From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <14ec7b180707270937s2a97abe3l22d38d2e3f5af84f@mail.gmail.com> Date: Fri, 27 Jul 2007 10:37:17 -0600 From: "andrey mirtchovski" To: "Fans of the OS Plan 9 from Bell Labs" <9fans@cse.psu.edu> Subject: Re: [9fans] ssh host key In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <14ec7b180707270734v316923c2h710fe98af498d149@mail.gmail.com> Topicbox-Message-UUID: 97dd0d20-ead2-11e9-9d60-3106f5b1d025 invalidate the nvram first and make sure you set the secstore password correctly to the one that you have set for hostowner's user in secstored when it asks you on the next reboot. if you have done already then simply cat the nvram partition: you should be able to see it in full and in plain text and see if it's truncated. if the system and secstore passwords are different for hostowner perhaps there may be a bug in parsing the nvram. they are the same around here so i've never tested that condition. On 7/27/07, erik quanstrom wrote: > i get this error > > ladd# auth/secstore -nG factotum > ladd# echo $status > secstore 1517: invalid password in nvram > > however if i do it this way, it works: > > ladd# auth/secstore -G factotum > secstore password: > secstore > > > i have a longish password, but it doesn't exceed ANAMELEN. > does nvram truncate the password? are there any magic characters > which must be avoided? > > - erik >