Date: Fri, 03 Dec 1999 18:05:21 +0900 From: "Daniel C. Sobral" <dcs@newsguy.com> To: Mattias Pantzare <pantzer@ludd.luth.se> Cc: Brian Fundakowski Feldman <green@FreeBSD.ORG>, "Daniel C. Sobral" <dcs@FreeBSD.ORG>, cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG Subject: Re: cvs commit: src/sys/boot/forth loader.4th loader.conf.5 support.4th Message-ID: <384787D1.E2AF9478@newsguy.com> References: <199912022118.WAA16952@zed.ludd.luth.se>
next in thread | previous in thread | raw e-mail | index | archive | help
[given the feedback I received, I'll be removing the password feature from support.4th and adding it as an example, but I first need to add a few things to loader; that said...] Mattias Pantzare wrote: > > That depends on the enviroment. It is very easy to spot a student > that breaks the lock that secures the computer in our labs. It is not easy to > spot a student that boots a diffrent kernel. > > But I have to agree in that a plain text password is bad. I just can't see any problem with the plain text password for this specific use. If anyone can think of an exploit, please tell me, because I'm missing something! :-) But, ok, ok, I'll make it into a hash. -- Daniel C. Sobral (8-DCS) who is as social as a wampas dcs@newsguy.com dcs@freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?384787D1.E2AF9478>