Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 03 Dec 1999 18:05:21 +0900
From:      "Daniel C. Sobral" <dcs@newsguy.com>
To:        Mattias Pantzare <pantzer@ludd.luth.se>
Cc:        Brian Fundakowski Feldman <green@FreeBSD.ORG>, "Daniel C. Sobral" <dcs@FreeBSD.ORG>, cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG
Subject:   Re: cvs commit: src/sys/boot/forth loader.4th loader.conf.5 support.4th
Message-ID:  <384787D1.E2AF9478@newsguy.com>
References:  <199912022118.WAA16952@zed.ludd.luth.se>

next in thread | previous in thread | raw e-mail | index | archive | help
[given the feedback I received, I'll be removing the password
feature from support.4th and adding it as an example, but I first
need to add a few things to loader; that said...]

Mattias Pantzare wrote:
> 
> That depends on the enviroment. It is very easy to spot a student
> that breaks the lock that secures the computer in our labs. It is not easy to
> spot a student that boots a diffrent kernel.
> 
> But I have to agree in that a plain text password is bad.

I just can't see any problem with the plain text password for this
specific use. If anyone can think of an exploit, please tell me,
because I'm missing something! :-) But, ok, ok, I'll make it into a
hash.

--
Daniel C. Sobral			(8-DCS)
who is as social as a wampas

dcs@newsguy.com
dcs@freebsd.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?384787D1.E2AF9478>