From owner-freebsd-security Mon Feb 26 12:50:58 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id MAA15001 for security-outgoing; Mon, 26 Feb 1996 12:50:58 -0800 (PST) Received: from zip.io.org (root@zip.io.org [198.133.36.80]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id MAA14994 for ; Mon, 26 Feb 1996 12:50:55 -0800 (PST) Received: (from taob@localhost) by zip.io.org (8.6.12/8.6.12) id PAA00245; Mon, 26 Feb 1996 15:49:30 -0500 Date: Mon, 26 Feb 1996 15:49:30 -0500 (EST) From: Brian Tao To: Ollivier Robert cc: Ng Pheng Siong , james@teamos2.org, rashid@rk.ios.com, freebsd-security@FreeBSD.ORG Subject: Re: Informing users of cracked passwords? In-Reply-To: <199602260747.IAA05354@keltia.freenix.fr> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG Precedence: bulk On Mon, 26 Feb 1996, Ollivier Robert wrote: > > It seems that Ng Pheng Siong said: > > > > I believe ANLpasswd is an improvement on that. > > Except that it does not support shadowing schemes. Linking in libcrack with the standard passwd that comes with FreeBSD and BSD/OS works quite well for us (we're obviously using DES here). -- Brian Tao (BT300, taob@io.org) Systems Administrator, Internex Online Inc. "Though this be madness, yet there is method in't"