Happy Hogmanay/New Year/etc...,

My rc.firsttime script highlighted a change on 6.0's usermod:

<root@oak:tmp 0># fgrep operator /etc/master.passwd
operator:*:2:5::0:0:System &:/operator:/sbin/nologin
<root@oak:tmp 0># usermod -L daemon -p '*************' -s /bin/ksh operator
usermod: Invalid password: `*'
<root@oak:tmp 0> (1) # uname -a
OpenBSD oak.britvault.co.uk 6.0 GENERIC#1917 i386
<root@oak:tmp 0># pkg_info -I passwdqc
passwdqc-1.3.0p1    complexity checker for passwd(1) and password generator


Could this be related to commit 112 of user.c?

Remove the encrypted password length check.  The admin should be
able to put whatever they like in the encrypted password field,
regardless of whether it can be matched or not.  Having this check
just makes it harder to add new encrypted password functions.
This also fixes "usermode -Z" which was the impetus for the change.

http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/user/user.c.diff?r1=1.111&r2=1.112&f=h

Or do I need to do it differently now?

Cheers,
-- 
Craig Skinner | http://linkd.in/yGqkv7

Reply via email to