[584] in SIPB_Linux_Development
Re: telnetd/login hole
daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu May 26 12:50:29 1994
To: Erik Nygren <nygren@MIT.EDU>
Cc: David Krikorian <dkk@MIT.EDU>, linux-dev@MIT.EDU
In-Reply-To: Your message of "Thu, 26 May 1994 05:39:18 EDT."
<9405260939.AA22455@pesto.MIT.EDU>
Date: Thu, 26 May 1994 12:50:30 -0400
From: Greg Hudson <ghudson@MIT.EDU>
I should note that Slackware 1.2.0 (or was it 1.1.2?) finally removed
all the shadow password support, thus switching to a new version of
/bin/login. (It's not really necessary that shadow password support
affect password-kwowledgeable programs like /bin/login, but the guy
who wrote the shadow password code is in many ways an idiot, and most
Linux systems don't use shadow passwords any more because of it.) Not
only were earlier versions of Slackware vulnerable to this attack, but
one or more of the passwd and su commands were wrong, such that when I
booted my system and changed my root password with "passwd root", I
could still su to root without typing in a password. (This was
version 1.1.1.)
--GBH