Re: nidump on OS X

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 09/15/2002 17:28, "Dale Harris" <rodmur@maybe.org> wrote:

> Basically any normal user can get a dump of the passwd file and attempt
> brute force attacks on the encrypted passwds, it includes the root passwd.
> 
> This problem has been around for well over a year, but Apple ignores it:
> 
> http://www.securitytracker.com/alerts/2001/Jul/1001946.html
> http://online.securityfocus.com/archive/1/211718
> Dale Harris <rodmur@maybe.org>
> However Apple hasn't seemed to bother addressing it yet since it still
> persists
> in OS X.2 (Jaguar).  You'd think they might have taken the opportunity to fix
> this problem with a new major release.

It's not a case of ignoring it. It's a case of it's been around since
NetInfo came out. It's *far* older than a year. But NetInfo is buggy,
non-standard, poorly documented and understood, and only runs on OS X/*Step
systems unless you get a connector from PADL.

If you look at 10.2, they are *heavily* moving to LDAP v3, which handles
this sort of thing better, but unfortunately, it has to, for now, tie into
NetInfo. Netinfo is bound at a very low level to the OS, and extracting it
correctly will not happen quickly.

> 
> This obviously isn't such a big problem when you are dealing with only
> limited access desktop systems, but Xserve exists now, and I would think
> it'd be a bigger concern.  Course you could always chmod 700 nidump.

It's an issue with NetInfo, not any one utility.

john

-- 
John C. Welch
IT Manager
MIT Police
(617) 253 - 3093 work
(508) 579 - 7380 cell
(617) 253 - 8822 fax


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux