From owner-freebsd-bugs Thu Mar 1 17:54:20 2001 Delivered-To: freebsd-bugs@hub.freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 6E86D37B718; Thu, 1 Mar 2001 17:54:19 -0800 (PST) (envelope-from billf@FreeBSD.org) Received: (from billf@localhost) by freefall.freebsd.org (8.11.1/8.11.1) id f221sJc30623; Thu, 1 Mar 2001 17:54:19 -0800 (PST) (envelope-from billf) Date: Thu, 1 Mar 2001 17:54:19 -0800 (PST) From: Message-Id: <200103020154.f221sJc30623@freefall.freebsd.org> To: billf@FreeBSD.org, freebsd-bugs@FreeBSD.org, billf@FreeBSD.org Subject: Re: bin/25477: pam_radius fix to allow null passwords for challenge/response Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: pam_radius fix to allow null passwords for challenge/response Responsible-Changed-From-To: freebsd-bugs->billf Responsible-Changed-By: billf Responsible-Changed-When: Thu Mar 1 17:53:41 PST 2001 Responsible-Changed-Why: I have the capability to test this and I know a little something about challenge/response and radius.. http://www.freebsd.org/cgi/query-pr.cgi?pr=25477 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message