On Wed, 2015-02-04 at 14:55 -0700, Warren Young wrote:
> > On Feb 4, 2015, at 12:16 PM, Lamar Owen <[email protected]> wrote:
> >
> > Again, the real bruteforce danger is when your /etc/shadow is exfiltrated
> > by a security vulnerability
>
> Unless you have misconfigured your system, anyone who can copy /etc/shadow
> already has root privileges. They don’t need to crack your passwords now.
> You’re already boned.
On C5 the default appears to be:-
-rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow
On C6, the default is:-
---------- 1 root root 854 Mar 13 2014 shadow
--
Regards,
Paul.
England, EU. Je suis Charlie.
_______________________________________________
CentOS mailing list
[email protected]
http://lists.centos.org/mailman/listinfo/centos