home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ferkel.ucsb.edu!taco!rock!stanford.edu!agate!biosci!uwm.edu!cs.utexas.edu!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!cis.ohio-state.edu!news.sei.cmu.edu!bb3.andrew.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!aw2t+
- From: aw2t+@andrew.cmu.edu (Alex R.N. Wetmore)
- Newsgroups: alt.hackers
- Subject: Re: masked entries in password file
- Message-ID: <IfNJMVG00UhBI1u1IY@andrew.cmu.edu>
- Date: 26 Jan 93 15:17:53 GMT
- Organization: Sophomore, Math/Computer Science, Carnegie Mellon, Pittsburgh, PA
- Lines: 38
- Approved: not really
- In-Reply-To: <C1CDrC.3C4@watserv1.uwaterloo.ca>
-
- Excerpts from netnews.alt.hackers: 24-Jan-93 masked entries in password
- .. by Biff@???
- > A simple question that I'm sure someone out there can answer...
- > Some systems have only a '*' in the encrypted password field, I think this
- > is because they have an echoed password system or something like that.....
- > I think there's a port you have to connect to locally to query for the
- > encrypted password or something like that to get a higher security rating
- > for the entire system..... Could some one please explain this to the net
- > (interest only). I am quite curious as to how this works and I can't be
- > bothered to muck around with the ports an shit if someone already knows
- > how it works and what the general protocol is....
-
- Usaully that implies that there is a shadowed password file of some
- sort. The methods for doing this are different, but here is the most
- common:
-
- The regular password file doesn't have passwords in it. There is
- another password file (called passwd.master on 386bsd, shadow on sysv,
- depends on the system) that is a copy of it, but it also has the
- passwords in it. Programs that need to query for the users password
- have to be installed setuid root to be able to read the shadowed pw
- file, because it only has read permissions for root. I assume getpwent
- checks to see if you have the perms to read the shadowed file and if not
- returns a line from the non-shadowed file, although I have not tested
- this.
-
- Note that this is just how it works on some system. Kerberos systems do
- authentication over the network (and thus don't have the encrypted
- passwords anywhere on the system), and other systems may keep the
- passwords in other places (aix has a much differently structed passwd
- file in /etc/security that has the passwords). If you are interested in
- kerberos there is an interesting article about it on research.att.com in
- /pub/papers/security (I think, just look around and it should be
- obvious).
-
- alex
-
- ---- sysop of yabbs at phred.pc.cc.cmu.edu 8888 ----
-