On Mon, 1 Oct 2007 09:47:37 +0200
Bertram Scharpf <[EMAIL PROTECTED]> wrote:

> Hi,
> 
> Am Sonntag, 30. Sep 2007, 20:15:06 -0500 schrieb Dan Farrell:
> > On Sun, 30 Sep 2007 04:30:11 +0200
> > Bertram Scharpf <[EMAIL PROTECTED]> wrote:
> > > Now I detect there are users in passwd that don't have a
> > > shadow entry...
> > that makes sense, because some users aren't allowed to log in.  For
> > example: 
> > |  man:x:13:15:man:/usr/share/man:/bin/false
> > the man user can't log in.  the shell is /bin/false.  
> 
> I detected it because there is a warning message in case
> there is _no_ shadow entry. Instantiating an _empty_ shadow
> entry makes it disappear:
> 
>   myhost ~ # su - man
>   su: Authentication service cannot retrieve authentication
>   info.
>   (Ignored)
>   myhost ~ # su - portage
>   su: Authentication service cannot retrieve authentication
>   info.
>   (Ignored)
>   myhost ~ # vi /etc/shadow
>   myhost ~ # grep portage /etc/shadow
>   portage:!:13784:0:99999:7:::
>   myhost ~ # su - portage
>   myhost ~ # echo $?
>   1
>   myhost ~ #                    
> 
> 
> Bertram
> 
> 
You cannot 'su' to that user because they don't have authentication
info.  In other words, a missing password is not the same as an empty
password.  

I wonder if you could run a program as a particular user if they only
had authentication info in shadow?  I am guessing not, since they
wouldn't have an associated uid, group, and so on.  But, if possible,
it would explain the situation.
-- 
[EMAIL PROTECTED] mailing list

Reply via email to