update to 3.30

This commit is contained in:
Ivana Hutarova Varekova 2010-11-05 09:43:44 +01:00
parent a23ebf05bf
commit ccd62f9a20
4 changed files with 20 additions and 16 deletions

2
.gitignore vendored
View File

@ -1,3 +1,3 @@
man-pages-posix-2003-a.tar.bz2
/man-pages-additional-20101006.tar.bz2
/man-pages-3.29.tar.bz2
/man-pages-3.30.tar.bz2

View File

@ -1,24 +1,25 @@
--- man-pages-2.48/man5/passwd.5.pom 2007-04-13 00:42:49.000000000 +0200
+++ man-pages-2.48/man5/passwd.5 2007-05-11 10:33:22.000000000 +0200
@@ -46,11 +46,20 @@
diff -up man-pages-3.30/man5/passwd.5.pom man-pages-3.30/man5/passwd.5
--- man-pages-3.30/man5/passwd.5.pom 2010-11-01 15:55:41.000000000 +0100
+++ man-pages-3.30/man5/passwd.5 2010-11-05 09:33:57.000000000 +0100
@@ -45,11 +45,20 @@ hardware was too slow to crack a well-ch
basic assumption used to be that of a friendly user-community.
These days many people run some version of the shadow password suite, where
.I /etc/passwd
-has asterisks (*) instead of encrypted passwords,
+has "x" instead of encrypted passwords,
and the encrypted passwords are in
.I /etc/shadow
.IR /etc/shadow ,
which is readable by the superuser only.
.PP
+If the encrypted password, whether in /etc/passwd or in /etc/shadow, is
+an empty string, login is allowed without even asking for a password.
+Note that this functionality may be intentionally disabled in applications,
+or configurable (for example using the "nullok" or "nonull" arguments to
+pam_unix.so).
+If the encrypted password, whether in /etc/passwd or in /etc/shadow, is.
+an empty string, login is allowed without even asking for a password..
+Note that this functionality may be intentionally disabled in applications,.
+or configurable (for example using the "nullok" or "nonull" arguments to.
+pam_unix.so)..
+.PP.
+If the encrypted password in /etc/passwd is "*NP*" (without the quotes),.
+the shadow record should be obtained from a NIS+ server..
+.PP
+If the encrypted password in /etc/passwd is "*NP*" (without the quotes),
+the shadow record should be obtained from a NIS+ server.
+.PP
Regardless of whether shadow passwords are used, many sysadmins
Regardless of whether shadow passwords are used, many system administrators
use an asterisk in the encrypted password field to make sure
that this user can not authenticate him- or herself using a

View File

@ -3,7 +3,7 @@
Summary: Man (manual) pages from the Linux Documentation Project
Name: man-pages
Version: 3.29
Version: 3.30
Release: 1%{?dist}
License: GPLv2+ and GPL+ and BSD and MIT and Copyright only and IEEE
Group: Documentation
@ -120,6 +120,9 @@ rm -rf $RPM_BUILD_ROOT
%lang(en) %{_mandir}/en/man*/*
%changelog
* Fri Nov 5 2010 Ivana Hutarova Varekova <varekova@redhat.com> - 3.30-1
- update to 3.30
* Mon Oct 25 2010 Ivana Hutarova Varekova <varekova@redhat.com> - 3.29-1
- update 3.29
several bug fixes

View File

@ -1,3 +1,3 @@
7c78aff03c0a6767ba483d34f19e4b09 man-pages-posix-2003-a.tar.bz2
6cea268fa2debf9b6440ee5c37cd4bc8 man-pages-additional-20101006.tar.bz2
a3728993981c335888e67ad6e146d6fe man-pages-3.29.tar.bz2
1396a2ba9079d7457122605155ae22b4 man-pages-3.30.tar.bz2