On Wed, Apr 16, 2003 at 09:21:59PM +0100, Shri Shrikumar wrote:
| Hi,
|
| I am trying to get exim authenticate users before relaying and would
| like to use PAM.
Do you use shadow passwords?
Are you trying to use pam_unix.so (specified in /etc/pam.d/exim)?
| Can anyone who has done this before shed some light on this.
Only root can read the password hash stored in /etc/shadow. exim
can't. (exim performs the check as EXIM_USER, often named "mail")
You have a few options depending on your goals :
1) allow the user 'mail' to read /etc/shadow
2) maintain a copy which user 'mail' can read
3) use a different pam method for authentication
HTH,
-D
--
You can't assign IP address 127.0.0.1 to the loopback adapter,
because it is a reserved address for loopback devices
(Microsoft Windows XP - P R O F E S S I O N A L)
http://dman.ddts.net/~dman/
Attachment:
pgpy519PDlBmz.pgp
Description: PGP signature