[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: systematic Kerberization

On Wed, 2004-05-12 at 12:44, Matthew Miller wrote:
> On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote:
> > The standard way I have seen it implemented on other versions of Linux
> > (here and other large organizations) is that the central authentication
> > is used first in the pam stack and if it fails/isnt available you get
> > authorized against the local password db which if it works lets you in.
> "Other versions" including Red Hat Linux up until it suddenly stopped
> working circa version 7.3.
> <https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55193>

I just posted this on that bugzilla:

In September 2002 I went to a AUUG conference and listened to a talk
"Polythene PAM ain't what she used to be". This problem was described
then. Nalin is mentioned in the paper.


I don't know if the workaround in the paper solves the problem.

Norman Gaywood, Systems Administrator
School of Mathematics, Statistics and Computer Science
University of New England, Armidale, NSW 2351, Australia

norm turing une edu au            Phone: +61 (0)2 6773 2412
http://turing.une.edu.au/~norm    Fax:   +61 (0)2 6773 3312

Please avoid sending me Word or PowerPoint attachments.
See http://www.fsf.org/philosophy/no-word-attachments.html

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]