home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!think.com!ames!haven.umd.edu!umd5!oberon.umd.edu!matthews
- From: matthews@oberon.umd.edu (Mike Matthews)
- Newsgroups: comp.sys.next.misc
- Subject: Re: Password file
- Message-ID: <16930@umd5.umd.edu>
- Date: 11 Nov 92 16:58:39 GMT
- References: <83164@ut-emx.uucp> <BxBIwK.97H@news.cso.uiuc.edu>
- Sender: news@umd5.umd.edu
- Organization: /etc/organization
- Lines: 20
-
- In article <BxBIwK.97H@news.cso.uiuc.edu> jeffo@uiuc.edu (J.B. Nicholson-Owens) writes:
- >The NeXT password file is not shadowed accessible without even having an
- >account on the system. You can do remote nidumps of someone else's password
- >file. Unfortunately making one's password information secure seems to be hard
- >(if not impossible) without changing a MAJOR portion of the operating system
- >(or at least this is what I was told by people on comp.sys.next.* when I asked
- >a similar question).
-
- You can easily fix the problem with remote nidumps (trusted_networks), but it
- would take some sort of access listing built right in to NetInfo to change
- the greater problem.
-
- >-- Jeff (jeffo@uiuc.edu)
- ------
- Mike Matthews, matthews@oberon.umd.edu (NeXTmail accepted)
- ------
- Diplomacy is the art of saying "nice doggy" until you can find a rock.
-
-
-
-