*BSD News Article 11718


Return to BSD News archive

Received: by minnie.vk1xwt.ampr.org with NNTP
	id AA1996 ; Wed, 24 Feb 93 13:00:32 EST
Path: sserve!manuel.anu.edu.au!munnari.oz.au!news.Hawaii.Edu!ames!agate!agate!usenet
From: rich@rice.edu (Richard Murphey)
Newsgroups: comp.os.386bsd.announce
Subject: Further XFree82 1.2 for 386BSD Errata
Followup-To: comp.os.386bsd.apps
Date: 22 Feb 1993 23:31:42 -0800
Organization: Department of Electrical and Computer Engineering, Rice
	University
Lines: 30
Sender: cgd@agate.berkeley.edu
Approved: 386bsd-announce-request@agate.berkeley.edu
Message-ID: <RICH.93Feb22230613@omicron.Rice.edu>
Reply-To: Rich@rice.edu
NNTP-Posting-Host: agate.berkeley.edu
Apparently-To: comp-os-386bsd-announce@ncar.ucar.edu
Status: O



The following item has been added to the errata.

There are revised README.386BSD and XFree86-1.2-386BSD-errata files
and an xdm linked with crypt_dummy.c in /pub/incoming/XFree86-1.2 on
agate.berkeley.edu (128.32.136.1).  If you don't see it there, Chris
has moved it to /pub/386BSD/0.1-ports/XFree86-1.2.  Rich


  
5: xdm in XFree86-1.2-bin.tar.Z uses des (encryption) contrary to the
  README.386BSD.
  
  This distribution was unintentionally built with a working crypt
  (des).  If you have replaced crypt on your system (see Chris
  Demetriou's /usr/386bsd.errata/crypt.instructions) and use encrypted
  passwords you can use the xdm binary in XFree86-1.2-bin.tar.Z.
  
  If you have not replaced crypt, get XFree86-1.2-xdm-nodes.tar.Z and
  install the xdm it contains. Otherwise xdm will not accept passwords.
  This latter xdm binary uses the 386BSD 0.1's dummy crypt routine that
  prints the message 'Crypt not present in system' in the xdm-errors
  file each time a user logs in.  You can ignore this.  It merely tells
  you that passwords in /etc/passwd are unencrypted.
  

--
Please send submissions for comp.os.386bsd.announce to:
					386bsd-announce@agate.berkeley.edu