Passwords

Ashmeet S Sidana sidana at neon.Stanford.EDU
Mon Apr 15 17:36:04 AEST 1991


In article <17401:Apr1307:58:0691 at kramden.acf.nyu.edu> brnstnd at kramden.acf.nyu.edu (Dan Bernstein) writes:
>In article <1991Apr12.120209.21241 at mp.cs.niu.edu> rickert at mp.cs.niu.edu (Neil Rickert) writes:
>>What I have never understood is why the password encryption algorithm doesn't
>> use additional information other than the password - the user name and the
>> machine name (or domain name for YP based networks).  That way anyone who
>> broke one encryption has succeeded only in breaking it for one user on
>> one system.  Sure, this would make life slightly tougher for administrators
>> when propogating accounts to another host.

Ever tried changing the name of a host? You'd have to change all the 
passwords!

I have a disk that boots two different versions of Unix with different
hostnames. What a nightmare in that scheme!

---Ashmeet Sidana
   sidana at cs.stanford.edu



More information about the Comp.unix.wizards mailing list