Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Mar 1999 17:31:35 +1100
From:      "David Nugent" <davidn@blaze.net.au>
To:        "Matthew Dillon" <dillon@apollo.backplane.com>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: Kerberos vs SSH
Message-ID:  <032601be7752$4c7aea60$623511cb@usn.blaze.net.au>
References:  <Pine.GSO.4.10.9903251409300.17330-100000@primrose.isrc.qut.edu.au> <199903250426.UAA68023@apollo.backplane.com> <kjzp51u1y6.fsf@computer.eng.mindspring.net> <199903251833.KAA00915@apollo.backplane.com> <kjg16ttnm1.fsf@computer.eng.mindspring.net> <199903251850.KAA01406@apollo.backplane.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>     It's pretty easy to write a script to manipulate the password file,
>     especially if you are not entering any encrypted passwords ( i.e.
leaving
>     that field '*' ).  If you are worried about messing it up, just have
cron
>     backup the password file once a day or something like that.

Ever tried recovering a system with a corrupted password database?
It's a pain to recover, especially if pwd_mkdb is not statically linked.


David




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?032601be7752$4c7aea60$623511cb>