[584] in SIPB_Linux_Development

home help back first fref pref prev next nref lref last post

Re: telnetd/login hole

daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu May 26 12:50:29 1994

To: Erik Nygren <nygren@MIT.EDU>
Cc: David Krikorian <dkk@MIT.EDU>, linux-dev@MIT.EDU
In-Reply-To: Your message of "Thu, 26 May 1994 05:39:18 EDT."
             <9405260939.AA22455@pesto.MIT.EDU> 
Date: Thu, 26 May 1994 12:50:30 -0400
From: Greg Hudson <ghudson@MIT.EDU>


I should note that Slackware 1.2.0 (or was it 1.1.2?) finally removed
all the shadow password support, thus switching to a new version of
/bin/login.  (It's not really necessary that shadow password support
affect password-kwowledgeable programs like /bin/login, but the guy
who wrote the shadow password code is in many ways an idiot, and most
Linux systems don't use shadow passwords any more because of it.)  Not
only were earlier versions of Slackware vulnerable to this attack, but
one or more of the passwd and su commands were wrong, such that when I
booted my system and changed my root password with "passwd root", I
could still su to root without typing in a password.  (This was
version 1.1.1.)

--GBH


home help back first fref pref prev next nref lref last post