He didn't type it in "from memory."
He randomly chose a salt and a password and
used his mind to create the hash using the
same hash function that Solaris uses! Three
minutes to Wapner. Yeah. About a hundred
dollars. Yeah.
The only thing I can think of on the "position"
issue is that the code that reads /etc/passwd
and /etc/shadow might go a little wonky if
the two files weren't in sync (e.g., /etc/shadow
has a like for "bgates" but a corresponding
entry is missing from /etc/passwd). If /etc/passwd
and /etc/shadow WERE in sync (same logins and the
logins are in the same order in both files),
then that would be quite a stumper.
I remember waay back on SCO Unix that its
security subsystem wasn't happy if /etc/passwd,
/etc/group, and the tcb ("trusted" computing
base (ja, right!)) weren't consistent.
D
* On Tue, Jan 02, 2001 at 01:31:19PM -0700,
sinck@ugive.com wrote:
>
>
> \_ As long as you are not moving the passwords, yes. It seems the
> \_ passwords are dependent upon position (based on experience where
> \_ I tried to delete a user using vi on /etc/passwd, and every user
> \_ after that position could no longer log in; I restored that user and
> \_ all of the others could log in again).
>
> Urk...that's new behaviour...I remember the good old days when I saw
> someone stop-a a sun, bring it back up single user, type in the
> encrypted password string *from memory* and had a viable user when it
> came up all the way.
>
> On an unrelated humor note:
>
> http://news.bbc.co.uk/hi/english/world/middle_east/newsid_1097000/1097631.stm
>
> David