On Wed, 2015-02-04 at 14:55 -0700, Warren Young wrote:
On Feb 4, 2015, at 12:16 PM, Lamar Owen lowen@pari.edu wrote:
Again, the real bruteforce danger is when your /etc/shadow is exfiltrated by a security vulnerability
Unless you have misconfigured your system, anyone who can copy /etc/shadow already has root privileges. They don’t need to crack your passwords now. You’re already boned.
On C5 the default appears to be:-
-rw-r--r-- 1 root root 1220 Jan 31 03:04 shadow
On C6, the default is:-
---------- 1 root root 854 Mar 13 2014 shadow