home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!wupost!cs.utexas.edu!sun-barr!male.EBay.Sun.COM!jethro.Corp.Sun.COM!jethro!zen
- From: zen@death.corp.sun.com (d)
- Newsgroups: comp.security.misc
- Subject: Re: COPS 1.04 suggestion
- Date: 11 Dec 92 22:12:22
- Organization: savage hackers
- Lines: 17
- Message-ID: <ZEN.92Dec11221222@death.corp.sun.com>
- References: <1992Dec11.154014.2173@sun44.synercom.hounix.org>
- NNTP-Posting-Host: death.corp.sun.com
- In-reply-to: medley@sun44.synercom.hounix.org's message of Fri, 11 Dec 1992 15:40:14 GMT
-
-
- In article <1992Dec11.154014.2173@sun44.synercom.hounix.org> medley@sun44.synercom.hounix.org (Bert Medley) writes:
- > I think COPS needs another test added to the password check phase: accounts
- > whouse password is the account name -
- > login: dsuser
- > Password: dsuser
- > My last run did not report this simple problem.
-
- It does check that. I suppose you might be running shadow passwords,
- in which case if you're not running passwd.chk as root, or if it's an
- odd architecture that isn't supported, or if it's a password in the NIS
- maps and it wasn't sucked in or one of any number of possibilities, it
- might get missed (RTFM, if desired, for more on this). Feel free to
- send me your system type/setup, and I'll look it over to why it might
- have been missed.
-
- -- d
-