Date: Fri, 2 Mar 2001 12:00:16 -0800 (PST) From: "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net> To: matt@LUCIDA.CA (Matt Heckaman) Cc: mudman@R181204.resnet.ucsb.edu (mudman), freebsd-security@FreeBSD.ORG Subject: Re: /etc/pwd.db Message-ID: <200103022000.MAA06845@gndrsh.dnsmgr.net> In-Reply-To: <Pine.BSF.4.33.0103020316130.71111-100000@epsilon.lucida.ca> from Matt Heckaman at "Mar 2, 2001 03:17:34 am"
next in thread | previous in thread | raw e-mail | index | archive | help
> On Fri, 2 Mar 2001, mudman wrote: > ... > : So.... what do you guys think? > > Better yet: pwd.db doesn't even contain any passwords! It's the functional > equiv. of /etc/passwd. spwd.db contains the real passwords and is mode > 0600 root:wheel. :) > > No worries, other than the annoying DoS attacks. Actually one minor worry, the possible reason they went after /etc/pwd.db is that they needed a list of user names to attempt other means of entry to the system. Remeber access control is via 2 tokens, username and password, if you gain a list of usernames your task at hacking can be much easier. A good reason for going after /etc/pwd.db is that it is a world readable file, and thus sometimes easier to get a hold of. Find a clueless Luser in that list and you got a big foot in the door... -- Rod Grimes - KD7CAX @ CN85sl - (RWG25) rgrimes@gndrsh.dnsmgr.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200103022000.MAA06845>