Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Feb 1996 00:11:14 -0500 (EST)
From:      Brian Tao <taob@io.org>
To:        Jim Dennis <jimd@mistery.mcafee.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Informing users of cracked passwords?
Message-ID:  <Pine.BSF.3.91.960228000422.20007F-100000@zip.io.org>
In-Reply-To: <199602280504.VAA05385@mistery.mcafee.com>

index | next in thread | previous in thread | raw e-mail

On Tue, 27 Feb 1996, Jim Dennis wrote:
> 
> 	According to this the standard shadow password suite has an
> 	option in the semantics of the /etc/shadow file to specify 
> 	an additional or alternative authentication program (as well
> 	as all that password aging and account expiration stuff).

    BSD/OS 2.1 has implemented login classes (defined in the pw_class
member of the standard passwd struct) to this end.  It allows for
additional authentication in addition to the traditiional UNIX
password scheme (typically one-time password or challenge-response
schemes).  The /etc/login.conf file lets you specify user classes, the
authentication model they follow as well as other aspects such as
maximum memory usage, maximum per-process CPU time, minimum and
maximum password lengths, etc.

    It would be nice if FreeBSD could adopt this format, since this is
the first commercial use (AFAIK) of the pw_class field in a
master.passwd entry.
--
Brian Tao (BT300, taob@io.org)
Systems Administrator, Internex Online Inc.
"Though this be madness, yet there is method in't"



home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960228000422.20007F-100000>