-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > On Wed, Sep 24, 2003 at 03:51:37PM +0100, Mark Watts wrote: > > > > > Alternatively, you may "patch" the support into whatever > > > > > distribution you have, using these packages: > > > > > > > > > > http://www.openwall.com/crypt/ > > > > > http://www.openwall.com/tcb/ > > > > > > > > > > Finally, we may do this work for you if it's paid for. ;-) > > > > > > > > Ok, working on the assumption that my managment aren't going to pay > > > > someone else... are there any patches around for Mandrake 9.1 ? > > > > > > I'm not aware of anything for Mandrake 9.1 specifically, but with some > > > C, Makefile, and RPM skills you should be able to apply the > > > crypt_blowfish package available at the URL I've referenced above. > > > > Bleh, I was so hoping you weren't going to say that :) > > Actually, it's mostly just Makefile and RPM skills. You don't need to > deal with C much. > > > Patching glibc looks easy, but patching everything else looks hard... > > You don't really have to patch "everything else", once you have > crypt_blowfish in your glibc, you can build our tcb suite and use > that (the NSS and PAM modules). Hmm, I might have a go at that (purely for entertainment value). We're probably going to reset everyones passwords and move people manually (its a mail server), and we don't have _that_ many people so... Cheers for the pointers - I might do this anyway as an exercise for the writer :) Mark. - -- Mark Watts Senior Systems Engineer QinetiQ TIM St Andrews Road, Malvern GPG Public Key ID: 455420ED -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/cbbxBn4EFUVUIO0RAhgbAKCNoBgMWkv/3WSKMAGHnEBL5sijgwCfe1Ts 3PDLFG03OA0OrnFQkmI7TE0= =FLK4 -----END PGP SIGNATURE----- _______________________________________________ Pam-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/pam-list