On Tue, 16 Oct 2001, Ken Hornstein wrote:

> >The program first tries to authenticate a user's password against the
> >Unix password database, and, failing that, tries Kerberos.  If that
> >succeeds, it obtains tickets.
>
> I don't want to critize your work, but it might be a good idea to make
> this configurable; this is the opposite order that nearly every
> other login-style utility I've seen does it.
>

- login.krb5 uses this order, and so does every other login I've
looked at. One of us is reading backwards....

- Booker C. Bense

Reply via email to