[ale] passwd and shadow

Michael H. Warfield mhw at WittsEnd.com
Tue Jun 17 11:36:34 EDT 2008


On Tue, 2008-06-17 at 11:09 -0400, Terry Bailey wrote:
> Hi,

> After booting, do copies of the passwd and shadow files reside in RAM?

	Meaning leftovers from the previous boot or what?

	In principle, sure.  They are simple files which will be cached by the
file system when they are accessed.  The passwd file itself isn't
particularly sensitive.  The shadow file could be sensitive but, as long
as people are using and enforcing strong passwords, that should be too
bad since only root can access kmem on the running system.  Anyone with
access to kmem can be presumed to have access to shadow.

	What's the problem that is concerning you?

> Thanks,

> Terry Bailey

	Mike
-- 
Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
   /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
   NIC whois: MHW9          | An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471        | possible worlds.  A pessimist is sure of it!

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 307 bytes
Desc: This is a digitally signed message part
Url : http://mail.ale.org/pipermail/ale/attachments/20080617/554cf2f6/attachment.bin 


More information about the Ale mailing list