>Do not, EVER, do that. The moment you do, checkpassword becomes a /bin/su
>replacement without any logging or limiting.

Don't you think that this histeric reaction is a bit too far?
checkpassword is certainly safer suid program that most of suids in your 
system.

And another one:

 >Don't do that! You have just created a target for a dictionary attack;
 >suid /bin/checkpassword is /bin/su without bad attempts logging
 >(and with somewhat unusual interface).
 >If you definitely need to run /bin/checkpassword as root, it's
 >healthier to run tcpserver on port 25 as root (not as qmaild) and
 >drop root after checking name and password. It's still far from being
 >ideal, though.
 >On a PAMified system, you should be able to get away with it
 >without running code as root (root is neccessary to install the PAM
 >script in /etc/pam.d only).

On PAMified system you can still use it as dictionary cracker :)

all in all, on a non-shell system (like most ISP's mail servers) where only 
admins have shell access. making checkpassword suid is nothing bad. 
CERTAINLY not as bad as you portrait it.

Kris

Reply via email to