What is Authentication? Linux Authentication and Authentication binds a subject/principal outside the computer to an Access Control identity inside the computer.
All subsequent stages assume the mapping is correct, so this is really important!
fturbak Tuesday, September 18, 2012 Reading: Pollock Article; Hacking Linux Exposed gdome
CS342 Computer Security root Department of Computer Science Wellesley College sanderso
Linux Authentication and Access Control 5-2
Plaintext Password File Hashed Password File
o Use one-way hash function (more on these later in the semester).
o Intercepted password can be entered to impersonate user. o Intercepted hashed password cannot be entered for user. username: gdome o Password file must be private. username: gdome password: albatross password: albatross o Password file can be public (but still better private). Early Linux had /etc/passwd public. Now separates hash(albatross) = public /etc/passwd (user info) from albatross Npge08pfz4wuk private /etc/shadow (hashed passwords)
fbar:pass34word fbar:Yt8w67aiewrH3 o Early linux used crypt