On Freitag, 23. März 2012, Petter Reinholdtsen wrote:
Could the problem be that the passwords are too short? Kerberos rejects
passwords shorter than 6 characters.
if thats not enforced in gosa, it should be.
--
To UNSUBSCRIBE, email to debian-edu-requ...@lists.debian.org
with a subject of
On Sat, Mar 24, 2012 at 09:23:42AM +0100, Holger Levsen wrote:
On Freitag, 23. März 2012, Petter Reinholdtsen wrote:
Could the problem be that the passwords are too short? Kerberos
rejects passwords shorter than 6 characters.
if thats not enforced in gosa, it should be.
Providing too
[Steven Chamberlain]
Hi,
The timestamps in syslog are confusing. Seems like they are
interchangeably UTC or localtime.
Yes. The syslog messages from /target/ have localtime, and the ones
from d-i have UTC.
Anyway, assuming the log entries are the right order, it looks like
OpenLDAP got
On Tue, Mar 20, 2012 at 10:47:40PM +0100, Andreas B. Mundt wrote:
On Tue, Mar 20, 2012 at 10:00:43PM +0100, Petter Reinholdtsen wrote:
[Andreas B. Mundt]
Just remove the -maxlife option completely. Use something like:
kadmin.local -q add_policy -minlength 4 -minclasses 2 user
[Wolfgang Schweer]
Yes, in other words the default value seems to be 0.
So one could set it back to the default by executing
kadmin.local -q modpol -maxlife 0secs users
New user accounts should then have: Password expiration date: [none]
It even affected old users:
root@tjener:~#
[Petter Reinholdtsen]
So one could set it back to the default by executing
kadmin.local -q modpol -maxlife 0secs users
New user accounts should then have: Password expiration date: [none]
It even affected old users:
Gah, my mistake. pere was the first user, which si not affected by
On Sat, Mar 24, 2012 at 04:02:59PM +0100, Petter Reinholdtsen wrote:
[Petter Reinholdtsen]
So one could set it back to the default by executing
kadmin.local -q modpol -maxlife 0secs users
New user accounts should then have: Password expiration date: [none]
It even affected old
[Wolfgang Schweer]
Please check this script.
Seem to work fine on my test server, but I propose a slightly more
efficient grep line and a bit more robust handling of the first user.
Also propose to add more information in the comment to have an idea
four year from now that the script is
Petter Reinholdtsen a écrit, le 23/03/2012 21:11:
Could the problem be that the passwords are too short? Kerberos rejects
passwords shorter than 6 characters.
At first I discarded that explanation, for the passwords were all 6+
letters, then I thought again : I often use spaces within the
[Samuel Krempp]
If it is too much of hassle to support space characters within
passwords, that should be emphasized in the manual (and in the GOsa²
interface too).
Can you update
URL: http://wiki.debian.org/DebianEdu/Documentation/Squeeze with
some text you would have found useful?
On a
Accepted:
debian-edu-config-gosa-netgroups_1.454~svn77153_all.deb
to
pool/local/d/debian-edu-config/debian-edu-config-gosa-netgroups_1.454~svn77153_all.deb
debian-edu-config_1.454~svn77153.dsc
to pool/local/d/debian-edu-config/debian-edu-config_1.454~svn77153.dsc
Petter Reinholdtsen a écrit, le 24/03/2012 22:25:
[Samuel Krempp]
If it is too much of hassle to support space characters within
passwords, that should be emphasized in the manual (and in the GOsa²
interface too).
Can you update
URL: http://wiki.debian.org/DebianEdu/Documentation/Squeeze
[Samuel Krempp]
sure, I'll add a warning against using spaces in passwords.
Great.
I'll try to experiment and see what's happening exactly : does the space
results in only the first 'word' being used as password, for everything
? Or maybe the whole password is being used for gosa and
The (translated) debian-edu-squeeze manual as PDF or HTML is available at
http://maintainer.skolelinux.org/debian-edu-doc/
To understand this mail better, please read
/usr/share/doc/debian-edu-doc/README.
This mail is automatically send by a cronjob run by Holger Levsen every two
weeks. Please
14 matches
Mail list logo