for me.
> ypcat shadow.byname shows the file when run as root, but not when run
> as a normal user. For lack of a better suggestion, perhaps try
> upgrading to the potato nis pa
esist:) grabbed the potato version and much to my
embarrishment it was just a matter of configuration. fortunately
hiding the shadow files is now default, so i just followed potato
and put "* : shadow : port" into /etc/ypserv.conf and all is swell
--
groetjes, carel
>>>>> "Joseph" == Joseph Heenan <[EMAIL PROTECTED]> writes:
>> I've installed NIS, but I can't prevent the shadow file of
>> being public now:( Anybody on my machine can do "ypcat
>> shadow.byname" and start crack
In message <[EMAIL PROTECTED]>
Carel Fellinger <[EMAIL PROTECTED]> wrote:
> in return of installing Debian GNU/Linux I got my father's old 486,
> so now I've this problem connecting my machines:)
>
> I've installed NIS, but I can't p
Hai,
in return of installing Debian GNU/Linux I got my father's old 486,
so now I've this problem connecting my machines:)
I've installed NIS, but I can't prevent the shadow file of being
public now:( Anybody on my machine can do "ypcat shadow.byname" and
sta
On Fri, Oct 15, 1999 at 02:06:05AM -0700, Martin Waller wrote:
> Hello,
>
> I have on old 486 on which I installed debian (slink) (any excuse), but
> forgot my root password. So I went in and edited /etc/passwords, where
> there were 'x's fro the password fields.
>
> Then I changed the root pa
'x's are ther because you have shadow installed, so you need to
delete rootpassword in /etc/shadow as you have done in passwd. set back
password in passwd to the 'x'. that should work. you may take a look to
manpages for shadow (man -k shadow), especially to pconv/pwunconv and
s
Hello,
I have on old 486 on which I installed debian (slink) (any excuse), but
forgot my root password. So I went in and edited /etc/passwords, where
there were 'x's fro the password fields.
Then I changed the root password after deleting the 'x' in root's
/etc/passwords entry.
But now, t
*- On 31 Aug, Patrick Kirk wrote about "Re: Forgotten root password HELP using
shadow passwords"
>> Assuming you're not using shadow passwords, you'll need to boot from the
>
> Thanks for the reply.
>
> I am using shadow passwords. Does that mean I'm
1 - 100 of 275 matches
Mail list logo