On Tue, Mar 18, 2008 at 5:46 PM, Sean Dague <[EMAIL PROTECTED]> wrote:
> On Tue, Mar 18, 2008 at 05:09:09PM -0400, John Mort wrote:
> > On Tue, Mar 18, 2008 at 2:25 PM, Jay Gagnon <[EMAIL PROTECTED]>
> wrote:
> > > What version of Fedora are you running here? In the lab we've got
> some
> > > Fedora 8 stuff and ssh was just a "turn this service on" type thing,
> I don't
> > > ever remember being asked about shadow tables or anything like that.
> > >
> > > -Jay
> > >
> > >
> >
> > I recall being asked if I wanted to use shadow tables when setting up
> > an ubuntu server install. I don't think I was asked about it when I
> > installed ubuntu on a laptop recently.
>
> Shadow is pretty much default assumed at this point. It makes it a
> little harder to brute force the passwords, as it requires you do it on
> the system instead of mailing yourself the passwd and applying a cluster
> to crack it.
>
The only time I have to turn on shadow is when i build an Xen guest with
debootstrap.
I don't think this would be in any modern default install, but since the
debootstrap program does such a minimal install they don't even turn on
shadow by default. This might not necessarily still be the case, but within
the last year or so I do remember following howtos that mention it.
The howtos tell you to do:
shadowconfig on
below is an excerpt from the manpage.
SHADOWCONFIG(8)
SHADOWCONFIG(8)
NAME
shadowconfig - toggle shadow passwords on and off
SYNOPSIS
shadowconfig on | off
>
> > I think the problem is that I am the linux expert here. My co-worker
> > (who set these up before I got here) uses mac at home and I've grown
> > up using windows but have been casually playing with linux for the
> > last few years. So between our ignorance we're getting some silly
> > mistakes, like assigning "encrypted" passwords in plaintext and not
> > knowing to save the modifications to iptables after adding rules, etc.
>
> It's how we all learn. :) Keep the questions coming, as they're
> probably ones that others on the list have run into from time to time as
> well, and they are building up a nice set of explainations on how
> certain things work in the mhvlug archive.
>
+1 for learning :)
Todd
>
> -Sean
>
> --
> __________________________________________________________________
>
> Sean Dague Mid-Hudson Valley
> sean at dague dot net Linux Users Group
> http://dague.net http://mhvlug.org
>
> There is no silver bullet. Plus, werewolves make better neighbors
> than zombies, and they tend to keep the vampire population down.
> __________________________________________________________________
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (GNU/Linux)
>
> iD8DBQFH4DhFSamXem9TdyYRAoAMAJ0X6jSYCmu5qDqUJA62YZjUHqRS8wCgiUkT
> pSXkJdKOPramZKlEm3j11lo=
> =ElOp
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Mid-Hudson Valley Linux Users Group http://mhvlug.org
> http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug
> Upcoming Meetings (6pm - 8pm) MHVLS Auditorium
> Mar 5 - Wearable Linux Computing
> Apr 2 - Building a Kernel the Debian / Ubuntu way
> May 7 - Setting up a platform-independent home/small office network using
> Linux
> Jun 4 - TBD
> Jul 2 - KVM (Tenative)
>
>
_______________________________________________
Mid-Hudson Valley Linux Users Group http://mhvlug.org
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug
Upcoming Meetings (6pm - 8pm) MHVLS Auditorium
Mar 5 - Wearable Linux Computing
Apr 2 - Building a Kernel the Debian / Ubuntu way
May 7 - Setting up a platform-independent home/small office network using
Linux
Jun 4 - TBD
Jul 2 - KVM (Tenative)