[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] os x 10.2.x has 8 character password limit
- To: full-disclosure@lists.netsys.com
- Subject: Re: [Full-Disclosure] os x 10.2.x has 8 character password limit
- From: "Gregory A. Gilliss" <ggilliss@netpublishing.com>
- Date: Tue, 25 Nov 2003 13:55:36 -0800
AFAIK OS/X is based on a back level FBSD code base, 2.26 or something.
I *heard* that the next gen is *supposed* to be based on CURRENT (5.x).
For purists, OS/X *is* based on Mach, but Mach was written from the
earlier FBSD (2.x) code line. As a consequence I suspect that there are
at *least* 60-70 local suid root exploits on OS/X (which matters little
except for servers of course). A quick Google will retrieve several
ancient FBSD local sploits (and code for the k1dd13z). If anyone can
confirm/clarify my suspicions I'd appreciate it.
G
On or about 2003.11.25 10:59:29 +0000, Brett Hutley (brett@hutley.net) said:
> Most Unix operating systems have switched to using a more secure
> encryption mechanism than the old-style crypt(3).
--
Gregory A. Gilliss, CISSP E-mail: greg@gilliss.com
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html