Date: Mon, 26 Feb 1996 16:17:05 -0500 (EST) From: William Bulley <web@merit.edu> To: yankee@anna.az.com Cc: freebsd-security@freebsd.org, roberto@keltia.freenix.fr, ngps@cbn.com.sg, james@teamos2.org, rashid@rk.ios.com, taob@io.org Subject: Re: Informing users of cracked passwords? Message-ID: <199602262117.QAA09158@ohm.merit.edu> In-Reply-To: <Pine.BSF.3.91.960226071728.2045A-100000@anna.az.com> from "az.com" at Feb 26, 96 07:51:06 am
next in thread | previous in thread | raw e-mail | index | archive | help
According to az.com: > > Perhaps it would be nice project to try to upgrade FreeBSD's password > authentication and add an option which would move it away from the host > and onto a separate system and also allow it to check for qualified > passwords. The system's design would make it impossible in any way for > even the owner of the authentication server to know what the real or > encrypted version of the passwords were. (The first idea is similar to > cisco TACACS or XYLOGICS Annex's ACP_PASSWD, the second idea is mine (or > undoubtedly someone else's too?)) I would recommend RADIUS for this job. I would be willing to give some informal quidance to those interested in doing the actual work... Regards, web... -- William Bulley, N8NXN Senior Systems Research Programmer Merit Network Inc. Domain: web@merit.edu 4251 Plymouth Road MaBell: (313) 764-9993 Ann Arbor, Michigan 48105-2785 Fax: (313) 747-3185
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602262117.QAA09158>