SUMMARY: samba swat bad authentication

From: Schwarzkugler, Bernd <bernd_schwarzkugler_at_ibex-ag.de>
Date: Fri, 19 Apr 2002 13:28:45 +0200

Hi,

there is a solution to the famous swat problem.

Thank you Frank Wortner for the realy good reply :)

In my experience, Samba SWAT on Tru64 assumes that root's password is
in the C2 authentication database. I've gotten around this by loading
the Enhanced Security sets, but not enabling enhanced security.
 Instead, I just did:

    # EDITOR=/bin/vi /tcb/bin/edauth root

Then I changed the u_pwd field to match root's password from the
/etc/password file. Suddenly, SWAT worked!

If the u_pwd field does not exist, create it and add the password string
from /etc/passwd
to it.

Example:
..
u_pwd=Qxxxxxx:\
..

Be cautious when using SWAT. Remember that unless you modify SWAT to
use SSL, root's password will be traveling over your network in clear
text. You might want to consider changing the system root password
after you get SWAT to work. Changing the password in /etc/password
won't affect the one in the C2 database.

References:

man prpasswd, man edauth


Have fun...

Bernd Schwarzkugler
UNIX Spezialist
IBEX Digitale Systeme AG
Tel: 08207-9611-418
Received on Fri Apr 19 2002 - 11:49:24 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:43 NZDT