From owner-freebsd-security Tue Apr 1 07:17:09 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id HAA06217 for security-outgoing; Tue, 1 Apr 1997 07:17:09 -0800 (PST) Received: from cheops.anu.edu.au (cheops.anu.edu.au [150.203.76.24]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id HAA06197; Tue, 1 Apr 1997 07:16:54 -0800 (PST) Message-Id: <199704011516.HAA06197@freefall.freebsd.org> Received: by cheops.anu.edu.au (1.37.109.16/16.2) id AA264867486; Wed, 2 Apr 1997 01:11:26 +1000 From: Darren Reed Subject: Re: root logins on secure tty's ? To: avalon@coombs.anu.edu.au (Darren Reed) Date: Wed, 2 Apr 1997 01:11:26 +1000 (EST) Cc: hackers@freebsd.org, security@freebsd.org In-Reply-To: <199704011422.GAA03481@freefall.freebsd.org> from "Darren Reed" at Apr 2, 97 00:17:28 am X-Mailer: ELM [version 2.4 PL23] Content-Type: text Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Ignore this. Someone broke root logins, thats all. In some mail from Darren Reed, sie said: > > > for some reason, in 2.2.1 source, /bin/login root logins appear > to be broken on secure tty's. > > line 271 of login.c (or thereabouts): > } else if (pwd->pw_passwd[0] == '\0') { > if (rootlogin && !rootok) { > /* pretend password okay */ > rval = 0; > goto ttycheck; > } > } > > in my ttys, I enable ttyv1 as secure, rootok == 1 and I get prompted > for a password. Were the tty insecure, I suspect this would work (I > have a null password for root). btw, I only noticed this because it > used to work on 2.1.6 and didn't after the upgrade... > > Is this (perhaps) a leftover from the breakin earlier in the year ?