On Mon, 10 Jul 2006, Alan J. Flavell wrote:
>
> Hang on - it's not supposed to, is it? The whole point of /etc/shadow
> is to hide the crypted tokens away. Then a mechanism is provided
> (PAM) for checking passwords without having to expose the shadow file.
PAM works using shared libraries. It doesn't provide any route around
Unix's usual security boundaries.
> A quick google suggests
> http://www.exim.org/pipermail/exim-users/Week-of-Mon-20011105/031830.html
> hope that's right, anyway.
That will be from the Exim 3 era when the Exim daemon kept root privilege.
Tony.
--
<fanf@???> <dot@???>
http://dotat.at/ ${sg{\N${sg{\
N\}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}\
\N}{([^N]*)(.)(.)(.*)}{\$1\$3\$2\$1\$3\n\$2\$3\$4\$3\n\$3\$2\$4}}