What should the password/security/userinfo/login system include?
David C Lawrence
tale at cs.rpi.edu
Sun Dec 10 13:25:08 AEST 1989
<1989Dec9.053433.5407 at chinet.chi.il.us> les at chinet.chi.il.us (Leslie Mikesell):
>>I want logging of *all* keystrokes during a failing attempt at logging
>>in.
>This is not a good idea. If someone unauthorized sees this log file
>they would have a fairly good idea of some of the passwords on the
>system.
If they are written to a file that can only be read by root, why
should I worry about that? If someone can already get root permissions
why would they want to know any other passwords?
Interesting. There was recently discussion here on just such a thing
when the ftp daemon on the ACM's 3B2s was doing logging. The problem
exists in that if you find out a person's password on one machine (the
one for which Les point's out it wouldn't matter, because you could su
to the user anyway from root) then you have often times discovered the
user's password on other machines.
Of course, someone with root access to a machine should have the
scruples not to use this information to gain access to a user's
account. This is certainly not a completely accurate assumption
though -- there are obviously people out there with no such integrity.
Dave
--
(setq mail '("tale at cs.rpi.edu" "tale at ai.mit.edu" "tale at rpitsmts.bitnet"))
More information about the Comp.unix.wizards
mailing list