[ale] passwd and shadow

Terry Bailey terry at bitlinx.com
Tue Jun 17 12:18:29 EDT 2008


I have a server in a data center and am not allowed to login with 
root because the password has been corrupted.  I thought that if 
these files were cached, then a power down and reboot would fix it.

At 11:36 AM 6/17/2008, you wrote:
>On Tue, 2008-06-17 at 11:09 -0400, Terry Bailey wrote:
> > Hi,
>
> > After booting, do copies of the passwd and shadow files reside in RAM?
>
>         Meaning leftovers from the previous boot or what?
>
>         In principle, sure.  They are simple files which will be 
> cached by the
>file system when they are accessed.  The passwd file itself isn't
>particularly sensitive.  The shadow file could be sensitive but, as long
>as people are using and enforcing strong passwords, that should be too
>bad since only root can access kmem on the running system.  Anyone with
>access to kmem can be presumed to have access to shadow.
>
>         What's the problem that is concerning you?
>
> > Thanks,
>
> > Terry Bailey
>
>         Mike
>--
>Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
>    /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
>    NIC whois: MHW9          | An optimist believes we live in the best of all
>  PGP Key: 0xDF1DD471        | possible worlds.  A pessimist is sure of it!
>
>
>
>_______________________________________________
>Ale mailing list
>Ale at ale.org
>http://mail.ale.org/mailman/listinfo/ale



More information about the Ale mailing list