|
I accidentally used a password hash with a newline at the end (which I didn't notice because it was encased in an eyaml encrypted value). The user_role_add user provider for Solaris carries on and edits /etc/shadow (code) in a way that keeps adding an extra "days since 1970" value on every run.
specialops:bqaTovDgSOMEHASHVALUE/:16538:16538:16538:16538:16538:16538:16538::::::
|
After the error is corrected, the line stays in this corrupt form, and the user can't log in.
While it was an error on my part to pass it a newline, I think it'd be good if it could just fail fast without doing anything if the hash contains a newline, or anything else that might corrupt /etc/shadow (like a colon).
|