Re: Unix Application,

From: Pranay Kanwar (warl0ck@metaeye.org)
Date: Mon May 21 2007 - 12:59:59 EDT


Hi,

1) The rationale is very simple, Openness,simple and compatible.

 a) Since it does not hide anything the model is open to evaluation
    and better feedback.
 b) Simple in the sense working on it with out without standard
    programs is easy.
 c) If you copy /etc/passwd and /etc/shadow to other systems
    you won't break anything, provided the UID's and GID's are the
    same intended. Though i would never recommend this.

2) Yes users will be still forced to change the password
independent of the shell.

regards

warl0ck // MSG
http://www.metaeye.org

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:49 EDT