home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.ultrix
- Path: sparky!uunet!gatech!hubcap!hubcap
- From: hubcap@hubcap.clemson.edu (System Janitor)
- Subject: Re: Related note: was ``Ultrix ENHANCED vs "normal" UNIX passwords''
- Message-ID: <1992Dec15.174516.21739@hubcap.clemson.edu>
- Organization: Clemson University
- References: <1992Dec4.143408.25483@hubcap.clemson.edu> <Bz8LzI.H43@alsvid.nr.une.edu.au> <1992Dec14.172940.4214@hubcap.clemson.edu> <2B2D261F.23293@news.service.uci.edu>
- Date: Tue, 15 Dec 1992 17:45:16 GMT
- Lines: 19
-
- iglesias@draco.acs.uci.edu (Mike Iglesias) writes:
- >If it's any consolation to you, using Sun's shadow password files doesn't
- >work with NIS (YP) either. There's a semi-good reason too: why bother
- >having shadow password files if anyone can use ypcat to get a copy of
- >the file with the encrypted passwords in it?
-
- It's no consolation :-). It apparently doesn't work anywhere, so you can't
- say that if it did work, then you'd be able to get the encrypted passwords.
- If I wrote it (I'm busy this afternoon, maybe tomorrow :-), ypcat passwd
- would get you:
-
- joe:*:10:20:Joe Blow:/usr/users/jblow:/dev/null
-
- ...not:
-
- joe:123456789abcd:10:20:Joe Blow:/usr/users/jblow:/dev/null
-
-
- -Mike
-