On Wed, 2015-02-04 at 14:55 -0700, Warren Young wrote:
> > On Feb 4, 2015, at 12:16 PM, Lamar Owen <lo...@pari.edu> wrote:
> > 
> > Again, the real bruteforce danger is when your /etc/shadow is exfiltrated 
> > by a security vulnerability
> 
> Unless you have misconfigured your system, anyone who can copy /etc/shadow 
> already has root privileges.  They don’t need to crack your passwords now.  
> You’re already boned.

On C5 the default appears to be:-

        -rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow

On C6, the default is:-

        ----------  1 root root      854 Mar 13  2014 shadow


-- 
Regards,

Paul.
England, EU.      Je suis Charlie.


_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to