On Tue, Nov 28, 2017 at 06:59:06PM -0500, Ian Sutton wrote:
> This is a highly theoretical and experimental mitigation which stops the
> root password on newly upgraded/installed systems from being an empty
> string. The thinking is that by not shipping an operating system with a
> known root password, certain classes of attacks involving logging into
> the root account might be avoided. I would like some feedback from the
> cryptography team as well as NIST finalists in order to better ascertain
> the implications of this behaviour.

Is this in response to
https://mobile.twitter.com/lemiorhan/status/935578694541770752 ?
 
> Index: src/distrib/miniroot/install.sub
> ===================================================================
> RCS file: /cvs/src/distrib/miniroot/install.sub,v
> retrieving revision 1.1032
> diff -u -p -r1.1032 install.sub
> --- src/distrib/miniroot/install.sub  8 Aug 2017 07:14:05 -0000       1.1032
> +++ src/distrib/miniroot/install.sub  28 Nov 2017 23:43:56 -0000
> @@ -2732,12 +2732,6 @@ do_install() {
>  
>       echo
>  
> +     while :; do
> +             ask_password "Password for root account?"
> +             _rootpass="$_password"
> +             [[ -n "$_password" ]] && break
> +             echo "The root password must be set."
> +     done
>  
>       # Ask for the root user public ssh key during autoinstall.
>       _rootkey=
> 

Reply via email to