From owner-cvs-all Fri Dec 3 1:10: 6 1999 Delivered-To: cvs-all@freebsd.org Received: from peach.ocn.ne.jp (peach.ocn.ne.jp [210.145.254.87]) by hub.freebsd.org (Postfix) with ESMTP id AA7A114C57; Fri, 3 Dec 1999 01:10:00 -0800 (PST) (envelope-from dcs@newsguy.com) Received: from newsguy.com (p25-dn02kiryunisiki.gunma.ocn.ne.jp [210.163.200.122]) by peach.ocn.ne.jp (8.9.1a/OCN) with ESMTP id SAA02403; Fri, 3 Dec 1999 18:07:57 +0900 (JST) Message-ID: <384787D1.E2AF9478@newsguy.com> Date: Fri, 03 Dec 1999 18:05:21 +0900 From: "Daniel C. Sobral" X-Mailer: Mozilla 4.7 [en] (Win98; I) X-Accept-Language: en,pt-BR,ja MIME-Version: 1.0 To: Mattias Pantzare Cc: Brian Fundakowski Feldman , "Daniel C. Sobral" , cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG Subject: Re: cvs commit: src/sys/boot/forth loader.4th loader.conf.5 support.4th References: <199912022118.WAA16952@zed.ludd.luth.se> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk [given the feedback I received, I'll be removing the password feature from support.4th and adding it as an example, but I first need to add a few things to loader; that said...] Mattias Pantzare wrote: > > That depends on the enviroment. It is very easy to spot a student > that breaks the lock that secures the computer in our labs. It is not easy to > spot a student that boots a diffrent kernel. > > But I have to agree in that a plain text password is bad. I just can't see any problem with the plain text password for this specific use. If anyone can think of an exploit, please tell me, because I'm missing something! :-) But, ok, ok, I'll make it into a hash. -- Daniel C. Sobral (8-DCS) who is as social as a wampas dcs@newsguy.com dcs@freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message