home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!utcsri!dgp.toronto.edu!flaps
- Newsgroups: alt.security
- From: flaps@dgp.toronto.edu (Alan J Rosenthal)
- Subject: Re: passwd security check
- Message-ID: <1992Jul23.113410.25479@jarvis.csri.toronto.edu>
- References: <1992Jul22.190827.30077@iitmax.iit.edu>
- Date: 23 Jul 92 15:34:10 GMT
- Lines: 22
-
- technews@iitmax.iit.edu (Kevin Kadow) writes:
- >Can somebody point me to a program that will do a security "audit" on the passwd
- >file, e.g. reporting (either in a file or as e-mail to the concerned parties)
- >when 2 or more accounts have the same password, and other "holes" that would
- >not be found by crack?
-
- apart from the big security problem others have pointed out, you can't do this
- without cracking the two individual passwords anyway, unless they were
- encrypted with the same salt (if the randomization is good, just one chance
- in 4096).
-
- >R.E. crack- is there a good reason not to simply build a file consisting of the
- >crypted and uncrypted entries for an entire dictionary?
-
- yeah, because it would be 4097 times as big as an entire dictionary rather than
- just 2 times, due to the salt. but you can do this using an exabyte drive.
-
- >what is the meaning of accounts in passwd that have simply * as their password?
-
- they're blocked from login, but programs like "ls" can still recognize them, so
- you can see that the file is/was owned by fred even though his account has been
- disabled, rather than it saying "user 356" which you forget who it is.
-