On Thu, Mar 18, 2010 at 5:42 AM, Jan Damborsky <Jan.Damborsky at sun.com> wrote:
> Hi everyone,
>
> please review design specification v0.1 for System Configuration
> SMF Service [2].
>
> Please provide your comments/feedback before COB Wednesday 3/24.
>
> Darren, Gary, since it seems there might be a security aspect
> of this proposal (see Chapter 10 of design spec), I thought
> you might provide us with valuable feedback which would help
> us to assure that we don't miss anything important as well as
> that we are not unreasonably paranoid.
> If you happen to have cycles to take a quick look, it would
> be greatly appreciated.

This proposal calls out a long-standing missing feature from the
Solaris passwd(1) or usermod(1M) command.  Rather than directly
editing the shadow file, could effort instead be applied to mimic the
Linux "usermod -p $hashed_pw"?  Arguably it would be best if it read
the hash from stdin rather than having it on the command line to keep
the password hash private.

Way too often I've seen expect scripts developed to set passwords. The
expect scripts and their arguments tend to be run through tools like
BladeLogic or Opsware which may not do a good job of protecting the
plaintext password that is being fed to the expect script.  I don't
trust most people that would choose to use this method to handle the
failure modes that could exist with a script that edits the shadow
file directly.  A fairly simple addition to usermod could satisfy the
needs of this case and very common system administration tasks as
well.

-- 
Mike Gerdts
http://mgerdts.blogspot.com/

Reply via email to