- 论坛徽章:
- 0
|
谢谢楼上的答复!\r\n\r\n网上搜到这个信息,copy过来share一下,根据其所说,我在linux上执行了\r\nauthconfig --disablemd5 --useshadow --kickstart\r\n后用passwd重置下密码,shadow文件中的散列值就变成了DES加密的了,就是短的那种了,问题解决!\r\n\r\nTheo Van Dinter wrote:\r\n> On Sat, Oct 15, 2005 at 05:04:48PM -0700, Mike Noble wrote:\r\n> \r\n>>I would like to know if there is any way to make the Linux and Solaris\r\n>>work together with out producing problems, therefore a user can change\r\n>>their password on either Solaris or Linux. If moving the NIS master and\r\n>>slaves to Linux will fix the problem then I will be more than willing to\r\n>>do it.\r\n> \r\n> \r\n> My understanding of how things work is that the client encrypts the\r\n> password before sending it to the master (verified via ltrace).\r\n> So the OS of the master really doesn\'t matter. It\'s worth\r\n> mentioning that Solaris 9 seems to support the MD5 hashes:\r\n> http://docs.sun.com/app/docs/doc/816-4883/6mb2joasj?a=view\r\n> \r\n> I had to deal with this at work once (Solaris 2.6 - 9 and various Linux\r\n> varients), but it\'s been so long I forget the details. My recollection\r\n> is that basically you disable MD5 authentication altogether (you can\r\n> still verify MD5 passwords, but new/changed passwords will be DES --\r\n> even for local accounts).\r\n> \r\n> For all my new Linux machines, I use kickstart, and just make sure the\r\n> config doesn\'t enable md5.\r\n> \r\n> For already existing systems, my notes indicate that I ran:\r\n> authconfig --disablemd5 --useshadow --kickstart\r\n> \r\n> A detail I haven\'t quite figured out yet is that some of my boxes have md5\r\n> enabled, but yppasswd does DES. Strange.\r\n\r\nBy forcing the users to use yppasswd will solve the problem. This is\r\neasily done by removing the x bit from other on the linux boxes.\r\n\r\nNow does anybody know of problems with having a Linux (RHEL4 WS) as an\r\nNIS slave to a Master running on Solaris 9?\r\n\r\nThanks,\r\nMike\r\n> \r\n> Hope this helps. \r\n> |
|