On Mon, 6 Jan 2003, Stacey Conrad wrote: > Here is the trace file from poppassd run on the command line, after I've > already hacked the hell out of P1:
Trace the chained passwd command too. (Strace -f on linux to see child processes). Odds are high that the reject is happening in the passwd call, so you're missing where the action is. Bear in mind that poppassd usually runs suid root, as does the call to passwd, and that the chat sequence for unprivileges users running passwd is usually different to that seen by the superuser. That tripped me up when we were porting poppassd to linux several years ago...
