home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!europa.asd.contel.com!emory!ogicse!reed!nelson
- From: nelson@reed.edu (Nelson Minar)
- Newsgroups: comp.security.misc
- Subject: Re: unhappy about overloading finger
- Message-ID: <1992Jul23.051821.3648@reed.edu>
- Date: 23 Jul 92 05:18:21 GMT
- References: <199207230140.AA18677@fnord.wang.com> <1992Jul23.032058.3292@reed.edu> <dank.711867106@blacks.jpl.nasa.gov>
- Organization: Reed College, Portland, OR
- Lines: 16
-
- In article <dank.711867106@blacks.jpl.nasa.gov> dank@blacks.jpl.nasa.gov (Dan Kegel) writes:
- >nelson@reed.edu (Nelson Minar) writes:
- >>A far more common way for accounts to be cracked is for someone to
- >>steal your YP password file
- >With Sun's latest patches, YP is supposed to be fairly secure;
- >nobody can get your passwd map that you don't want to.
-
- Did Sun provide patches for my Ultrix machines, my Dynix boxes, and my
- stupid NeXT machines? How about patches to the bugs that probably
- exist in NeXT's netinfo? And how about patches to the other devious
- ways people can think to coerce password files out of YP?
-
- I think it's safer to assume your password file is world readable.
- --
- __
- nelson@reed.edu \/ Love under will
-