Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Feb 1996 16:17:05 -0500 (EST)
From:      William Bulley <web@merit.edu>
To:        yankee@anna.az.com
Cc:        freebsd-security@freebsd.org, roberto@keltia.freenix.fr, ngps@cbn.com.sg, james@teamos2.org, rashid@rk.ios.com, taob@io.org
Subject:   Re: Informing users of cracked passwords?
Message-ID:  <199602262117.QAA09158@ohm.merit.edu>
In-Reply-To: <Pine.BSF.3.91.960226071728.2045A-100000@anna.az.com> from "az.com" at Feb 26, 96 07:51:06 am

next in thread | previous in thread | raw e-mail | index | archive | help
According to az.com:
> 
> Perhaps it would be nice project to try to upgrade FreeBSD's password
> authentication and add an option which would move it away from the host
> and onto a separate system and also allow it to check for qualified
> passwords. The system's design would make it impossible in any way for
> even the owner of the authentication server to know what the real or
> encrypted version of the passwords were.  (The first idea is similar to
> cisco TACACS or XYLOGICS Annex's ACP_PASSWD, the second idea is mine (or
> undoubtedly someone else's too?)) 

I would recommend RADIUS for this job.  I would be willing to give some
informal quidance to those interested in doing the actual work...

Regards,

web...

-- 
William Bulley, N8NXN              Senior Systems Research Programmer
Merit Network Inc.                 Domain: web@merit.edu
4251 Plymouth Road                 MaBell: (313) 764-9993
Ann Arbor, Michigan  48105-2785    Fax:    (313) 747-3185



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602262117.QAA09158>