Date: Mon, 19 Feb 1996 01:56:27 -0700 (MST) From: Dave Andersen <angio@aros.net> To: Lars_Koeller@odie.physik2.uni-rostock.de (Lars Koeller) Cc: msmith@atrad.adelaide.edu.au, freebsd-questions@freefall.freebsd.org Subject: Re: Crack freeBSD password file Message-ID: <199602190856.BAA06180@terra.aros.net> In-Reply-To: <199602190806.JAA20080@odie.physik2.uni-rostock.de> from "Lars Koeller" at Feb 19, 96 09:06:02 am
next in thread | previous in thread | raw e-mail | index | archive | help
Lo and behold, Lars Koeller once said:
> > You will have to modify the 'crack' program to understand the longer MD5
> > encrypted passwords that FreeBSD uses. I would expect that this should be
> > a relatively straightforward task, but I'm not familiar with 'crack'.
> >
> > Anyone else done this already and can supply Andre' with the diffs?
>
> How do you want to crack a password you can't read? FreeBSD uses
> shadow passwords only root can read!
Because you never know when someone's going to find a security hole
that lets someone read files on your system with root permission? :-)
<insert something here about sendmail, wu-ftpd, etc.>
-Dave Andersen
--
angio@aros.net Complete virtual hosting and business-oriented
system administration Internet services. (WWW, FTP, email)
http://www.aros.net/ http://www.aros.net/about/virtual/
"There are only two industries that refer to thier customers as 'users'."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190856.BAA06180>
