On Mon, 10 Jul 2006, Alan J. Flavell wrote:
>
> Hang on - it's not supposed to, is it?  The whole point of /etc/shadow
> is to hide the crypted tokens away.  Then a mechanism is provided
> (PAM) for checking passwords without having to expose the shadow file.

PAM works using shared libraries. It doesn't provide any route around
Unix's usual security boundaries.

> A quick google suggests
> http://www.exim.org/pipermail/exim-users/Week-of-Mon-20011105/031830.html
> hope that's right, anyway.

That will be from the Exim 3 era when the Exim daemon kept root privilege.

Tony.
-- 
<[EMAIL PROTECTED]>   <[EMAIL PROTECTED]>   http://dotat.at/   ${sg{\N${sg{\
N\}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}\
\N}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}

-- 
## List details at http://www.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://www.exim.org/eximwiki/

Reply via email to