From owner-freebsd-security Mon Oct 18 21:44: 9 1999 Delivered-To: freebsd-security@freebsd.org Received: from kearneys.ca (cr1003527-a.rct1.bc.wave.home.com [24.113.36.145]) by hub.freebsd.org (Postfix) with SMTP id 4C2D815D4A for ; Mon, 18 Oct 1999 21:43:58 -0700 (PDT) (envelope-from brent@kearneys.ca) Received: (qmail 33419 invoked by uid 1000); 19 Oct 1999 04:46:45 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 19 Oct 1999 04:46:45 -0000 Date: Mon, 18 Oct 1999 21:46:45 -0700 (PDT) From: Brent To: security@freebsd.org Subject: PAM & cracklib Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Today I spent considerable time searching for the modules pam_cracklib and it's sidekick pam_pwdb (and libpwdb) that I could use with my FreeBSD-3.3 system. I found a lot of RPMs! :\ Are these modules secretly being ported somewhere? Is there an alternative, aside from analpasswd (which is brutal to set up), that can check "passwd" inputs against Alec Muffet's cracklib? Thanks for your help. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message