Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Jul 1999 14:00:36 -0400
From:      Keith Stevenson <k.stevenson@louisville.edu>
To:        freebsd-hackers@freebsd.org
Subject:   Re: PAM & LDAP in FreeBSD
Message-ID:  <19990721140036.A26960@homer.louisville.edu>
In-Reply-To: <19990721105724.F1520@fisicc-ufm.edu>; from Oscar Bonilla on Wed, Jul 21, 1999 at 10:57:24AM -0600
References:  <199907201520.LAA29350@cs.rpi.edu> <Pine.BSF.4.10.9907210141030.41996-100000@morden.rebel.net.au> <19990721094711.C1520@fisicc-ufm.edu> <37960FEF.E6DBD6C0@pobox.com> <19990721105724.F1520@fisicc-ufm.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Jul 21, 1999 at 10:57:24AM -0600, Oscar Bonilla wrote:

<Lots snipped>

> 
> I don't see where the modularized crypt would fit in then...
> i totally agree that pam has this capability i was just trying to fit
> in the crypt stuff people have been working on.

(Mark Murray:  jump in here if I get this wrong)

The way I understand it, a PAM module (pam_unix?) would need to be able to
look at the password hash and figure out which of the crypt functions to
call.  Ideally, the PAM configuration would be able to specify which crypt
functions are valid for the system.

That said, one of the very attractive features of specifying the crypt
function in the login class is the ability to assign different crypt
algorithms on a user by user basis.

Regards,
--Keith Stevenson--

-- 
Keith Stevenson
System Programmer - Data Center Services - University of Louisville
k.stevenson@louisville.edu
PGP key fingerprint =  4B 29 A8 95 A8 82 EA A2  29 CE 68 DE FC EE B6 A0


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990721140036.A26960>