This is the mail archive of the cygwin mailing list for the Cygwin project.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

RE: Non-trusted domain user causes mkpasswd and mkgroup to fail

Matt Seitz (matseitz) wrote:
>"Long, Phillip GOSS" <> wrote in
>>Maybe if U map a drive to a share on a machine in the neopath domain
>>using a neopath domain account, the security token your process gets


>When I first ran into this, I had already used Windows Explorer to
>map a
>drive letter to a file server in the non-trusted domain.  However,
>"mkpasswd" did not use that existing SMB session.  Instead it was


I did a little poking around in old '.bash_history' files, and if
what I found combined with my memory (always questionable!) is
accurate, what I did was to use 'runas' in a CMD window to log on as
the user in the other (untrusted, IIRC) domain and run 'mkpasswd'
and 'mkgroup' from there, with the output re-directed to a temporary
file.  The accounts from there can then be added to /etc/passwd and
/etc/group.  It's not much, but HTH!

Goss ... Innovation for Business

NOTICE: This e-mail and any attachment(s) may contain confidential and proprietary information of Goss International Corporation and/or its subsidiaries and may be legally privileged. This e-mail is intended solely for the addressee. If you are not the addressee, dissemination, copying or other use of this e-mail or any of its content is strictly prohibited and may be unlawful. If you are not the intended recipient please inform the sender immediately and destroy the e-mail and any copies. All liability for viruses is excluded to the fullest extent permitted by law. Any views expressed in this message are those of the individual sender. No contract may be construed by this e-mail.

Unsubscribe info:
Problem reports:

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]