Re: Re: [suse-security] crypt()
Anyway, if you have somebody on your system that can steal the /etc/shadow file (which is only accessible by root) than your system is already lost.
my cent
Emmerich
not exactly, IHMO. Some people use NIS, for various reasons.
In this case, you do not have shadow protection, so choosing good passwords is crucial.
To make this point clear: I don't propose using weak passwords. I am also afraid of somebody entering one of my machines with guessable passwords. But I am not particularly afraid of him getting more access after he's already been able to do something on my machines (like stealing /etc/shadow). I consider systems (and therefor also networks) where an attacker has been able to do something (especially getting access to the /etc/shadow file) as cracked. The next tools the administrator on such a system should use are fdisk and mkfs. --emmerich
-----BEGIN PGP SIGNED MESSAGE----- I subscribe to that! - --- Bogdan Zapca System Administrator SC EcoSoft SA Internet Service Provider 1-7 Deva st, Cluj-Napoca, Romania Tel: +40 64 199696 PGP: http://www.itotal.ro/lupe@admin2.ecosoft.ro.pgp http://www.ecosoft.ro On Wed, 16 Aug 2000 emm@eggler.ch wrote:
To make this point clear: I don't propose using weak passwords. I am also afraid of somebody entering one of my machines with guessable passwords. But I am not particularly afraid of him getting more access after he's already been able to do something on my machines (like stealing /etc/shadow).
I consider systems (and therefor also networks) where an attacker has been able to do something (especially getting access to the /etc/shadow file) as cracked. The next tools the administrator on such a system should use are fdisk and mkfs.
--emmerich
--------------------------------------------------------------------- To unsubscribe, e-mail: suse-security-unsubscribe@suse.com For additional commands, e-mail: suse-security-help@suse.com
-----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBOZrV9dPv6ylvTc6pAQGSjAP/avy/CWvZou2PuXFmSOQ7XIDK7UJ42EGd G+/zExAY1XOgqxi0OTyIi2Ro4Cg6t5l7G2HEQjErnWdXsY1jUTl8VETrLNfaUw+z hOR5EKUUuk7t3AzNjFoMnc58RprW7qAqJtmCWwrPtUvn3CwXSESt7L68SMfUyDge 38k5Wq0Uy0o= =qJy+ -----END PGP SIGNATURE-----
participants (2)
-
Bogdan Zapca
-
emm@eggler.ch