Date: Fri, 26 Mar 1999 17:31:35 +1100 From: "David Nugent" <davidn@blaze.net.au> To: "Matthew Dillon" <dillon@apollo.backplane.com> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: Kerberos vs SSH Message-ID: <032601be7752$4c7aea60$623511cb@usn.blaze.net.au> References: <Pine.GSO.4.10.9903251409300.17330-100000@primrose.isrc.qut.edu.au> <199903250426.UAA68023@apollo.backplane.com> <kjzp51u1y6.fsf@computer.eng.mindspring.net> <199903251833.KAA00915@apollo.backplane.com> <kjg16ttnm1.fsf@computer.eng.mindspring.net> <199903251850.KAA01406@apollo.backplane.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> It's pretty easy to write a script to manipulate the password file, > especially if you are not entering any encrypted passwords ( i.e. leaving > that field '*' ). If you are worried about messing it up, just have cron > backup the password file once a day or something like that. Ever tried recovering a system with a corrupted password database? It's a pain to recover, especially if pwd_mkdb is not statically linked. David To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?032601be7752$4c7aea60$623511cb>