Hi,

Thomas Goirand <[email protected]> writes:

> Ansgar Burchardt wrote:
>> Yes, it still is a security risk.  It escalates any security problem
>> where the attacker can (only) read arbitrary files into one where the
>> attacker has administrative access to dtc.  (cf. /etc/shadow which does
>> not store passwords in a form that allows to easily retrieve the
>> original passwords)
>
> I do understand your point, and I agree. However, the password is set in
> debconf, and then used by the userland shell installer script. What
> other solution do I have here? Any suggestion?

Is it possible to just store a hash of the password?  Otherwise, it
could at least be removed by the shell installer script.

Regards,
Ansgar



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to