Quite intersting. One solution is limit those people who don't need shell access to false shells to go around this weak passwd problem.
But even with strong passwds I have seen machines with the root user removed by a hacker! Kiggs On Tue, 2004-10-12 at 07:50, joseph mpora wrote: > Sorry if this was already posted. > > -------- > Using a stolen password, Mallory managed to log into an important server > running Linux. The account was a very limited account, but Mallory knew > how to cause trouble with it. Mallory installed and ran a trivial > program with very odd behavior -- it quickly created and removed many > different symbolic link files in the /tmp directory, using a multitude > of processes. (A symbolic link file, also called a symlink, is simply a > file that when accessed redirects the requester to another file.) > Mallory's program kept creating and removing many different symlinks > pointing to the same special file: /etc/passwd, the password file. > > ----- > Full story here > > http://www-106.ibm.com/developerworks/linux/library/l-sprace.html?ca=dgr-lnxw07RACE > > ------------ > > Joseph > > > _______________________________________________ > LUG mailing list > [EMAIL PROTECTED] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > _______________________________________________ LUG mailing list [EMAIL PROTECTED] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
