home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!munnari.oz.au!uniwa!craig
- From: craig@ec.uwa.oz.au (Craig Richmond - division)
- Newsgroups: comp.sys.sun.admin
- Subject: Re: writing down root password
- Date: 20 Nov 1992 01:44:11 GMT
- Organization: The University of Western Australia
- Lines: 45
- Message-ID: <1ehftbINN5bc@uniwa.uwa.edu.au>
- References: <1dnuccINNgb@uniwa.uwa.edu.au> <janet.721445867@dunnart> <1992Nov11.220238.23297@grebyn.com> <1992Nov16.140310.4113@prism.poly.edu>
- NNTP-Posting-Host: decel.ecel.uwa.edu.au
-
- kapela@prism.poly.edu (Theodore S. Kapela) writes:
-
- >I may have misinterpretted this, but:
- >If /etc/passwd was indeed trashed, and the "root" entry was either missing
- >or wrong, what good would it do to have the root password at all? If
- >you can't become root in multi-user, and the console is marked as not
- >being secure in /etc/ttytab, you can't become root via booting
- >single-user either, unless you boot from some other device (another bootable
- >partition, CD, tape, net, etc. . .)
-
- Are you sure about this? I was under the impression that when you boot
- into single user mode, the userid is 0 and it is irrelevant what is in
- /etc/passwd. The reason I say this is that single user mode ignores many
- other useful features of unix. Being short of terminals we put a mega dumb
- terminal as the console of a VAX 11/750. UPPER CASE ONLY! This was fine
- and you could just manage to use it. Then we wanted to take the machine
- back to single user mode and did so, but all of a suddent unix forgot that
- the terminal was uppercase only and refused to run any of the upper case
- commands we were typing. The console on our VAX was easily accessible, but
- was secure under the pretence that nobody in their right mind was going to
- go screwing with the buttons and dials on the front of the VAX in case they
- broke something. Bit stupid really. How could you possibly break a VAX?
-
- >Passwords should be something "not easily guessed" (Given enough time,
- >any brute-force method would *eventually* discover a password. The
- >question is would it be in our lifetime?
-
- A friend is working on a Macintosh network program and has started delving
- into the 2 way encryption that it uses. If you are snooping the network
- and you see the random number for the encryption go one way and then see
- the encrypted password (based on the random number) go back the other way,
- you can build yourself a highly pipelined hardware password cracker for
- about $10000. I think the actual figure was less. This password cracker
- would take about 3 years to crack any given password. Given the small cost
- of this, any respectable institution could crack arbitrary passwords in
- months or even weeks for perfectly acceptable amounts of money.
-
- Computers continue to get faster and DES probably won't be enough soon.
-
- Craig
- --
- Craig Richmond. Computer Officer - Dept of Economics (morning) 380 3860
- University of Western Australia Dept of Education (afternoon)
- craig@ecel.uwa.edu.au Dvorak Keyboards RULE! "Messes are only acceptable
- if users make them. Applications aren't allowed this freedom" I.M.VI 2-4
-