home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.sun.admin
- Path: sparky!uunet!munnari.oz.au!cs.mu.OZ.AU!montebello.ecom.unimelb.EDU.AU!carl
- From: carl@montebello.ecom.unimelb.EDU.AU (Carl Brewer)
- Subject: Re: writing down root password
- Message-ID: <9232514.21650@mulga.cs.mu.OZ.AU>
- Sender: news@cs.mu.OZ.AU
- Organization: Dept. Engineering Computer Resources, Melbourne Uni.
- References: <1992Nov11.220238.23297@grebyn.com> <1992Nov16.140310.4113@prism.poly.edu> <1ehftbINN5bc@uniwa.uwa.edu.au>
- Date: Fri, 20 Nov 1992 03:00:57 GMT
- Lines: 56
-
- In article <1ehftbINN5bc@uniwa.uwa.edu.au> craig@ec.uwa.oz.au (Craig Richmond - division) writes:
- >kapela@prism.poly.edu (Theodore S. Kapela) writes:
- >
- >>I may have misinterpretted this, but:
- >>If /etc/passwd was indeed trashed, and the "root" entry was either missing
- >>or wrong, what good would it do to have the root password at all? If
- >>you can't become root in multi-user, and the console is marked as not
- >>being secure in /etc/ttytab, you can't become root via booting
- >>single-user either, unless you boot from some other device (another bootable
- >>partition, CD, tape, net, etc. . .)
- >
- >Are you sure about this? I was under the impression that when you boot
- >into single user mode, the userid is 0 and it is irrelevant what is in
- >/etc/passwd. The reason I say this is that single user mode ignores many
-
- it is correct, if you have set the console as not secure in the ttytab,
- then you must have the root passwd to log in as single user. The only
- other way in is as said above, via another device eg CD-rom
-
-
- >other useful features of unix. Being short of terminals we put a mega dumb
- >terminal as the console of a VAX 11/750. UPPER CASE ONLY! This was fine
- >and you could just manage to use it. Then we wanted to take the machine
- >back to single user mode and did so, but all of a suddent unix forgot that
- >the terminal was uppercase only and refused to run any of the upper case
- >commands we were typing. The console on our VAX was easily accessible, but
- >was secure under the pretence that nobody in their right mind was going to
- >go screwing with the buttons and dials on the front of the VAX in case they
- >broke something. Bit stupid really. How could you possibly break a VAX?
-
- how could you break a VAX? A sledge hammer ?
-
- >
- >>Passwords should be something "not easily guessed" (Given enough time,
- >>any brute-force method would *eventually* discover a password. The
- >>question is would it be in our lifetime?
- >
- >A friend is working on a Macintosh network program and has started delving
- >into the 2 way encryption that it uses. If you are snooping the network
- >and you see the random number for the encryption go one way and then see
- >the encrypted password (based on the random number) go back the other way,
- >you can build yourself a highly pipelined hardware password cracker for
- >about $10000. I think the actual figure was less. This password cracker
- >would take about 3 years to crack any given password. Given the small cost
- >of this, any respectable institution could crack arbitrary passwords in
- >months or even weeks for perfectly acceptable amounts of money.
-
-
- but would a "reasonable" institution be trying to raid other networks?
-
-
- --
- Annal Natrach, Usthvah Spethed, carl@ecr.mu.oz.au (IRC: Bleve)
- Dochoel Dienve carl@munagin.ee.mu.oz.au
- carl@montebello.ecom.unimelb.EDU.AU
- Merlin, where are you? Call your dragon, to weave a mist...
-