On Tue, 16 Oct 2001, Ken Hornstein wrote: > >The program first tries to authenticate a user's password against the > >Unix password database, and, failing that, tries Kerberos. If that > >succeeds, it obtains tickets. > > I don't want to critize your work, but it might be a good idea to make > this configurable; this is the opposite order that nearly every > other login-style utility I've seen does it. >
- login.krb5 uses this order, and so does every other login I've looked at. One of us is reading backwards.... - Booker C. Bense
