Hi,
there is a solution to the famous swat problem.
Thank you Frank Wortner for the realy good reply :)
In my experience, Samba SWAT on Tru64 assumes that root's password is
in the C2 authentication database. I've gotten around this by loading
the Enhanced Security sets, but not enabling enhanced security.
Instead, I just did:
# EDITOR=/bin/vi /tcb/bin/edauth root
Then I changed the u_pwd field to match root's password from the
/etc/password file. Suddenly, SWAT worked!
If the u_pwd field does not exist, create it and add the password string
from /etc/passwd
to it.
Example:
..
u_pwd=Qxxxxxx:\
..
Be cautious when using SWAT. Remember that unless you modify SWAT to
use SSL, root's password will be traveling over your network in clear
text. You might want to consider changing the system root password
after you get SWAT to work. Changing the password in /etc/password
won't affect the one in the C2 database.
References:
man prpasswd, man edauth
Have fun...
Bernd Schwarzkugler
UNIX Spezialist
IBEX Digitale Systeme AG
Tel: 08207-9611-418
Received on Fri Apr 19 2002 - 11:49:24 NZST