Bug 17476

Summary: KiscStart: Encrypted password placed into wrong file
Product: [Retired] Red Hat Linux Reporter: Andrei Ivanov <iva>
Component: bootpcAssignee: Erik Troan <ewt>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 6.2CC: jem
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2002-07-15 16:37:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Andrei Ivanov 2000-09-13 19:28:28 UTC
KickStart'ed with the following in my ks.cfg file (ks=floppy):

  auth --useshadow
  rootpw --iscrypted AaAUb94kU3J3w

After successfull installation logged in ... without root's password.
This is what I've got in passwd/shadow:

  # grep ^root: /etc/passwd /etc/shadow
  /etc/passwd:root:AaAUb94kU3J3w:0:0:root:/root:/bin/bash
  /etc/shadow:root::11213:0:99999:7:::

As workaround used the following code in ks.cfg:

#----- cut here --------------------------
cp /etc/passwd /tmp/passwd
sed -e /^root:/s/root:[^:]*:/root:x:/ /tmp/passwd > /etc/passwd
cp /etc/shadow /tmp/shadow
sed -e "/^root:/s*root::*root:`grep '^root:' /tmp/passwd|cut -d: -f2`:*" \
       /tmp/shadow > /etc/shadow
rm -f /tmp/passwd /tmp/shadow
#----- cut here --------------------------

Comment 1 Brock Organ 2000-09-14 13:57:49 UTC
this is a known issue and was resolved via a new boot disk ... thanks for your
report!

please see http://www.redhat.com/support/errata/RHBA-2000010-01.html
for details ...

Comment 2 Andrei Ivanov 2000-09-14 17:35:27 UTC
I'm sorry, but you're wrong, guys, in your supposition that you've resolved this
bug :-( Just downloaded boot-20000407.img and copied it onto floppy disk.
Tried to kickstart computer with auth/rootpw as above twice - exactly the
same picture. Then tried this:

  auth --useshadow --enablemd5
  rootpw --iscrypted $1$F3mDOWtl$0hLycXBk.40arokEzLuG11

Exactly the same!!! Encrypted password stored in /etc/passwd, and 2nd entry
in /etc/shadow remains empty.

Comment 3 Erik Troan 2000-09-29 16:14:41 UTC
This wasn't fixed by the boot disk -- sorry for the misleading response. This is
still broken in 7.0 afaik. Brock, can you verify this is broken in 7.0?