Security Basics mailing list archives

Re: Netinfo Manager


From: Jos Kirps|EducDesign <jos.kirps () educdesign lu>
Date: Tue, 23 Sep 2003 22:38:25 +0200

the netinfo service is kind of a database that stores information you would usually find in /etc/passwd, /etc/group and /etc/shadow files, as well as
many other system info.

you're right, using nidump you can display all encrypted passwords, including root, and yes, this is definately a security problem (imho). unfortunately this is not considered as a 'security flaw' by apple, it's just the way netinfo handles
stuff. i don't think this will be changed in macos x 10.3 / panther.

your sincerefully
jos kirps

On Tuesday, September 23, 2003, at 06:38 PM, Matteo wrote:

Hi,

I'm using Mac OS 10.2.8 Server and today I was quite surprised to see that a normal user on my server can obtain the encrypted passwords of all the user just using the command "nidump password .":

bash-2.05a$ nidump passwd .
nobody:*:-2:-2::0:0:Unprivileged User:/dev/null:/dev/null
root:*EncryptedPass:0:0::0:0:System Administrator:/var/root:/bin/tcsh
...

Isn't this a security flaw? Is Apple going to fix it in the next release of Mac OS X (Panther)? Now, how to prevent users to see the passwords of the other users?

Thanks


----------------------------------------------------------------------- ---- ----------------------------------------------------------------------- -----


-----------------------------------------------------
EducDesign S.A.
Where Learning and Technology meet

20, rue de l'Ecole, L-3233 Bettembourg
Luxembourg (Europe)
tel. +352 51 66 52
fax. +352 52 26 76
-----------------------------------------------------
http://www.educdesign.lu
info () educdesign lu
-----------------------------------------------------
IT-Services
Intranet-Internet Solutions & Multimedia
Innovation Managment & Project Development
Consulting, Training & Coaching in IT and Education
-----------------------------------------------------


---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: