/etc/shadow
Chris Torek
chris at mimsy.UUCP
Fri Nov 18 05:00:51 AEST 1988
>>Doug Gwyn <gwyn at smoke.brl.mil>
>>In the above, probably it would be safest to use the encrypted form
>>of a trial password instead of plaintext. It bothers me that some
>>network protocols send unencrypted passwords over the network.
In article <17568 at adm.BRL.MIL> rbj at nav.icst.nbs.gov (Root Boy Jim) writes:
>Perhaps I don't understand the problem fully, but it seems to me that
>I could just write a client that sends, say, the login name and the
>encrypted password (which I got from reading the password file) over
>the net and masquerade as a legitimate host.
The trick is to encrypt the trial password with a different key. The
authentication server sends the client a new key, which has been
encrypted with the client's private key; the client decrypts the string
using its private key to obtain the temporary key. The client then
uses the temporary key to encrypt the trial password, and sends that to
the server; the server decrypts using the temporary key, encrypts using
the user's private key, and compares. If those match, the
authentication server believes that the client is acting on behalf of
the user.
(Clear? :-) )
--
In-Real-Life: Chris Torek, Univ of MD Comp Sci Dept (+1 301 454 7163)
Domain: chris at mimsy.umd.edu Path: uunet!mimsy!chris
More information about the Comp.unix.wizards
mailing list