> Daniel Parthey :
> The PAM documentation can be found at:
> http://www.linux-pam.org/Linux-PAM-html/
This one I have already visited, if the link colour in the browser is to
be belived. However it didn't make much of an impression at the time.
Now, however, after actually writing a PAM mo
> Steinar Bang :
> Professa Dementia :
>>> There are plugins that allow you to call some glue logic (Perl,
>>> Python, shell scripts, etc) which enables you to interface to pretty
>>> much any method (SQL, LDAP, shadow files, etc) you have chosen to
>>> save passwords - that is, as long as
Steinar Bang wrote:
> it is very hard to find documentation on what PAM modules exist,
> and how to write a new one, and if it is possible to chain modules in PAM
The PAM documentation can be found at:
http://www.linux-pam.org/Linux-PAM-html/
The Linux-PAM System Administrators' Guide
http://www.
On Tue, 14 May 2013 12:39:34 -0500
/dev/rob0 wrote:
> On Sun, May 12, 2013 at 05:40:10AM -0700, Professa Dementia wrote:
> > On 5/12/2013 4:17 AM, Steinar Bang wrote:
> > > I prefer not to use clear text passwords, even over an encrypted
> > > connection.
> >
> > Why? Enforce the encrypted link
On 5/14/2013 12:39 PM, /dev/rob0 wrote:
> On Sun, May 12, 2013 at 05:40:10AM -0700, Professa Dementia wrote:
>> On 5/12/2013 4:17 AM, Steinar Bang wrote:
>>> I prefer not to use clear text passwords, even over an encrypted
>>> connection.
>> Why? Enforce the encrypted link by not allowing unencryp
On Sun, May 12, 2013 at 05:40:10AM -0700, Professa Dementia wrote:
> On 5/12/2013 4:17 AM, Steinar Bang wrote:
> > I prefer not to use clear text passwords, even over an encrypted
> > connection.
>
> Why? Enforce the encrypted link by not allowing unencrypted
> connections. The simplest is iptab
> Steinar Bang :
> Professa Dementia :
>> There are plugins that allow you to call some glue logic (Perl, Python,
>> shell scripts, etc) which enables you to interface to pretty much any
>> method (SQL, LDAP, shadow files, etc) you have chosen to save passwords
>> - that is, as long as you
Professa Dementia skrev den 2013-05-12 14:40:
On 5/12/2013 4:17 AM, Steinar Bang wrote:
I prefer not to use clear text passwords, even over an encrypted
connection.
Why? Enforce the encrypted link by not allowing unencrypted
connections. The simplest is iptables to block ports 110 and 143,
> Professa Dementia :
> Also note that MD5, the basis for CRAM-MD5, is considered weak and no
> longer recommended. Thus, if you face an attacker that is sophisticated
> enough to crack the SSL / TLS connection, they very likely will have
> little problem with the CRAM-MD5 mechanism.
Well, y
On 5/12/2013 6:18 AM, Gedalya wrote:
> On 05/12/2013 08:40 AM, Professa Dementia wrote:
>> Avoid using a self signed certificate. Get a properly signed
>> certificate for your server. CheapSSLS.com has them for less than $10.
> Look also at https://www.startssl.com/
>
StartSSL is good - and fre
On 05/12/2013 08:40 AM, Professa Dementia wrote:
Avoid using a self signed certificate. Get a properly signed
certificate for your server. CheapSSLS.com has them for less then $10.
Look also at https://www.startssl.com/
On 5/12/2013 4:17 AM, Steinar Bang wrote:
> I prefer not to use clear text passwords, even over an encrypted
> connection.
Why? Enforce the encrypted link by not allowing unencrypted
connections. The simplest is iptables to block ports 110 and 143, while
allowing 993 and 995.
As long as the und
12 matches
Mail list logo