From owner-freebsd-hackers Sat Jul 24 7:19:51 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from gratis.grondar.za (gratis.grondar.za [196.7.18.65]) by hub.freebsd.org (Postfix) with ESMTP id E5A2414D4B for ; Sat, 24 Jul 1999 07:19:42 -0700 (PDT) (envelope-from mark@grondar.za) Received: from grondar.za (localhost [127.0.0.1]) by gratis.grondar.za (8.9.3/8.9.3) with ESMTP id QAA59106; Sat, 24 Jul 1999 16:17:51 +0200 (SAST) (envelope-from mark@grondar.za) Message-Id: <199907241417.QAA59106@gratis.grondar.za> To: Keith Stevenson Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: PAM & LDAP in FreeBSD Date: Sat, 24 Jul 1999 16:17:50 +0200 From: Mark Murray Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Quoth "Keith Stevenson": > (Mark Murray: jump in here if I get this wrong) > > The way I understand it, a PAM module (pam_unix?) would need to be able to > look at the password hash and figure out which of the crypt functions to > call. Ideally, the PAM configuration would be able to specify which crypt > functions are valid for the system. I'm sure this could be done. I'm not sure that it is PAM's job. I'll look at it. > That said, one of the very attractive features of specifying the crypt > function in the login class is the ability to assign different crypt > algorithms on a user by user basis. ...or group... M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message