From owner-freebsd-security Fri Feb 23 13:32:41 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id NAA12921 for security-outgoing; Fri, 23 Feb 1996 13:32:41 -0800 (PST) Received: from teamos2.org (NS.TEAMOS2.ORG [205.233.74.98]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id NAA12894 for ; Fri, 23 Feb 1996 13:32:28 -0800 (PST) Received: (from james@localhost) by teamos2.org (8.6.12/8.6.12) id QAA12976; Fri, 23 Feb 1996 16:33:39 -0500 Date: Fri, 23 Feb 1996 16:33:37 -0500 (EST) From: James FitzGibbon To: Rashid Karimov cc: Brian Tao , freebsd-security@FreeBSD.ORG Subject: Re: Informing users of cracked passwords? In-Reply-To: <199602231535.KAA08081@rk.ios.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG Precedence: bulk On Fri, 23 Feb 1996, Rashid Karimov wrote: > Looks like the way to go with 1000 accounts. > Is there a passwd program which will force person > to use one of the generated passwords ? I think it > would be very useful ... There's an excellent passwd replacement written in PERL that's part of chapter 6 of "Programming Perl". It does bad words, pattern matching, checking against reversed logins, other people's logins, GECOS fields, etc. Being PERL, it could easily be changed to generation of passwords (if that's what you want - I personally don't like it). I believe one can get the source to the programs in that book as a tar file - the perl FAQ has the location j. ---------------------------------------------------------------------------- James FitzGibbon james@teamos2.org TeamOS/2 Online admin Voice:(416)410-0100 Fax:(416)410-0100 ----------------------------------------------------------------------------