[gentoo-user] Re: CoreOS vulnerability inherited from Gentoo?

2016-06-02 Thread James
Max R.D. Parmer trystero.is> writes: > > Which file contains the purported malaised default configration? > > I just want to manually inspect it and verify for myself. > /etc/pam.d/system-auth which is provided by pambase: > https://gitweb.gentoo.org/proj/pambase.git/ Huh. I looked at that

Re: [gentoo-user] Re: CoreOS vulnerability inherited from Gentoo?

2016-06-02 Thread Max R.D. Parmer
On Thu, Jun 2, 2016, at 06:44, James wrote: > Neil Bothwick digimed.co.uk> writes: > > > > > Does this mean we need to do anything to improve the security of our > > > systems? > > > The report seems to be saying that the problem is caused by using the > > Gentoo default config, which assumes

[gentoo-user] Re: CoreOS vulnerability inherited from Gentoo?

2016-06-02 Thread James
Neil Bothwick digimed.co.uk> writes: > > Does this mean we need to do anything to improve the security of our > > systems? > The report seems to be saying that the problem is caused by using the > Gentoo default config, which assumes a Gentoo environment. So it's fine > on Gentoo. But it

[gentoo-user] Re: CoreOS vulnerability inherited from Gentoo?

2016-05-31 Thread James
Michael Cook mackal.net> writes: > >> [1] https://coreos.com/blog/ > > Does this mean we need to do anything to improve the security of our systems? It's going to depend, but surely a wide audience needs to poke at this... > I tried logging in as operator with any password, it did not work