On Tue, 8 Dec 1998 [EMAIL PROTECTED] wrote:
>
> No, it's based on RedHat, though they take more pains to make sure it is
> stable and secure. Including the use of shadow passwords. (And, no,
> you don't have a choice on this. Which annoys me a little, but not
> nearly so much as RedHat's not giving you a choice the other way. At
> least, I can't recall being given a choice, and since my RH5.1 install
> doesn't have them, I'd assume it didn't.)
>
What gave you that idea? Run pwconv on redhat systems and you have shadow
passwords. Same procedure as used on System V since the shadow password
file support was introduced. With PAM on redhat you could theoretically
use any password validation you desire if you find or implement the proper
PAM module.
Villy
-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]