Re: Another Fedora decision

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Wed, February 4, 2015 3:55 pm, Warren Young wrote:
>> On Feb 4, 2015, at 12:16 PM, Lamar Owen <lowen@xxxxxxxx> wrote:
>>
>> Again, the real bruteforce danger is when your /etc/shadow is
>> exfiltrated by a security vulnerability
>
> Unless you have misconfigured your system, anyone who can copy /etc/shadow
> already has root privileges.  They donâ??t need to crack your passwords
> now.  Youâ??re already boned.
>

There can be scenario that someone has /etc/shadow due to admin's
stupidity, yet doesn't have root access. Like: NFS exported / without
root_squash option, then everybody having root on different box can mount
and have your /etc/shadow.

But in general, I'm with you. And incident like above is really major
incident after which full investigation of all what happened on the box,
change of all password (and other thing that too should be considered
compromised like keys, certs...) and rebuild of box are mandatory.

In any case, I agree that whoever let password hashes get exposed... is
doomed.

Valeri

++++++++++++++++++++++++++++++++++++++++
Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247
++++++++++++++++++++++++++++++++++++++++
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos





[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux