At 10:46 PM -0400 5/1/11, shawn wilson wrote:
jim, you setup your boxes a certain way to make sure this doesn't fail?
No. The systems are plain vanilla Red Hat Linux (old versions because they run proprietary software).
so, the problems i see with this: 1. password schema - newer systems use sha whereas older systems use md5. 2. seed - i 'think' pam with sha allows seeds - if the seeds aren't the same, you break stuff this way. 3. don't put a password file on another machine unencrypted. that has all sorts of 'not good' written all over it.
It doesn't matter what encryption scheme the systems are using, as long as they all use the same one. I am distributing the encrypted versions of the passwords from one machine (the master) to the rest. I am not generating the encrypted passwords myself.
hummm, i'm sure there's a way for a user to poison a password file so that when you parse it, some evil happens. maybe make the full name field 'rm -rf /' or maybe unlink something... just saying system calls like that need to be thought out pretty carefully.
These systems are not on the internet. When I am changing the password files, I am the only user on the system. My program is not making any system calls. It is modifying the password file directly with simple string replacement.
-- Jim Gibson j...@gibson.org -- To unsubscribe, e-mail: beginners-unsubscr...@perl.org For additional commands, e-mail: beginners-h...@perl.org http://learn.perl.org/