From owner-freebsd-security Fri Oct 12 11: 8:22 2001 Delivered-To: freebsd-security@freebsd.org Received: from webs1.accretive-networks.net (webs1.accretive-networks.net [207.246.154.13]) by hub.freebsd.org (Postfix) with ESMTP id 2769637B401 for ; Fri, 12 Oct 2001 11:08:14 -0700 (PDT) Received: from localhost (davidk@localhost) by webs1.accretive-networks.net (8.11.1/8.11.3) with ESMTP id f9CH4aj85541; Fri, 12 Oct 2001 10:04:36 -0700 (PDT) Date: Fri, 12 Oct 2001 10:04:36 -0700 (PDT) From: David Kirchner X-X-Sender: To: "Haapanen, Tom" Cc: Subject: Re: FreeBSD 4.4 and DES In-Reply-To: <6B3C6B6F7AA2D511A35E0080C86993435962@syncro.metrics.com> Message-ID: <20011012100315.A85958-100000@localhost> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Fri, 12 Oct 2001, Haapanen, Tom wrote: > murcielago 125 # passwd tomh > > Changing local password for tomh. > New password: > Retype new password: > passwd: cannot set password cipher: Undefined error: 0 > passwd: /etc/master.passwd: unchanged > murcielago 126 # This would be a hack, but you could leave your MD5 libraries where they are and then create the DES crypt manually (either by using 'htpasswd' or crypt() itself) and then insert it in to your password file via vipw. FreeBSD's crypt, as I understand it, automatically recognizes MD5 and DES crypts. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message