From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: To: 9fans@cse.psu.edu Subject: Re: [9fans] plain passwords and keyfs From: Charles Forsyth Date: Sat, 24 Jul 2004 09:45:11 +0100 In-Reply-To: <4AC740C7-DCD0-11D8-89AF-0003931DE5D4@lsub.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="upas-uaugaruggtmsuebzkoerjmxyis" Topicbox-Message-UUID: c6808d64-eacd-11e9-9e20-41e7f4b1d025 This is a multi-part message in MIME format. --upas-uaugaruggtmsuebzkoerjmxyis Content-Disposition: inline Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit if you don't set a pop3 password in keyfs there won't be one in the clear (in `secret'). plan 9 itself doesn't need that password except to support pop3 clients (and similar). if you don't use pop3 you don't need it. the administrator of the auth server can still shuffle the contents of the plan 9 `key' files to masquerade for instance but cannot see the original plain text key. thus your secret is safe unless it's in `secret', because `key' doesn't contain the original key. in any case, the casual snooping possible with Unix/Linux's `root' is a little more tedious to do on Plan 9, and immutable logs in changeuser/keyfs might discourage it further. --upas-uaugaruggtmsuebzkoerjmxyis Content-Type: message/rfc822 Content-Disposition: inline Received: from mail.cse.psu.edu ([130.203.4.6]) by lavoro; Fri Jul 23 18:46:23 BST 2004 Received: from psuvax1.cse.psu.edu (localhost [127.0.0.1]) by mail.cse.psu.edu (CSE Mail Server) with ESMTP id DC0FE19F73 for ; Fri, 23 Jul 2004 13:44:17 -0400 (EDT) X-Original-To: 9fans@cse.psu.edu Delivered-To: 9fans@cse.psu.edu Received: from localhost (neuromancer.cse.psu.edu [130.203.4.2]) by mail.cse.psu.edu (CSE Mail Server) with ESMTP id BFC9319CB4 for <9fans@cse.psu.edu>; Fri, 23 Jul 2004 13:44:04 -0400 (EDT) Received: from mail.cse.psu.edu ([130.203.4.6]) by localhost (neuromancer [130.203.4.2]) (amavisd-new, port 10024) with LMTP id 10398-01-30 for <9fans@cse.psu.edu>; Fri, 23 Jul 2004 13:44:03 -0400 (EDT) Received: from aquamar.escet.urjc.es (plan9.escet.urjc.es [212.128.4.205]) by mail.cse.psu.edu (CSE Mail Server) with ESMTP id D9D6319C70 for <9fans@cse.psu.edu>; Fri, 23 Jul 2004 13:44:02 -0400 (EDT) Received: from [172.26.0.5] ([213.97.248.49]) by aquamar; Fri Jul 23 19:44:02 MDT 2004 X-warning: suspect envelope domain X-warning: suspect From: domain Mime-Version: 1.0 (Apple Message framework v618) In-Reply-To: <5d791b8fa2a574fb6cc322e97696054c@terzarima.net> References: <5d791b8fa2a574fb6cc322e97696054c@terzarima.net> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Message-Id: <4AC740C7-DCD0-11D8-89AF-0003931DE5D4@lsub.org> Content-Transfer-Encoding: quoted-printable From: Enrique Soriano Subject: Re: [9fans] plain passwords and keyfs Date: Fri, 23 Jul 2004 19:46:57 +0200 To: 9fans@cse.psu.edu X-Mailer: Apple Mail (2.618) X-Virus-Scanned: by amavisd-new at cse.psu.edu X-BeenThere: 9fans@cse.psu.edu X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Fans of the OS Plan 9 from Bell Labs <9fans@cse.psu.edu> List-Id: Fans of the OS Plan 9 from Bell Labs <9fans.cse.psu.edu> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: 9fans-bounces+forsyth=terzarima.net@cse.psu.edu Errors-To: 9fans-bounces+forsyth=terzarima.net@cse.psu.edu El 23/07/2004, a las 18:10, Charles Forsyth escribi=F3: > the Plan 9 password is scrambled, into key not secret. > secret is used for access to other systems. > i don't think you must set it. I used auth/changeuser to add the users (I didn't use directly the keyfs filesystem). > it is in plain text because it's hard to say which > particular scrambling algorithm, if any, > will be used to talk to those other systems. Thanks. Q. --upas-uaugaruggtmsuebzkoerjmxyis--