because I am not above asking...

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: plug@arcticmail.com
Date:  
Subject: because I am not above asking...
He didn't type it in "from memory."

He randomly chose a salt and a password and
used his mind to create the hash using the
same hash function that Solaris uses! Three
minutes to Wapner. Yeah. About a hundred
dollars. Yeah.

The only thing I can think of on the "position"
issue is that the code that reads /etc/passwd
and /etc/shadow might go a little wonky if
the two files weren't in sync (e.g., /etc/shadow
has a like for "bgates" but a corresponding
entry is missing from /etc/passwd). If /etc/passwd
and /etc/shadow WERE in sync (same logins and the
logins are in the same order in both files),
then that would be quite a stumper.

I remember waay back on SCO Unix that its
security subsystem wasn't happy if /etc/passwd,
/etc/group, and the tcb ("trusted" computing
base (ja, right!)) weren't consistent.


D

* On Tue, Jan 02, 2001 at 01:31:19PM -0700, wrote:
>
>
> \_ As long as you are not moving the passwords, yes. It seems the
> \_ passwords are dependent upon position (based on experience where
> \_ I tried to delete a user using vi on /etc/passwd, and every user
> \_ after that position could no longer log in; I restored that user and
> \_ all of the others could log in again).
>
> Urk...that's new behaviour...I remember the good old days when I saw
> someone stop-a a sun, bring it back up single user, type in the
> encrypted password string *from memory* and had a viable user when it
> came up all the way.
>
> On an unrelated humor note:
>
> http://news.bbc.co.uk/hi/english/world/middle_east/newsid_1097000/1097631.stm
>
> David