Package: dbconfig-common
Version: 1.8.29+etch1
Severity: minor

While I am aware that the password "8" is just as totally random as
"Af3fS35xF", I feel that it's worryingly close to the beginning of the
search space for a brute force attack -- I will confess that I'm no
security expert, but might it be a good idea to pass the passwords
through something like cracklib to filter out the totally weak ones?

The package I noticed this in was nagios-mysql; the first install I did
created a nice, long, random looking password. Then I scrapped the
install and redid things from scratch, resulting in:

#xsddb_host=
#xsddb_port=
xsddb_database=nagiosmysql
xsddb_username=nagios-mysql
xsddb_password=8


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to