Bug 7290
Summary: | Users without password can no longer log in | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | maavl |
Component: | passwd | Assignee: | Cristian Gafton <gafton> |
Status: | CLOSED RAWHIDE | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 6.1 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2000-02-05 20:19:41 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
maavl
1999-11-24 14:39:13 UTC
from ridgewr1.mil (Richard Ridgeway). You will also notice that any attempt by root to alter any user whose password is set to null fails, i.e. "user1::100:20::/home/user1:/bin/tcsh". For example, when root enters the command "passwd user1", and then enters in a valid password twice as directed, the password field for user1 as shown above (::) does not change. However, if root places "junk" in the password field of the entry for user1, i.e. "user1:junk:100:20::/home/user1:/bin/tcsh", and then enters "passwd user1", and enters in a valid password twice as directed, the "junk" entry in the password field is replaced by the valid scrambled password, and all works OK. This example is from a RedHat v6.1 upgrade from 5.2 where the upgrade defaults of activating the /etc/shadow and MD5 (?) were not performed. This should be fixed in the latest pam/pwdb pacakges in Raw Hide. |