Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Shadow Password POP3 and FTP

Posted on 1997-08-28
3
Medium Priority
?
377 Views
Last Modified: 2013-12-23
I recently installed Shadow Passwords, now I trying to compile this program and I'm getting these errors:

(pop3d+shadow+elf)

cbs-net:/tmp/usr/src/pop3# make all
cc -o in.pop3d main.o folder.o util.o valid.o -lshadow
/usr/i486-linux/bin/ld: cannot open -lshadow: No such file or directory
make: *** [pop3d] Error 1

I'm getting a simular error with wu-ftpd-2.4-fixed.

Help!
0
Comment
Question by:cbsnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 200 total points
ID: 1582351
Where is your libshadow.a located? Add the appropriate libary path to your cc command, like:
cc -Lyour_path -o ..

0
 

Author Comment

by:cbsnet
ID: 1582352
I corrected the problem with shadow.h and libshadow.a however I'm still getting these errors.

Making support library.
rm -rf libsupport.a
gcc  -O2 -I/usr/include/bsd  -m486 -pipe -c getusershell.c fnmatch.c strcasestr
ar cq libsupport.a getusershell.o fnmatch.o strcasestr.o strerror.o authuser.o o
ranlib libsupport.a

Making ftpd.
gcc -O2 -I.. -I../support -I/usr/include/bsd -I/usr/include/netinet -L../supporo
glob.c: In function `matchdir':
glob.c:240: dereferencing pointer to incomplete type
make: *** [glob.o] Error 1

0
 

Author Comment

by:cbsnet
ID: 1582353
Is the second error the result of an improper path?
0

Featured Post

Simplify Your Workload with One Tool

How do you combat today’s intelligent hacker while managing multiple domains and platforms? By simplifying your workload with one tool. With Lunarpages hosting through Plesk Onyx, you can:

Automate SSL generation and installation with two clicks
Experience total server control

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question