On Tue, 23 Apr 2002 18:56:51 -0700
Kevin <[EMAIL PROTECTED]> wrote:

> if you're using libpam-cracklib it could be related to this
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=112965&repeatmerged=yes
> 
> 
> 

Thank you so much,

After reading that bug report I realized that I was using libpam-cracklib to 
re-inforce password strength checking as recomemded in the Securing Debian 
Manual. 

Once I had booted into a root shell, deleted the root's password field in 
/etc/passwd and /etc/shadow, and edited /etc/pam.d/passwd and /etc/pam.d/login, 
I was able to change the root password.

What still bothers me is that bug report was filled against Patato, and I'm 
running Woody, yet the bug is still present. What happens when Woody goes 
stable and multiple sysadmins start using the bugged version libpam-cracklib on 
their servers?

Should'nt this be brought up to some developpers attention?

Again, thanks for all our help :D

Stef


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to