[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: RFC: A UNIX crypt(3) replacement
On Sun, 17 Nov 1996, Dave Kinchlea wrote:
> On Sun, 17 Nov 1996, The Deviant wrote:
>
> > On Sun, 17 Nov 1996, Adam Shostack wrote:
> > > A longer salt would make running crack against a large
> > > password file slower.
> >
> > While thats all well and good, it shouldn't be necisary. If passwords are
> > shadowed, one must have root access before one can run crack against the
> > password list, at which time it is innefective.
>
> I couldn't disagree more (not that I necessarily agree or disagree with
> Adam's approach). Sure, once you have root you don't need any other
> access, until the hole is found and closed that gave root in the first
> place. After that, that /etc/shadow file with the lousy passwords (that
> seem inevitable with folks using /etc/shadow as they get complacent
> with a false sense of security) provide the would-be cracker with a set
> of local accounts to (try to) break in again. Local accounts are
> definitely an advantage should you be looking for way to break any Unix
> variant.
>
> The moral of the story is: ALWAYS ensure that whatever passwords you
> have on your unix system are not beatable by crack, don't rely upon
> hiding them because if you are wrong you are in it up to your neck!
>
> cheers, kinch
>
Oh.. you misunderstand what I'm saying... I'm not saying its unemportant
for you to have good passwords or anything like that, I'm just pointing
out that rather than replace the entire system, its more prudent to fully
install it.
I still think admins should run crack against their own lists, etc., but
that still shouldn't be a problem to a good cracker. If you've just
gotten root on a system, you start backdooring everything, not trying to
crack the password list.
--Deviant
Even God cannot change the past.
-- Joseph Stalin