Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 2 Mar 2001 12:00:16 -0800 (PST)
From:      "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>
To:        matt@LUCIDA.CA (Matt Heckaman)
Cc:        mudman@R181204.resnet.ucsb.edu (mudman), freebsd-security@FreeBSD.ORG
Subject:   Re: /etc/pwd.db
Message-ID:  <200103022000.MAA06845@gndrsh.dnsmgr.net>
In-Reply-To: <Pine.BSF.4.33.0103020316130.71111-100000@epsilon.lucida.ca> from Matt Heckaman at "Mar 2, 2001 03:17:34 am"

next in thread | previous in thread | raw e-mail | index | archive | help
> On Fri, 2 Mar 2001, mudman wrote:
> ...
> : So.... what do you guys think?
> 
> Better yet: pwd.db doesn't even contain any passwords! It's the functional
> equiv. of /etc/passwd. spwd.db contains the real passwords and is mode
> 0600 root:wheel. :)
> 
> No worries, other than the annoying DoS attacks.

Actually one minor worry, the possible reason they went after /etc/pwd.db
is that they needed a list of user names to attempt other means of entry
to the system.  Remeber access control is via 2 tokens, username and
password, if you gain a list of usernames your task at hacking can be
much easier.

A good reason for going after /etc/pwd.db is that it is a world readable
file, and thus sometimes easier to get a hold of.

Find a clueless Luser in that list and you got a big foot in the door...

-- 
Rod Grimes - KD7CAX @ CN85sl - (RWG25)               rgrimes@gndrsh.dnsmgr.net

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200103022000.MAA06845>