Hi, When defining a queue for lpd using a SMB (Win95) printer, it uses a ".config" file that store a username and password for printing on the SMB server. Is there a way (as anybody tried and how to) to configure the lpd so the username and password used to print on the SMB server are the unix login and password of the user printing (password databases are synchronized), so the job on the SMB server is really owned by the user who is printing. ThanXXX =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Michel APPLAINCOURT | E-mail : michel.applaincourt@umh.ac.be Computer Sciences Assistant | Phone : 32 65 373498 Universite de Mons-Hainaut | Fax : 32 65 373318 [Sad...But True] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Michel Applaincourt schrieb:> > Hi, > > When defining a queue for lpd using a SMB (Win95) printer, it uses a > ".config" file that store a username and password for printing on the SMB > server. > Is there a way (as anybody tried and how to) to configure the lpd so the > username and password used to print on the SMB server are the unix login > and password of the user printing (password databases are synchronized), > so the job on the SMB server is really owned by the user who is printing.No. There is no way to get the cleartext password either from the unix or the Samba password database. Hmm, it might be possible to write a smbclient that is able to use the encrypted passwords in Samba's password file for login on a SMB server. Nobody has done this yet, however. Bye, N. Pueschel
Hi This would not work, because the unix-password are encrypted by an one-way-hash funktion. With today's computers it's NOT possible to get the clear-text password from the /etc/passwd or /etc/shadow file, no is it possible to convert the password to the encryption used by WIndows. However, you could patch the passwd programm, so that it saves the clear-text or windows-encrypted password somewhere. This could than be used for printing. If you are really concerned about security, you should not do this, because the encryption used by windows is known to be weak. mfg, fgp ____________________________________________________________ E-Mail: fgp@fgp.atnet.at (Mail me for my PGP 5.0 public key) ____________________________________________________________ This Mail was created with: __ ___ / / / / / / \_/ / / ___ ___ __ __ __ __ / / / / / /__ / / / / \ \/ / / / / / / __ \ / / / / \ / / ----/ / / / / / / / /__/ / / \ /_______/ /__/ /__/ /__/ /______/ /__/\__\
Dan, On Wed, 29 Apr 1998 08:28:20 +1000, Dan Stromberg wrote:>How many times must I say this?Not once.>To a student of computability, one-way-hashes are decryptable, it's just that >this decryption is not a "tractable problem". A decryption function clearly >exists, it is just not one that can be evaluated in polynomial time.In the context of this list this seems to be completely irrelevant. Regards, Robert -- --------------------------------------------------------------- Robert.Dahlem@frankfurt.netsurf.de Radio Bornheim - 2:2461/332@fidonet +49-69-4930830 (ZyX, V34) 2:2461/326@fidonet +49-69-94414444 (ISDN X.75) ---------------------------------------------------------------
Robert Dahlem wrote:> In the context of this list this seems to be completely irrelevant.Well, I guess this list does not really need protection from people who think that it is up to them to decide what is relevant and what is not. This has to do with tolerance. Detlef
Maybe Matching Threads
- Help URGENT : Password for IPC$ and public shares - Working solution
- Help URGENT : Password for IPC$ and public shares - more info
- [NOT SUBJECT] need information about Profiles for multiple users
- What does this mean ?
- Need help with 'Cannot find setup.exe Windows needs this file to