Return to BSD News archive
Received: by minnie.vk1xwt.ampr.org with NNTP id AA631 ; Sat, 06 Feb 93 09:00:33 EST Path: sserve!manuel.anu.edu.au!munnari.oz.au!hp9000.csc.cuhk.hk!saimiri.primate.wisc.edu!sdd.hp.com!zaphod.mps.ohio-state.edu!howland.reston.ans.net!spool.mu.edu!agate!agate.berkeley.edu!cgd From: cgd@eden.CS.Berkeley.EDU (Chris G. Demetriou) Newsgroups: comp.unix.bsd Subject: Re: *Big* security leak for users w/o crypt. Date: 3 Feb 93 18:08:16 Organization: Kernel Hackers 'r' Us Lines: 13 Message-ID: <CGD.93Feb3180816@eden.CS.Berkeley.EDU> References: <1kmcqrINN4l@encap.hanse.de> NNTP-Posting-Host: eden.cs.berkeley.edu In-reply-to: maverick@encap.hanse.de's message of 2 Feb 1993 18:59:55 +0100 In article <1kmcqrINN4l@encap.hanse.de> maverick@encap.hanse.de (Jan-Oliver Neumann) writes: [ about a problem handling starred-out passwd entries, with the dummy crypt routine ] i'll make and post a set of diffs to fix this, so that the change will hopefully get merged into the mainstream release channel... chris -- Chris G. Demetriou cgd@cs.berkeley.edu "Sometimes it is better to have twenty million instructions by Friday than twenty million instructions per second." -- Wes Clark