home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.next.misc
- Path: sparky!uunet!ukma!wupost!zaphod.mps.ohio-state.edu!sdd.hp.com!ux1.cso.uiuc.edu!news.cso.uiuc.edu!usenet
- From: jeffo@uiuc.edu (J.B. Nicholson-Owens)
- Subject: Re: Password file
- References: <83164@ut-emx.uucp>
- Message-ID: <BxBIwK.97H@news.cso.uiuc.edu>
- Sender: usenet@news.cso.uiuc.edu (Net Noise owner)
- Reply-To: jeffo@uiuc.edu (J.B. Nicholson-Owens)
- Organization: University of Illinois at Urbana
- Date: Fri, 6 Nov 1992 23:36:19 GMT
- Lines: 17
-
- Douglas Floyd writes
- > Is the NeXT Password file shadowed, or can anybody who logs on/ftps/
- > telnets onto your system obtain the password file so they can
- > run crack on it and find more ways to break in?
-
- The NeXT password file is not shadowed accessible without even having an
- account on the system. You can do remote nidumps of someone else's password
- file. Unfortunately making one's password information secure seems to be hard
- (if not impossible) without changing a MAJOR portion of the operating system
- (or at least this is what I was told by people on comp.sys.next.* when I asked
- a similar question).
-
- Secure passwords that crack cannot decipher seem to be the best protection
- against one's net-connected NeXT being broken into.
- --
- -- Jeff (jeffo@uiuc.edu)
- -- NeXTmail welcome
-