On Jan 13, 2008 6:59 PM, Bernardo Innocenti <<a href="mailto:bernie@codewiz.org">bernie@codewiz.org</a>> wrote:<br><div class="gmail_quote"><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
What use is it if an application can login, su or sudo as<br>user olpc with no password and _then_ su to root?</blockquote><div>Fixed by chmod'ing su and sudo 770 and then chgrp to olpc.<br><br></div><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
You can close all the open doors one by one by ruling out<br>logins with empty passwords like ssh does, but then what<br>would be the difference between an empty password and<br>no password at all? <br></blockquote><div>There isn't one.
<br><br></div><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Captain Obvious just told me that on any UNIX system, setting<br>an empty password should enable a user to login without typing
<br>a password, while disabling the password should instead disable<br>logins by that user.<br><br>The ssh default of not accepting empty passwords is just<br>a bit too paranoid for some scenarios, and not paranoid enough
<br>for others (why not also disallow stupid passwords? :-)</blockquote><div> </div><div class="Ih2E3d">Because unhashed versions of passwords are not stored, so password stupidity can not be assessed at that point.<br><br>
</div><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">While I would certainly consider improvements, what's wrong<br>that we're trying to fix with this simple solution we already
<br>adopted?</blockquote><div> </div><div>Still would be a good idea to do the thing with sudo and su that I mentioned earlier. </div></div><br>-ffm<br>