On 9/20/05, Wade Naveja <[EMAIL PROTECTED]> wrote:
> I did get it working, though.  My problem turns out to have been of my
> own making as opposed to anything wrong or broken with OTRS.  It turns out
> that this particular FreeBSD server's crypt_default value had been
> modified from the default of md5 and des to use the blowfish algorithm.

Ah, yes, that would do it.

[snip]
> My only request would be to add a comment in the docs or faq about
> FreeBSD users being able to shoot themselves in the foot this way.  This
> probably isn't the right list to make such a request, so I'll do that
> elsewhere.

Perhaps just an OS-independant note that DES password support is
required in the system's crypt() call for the default [EMAIL PROTECTED]
password to work. Hopefully that'd tweak the memory of anyone who's
been changing their system crypt() settings. :)

If you're sufficiently interested, you could submit a diff to the docs
in a bug on http://bugs.otrs.org/.

Bryan
_______________________________________________
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
Support oder Consulting für Ihr OTRS System?
=> http://www.otrs.de/

Reply via email to