Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Silent sudo passwords are not a real problem. I wouldn't give up the slightest whiff of security over them. This is one of the things that I see that I have a minority position on, and it lowers my general opinion of humanity.

It's on brand for Ubuntu, though. They've been looking for an audience that is not me for a very long time. I sometimes worry about Debian's resistance to social pressure, though. It seems that Debian doesn't fall for marketing or corporate pressure, but they sometimes fall when they are surrounded by people who have fallen for marketing or corporate pressure.

 help



This is an unnecessary downgrade in security. I hope it does not propagate to other distros.

The correct change would be leave the default and put in the visudo file for easy uncommenting. The "developers opinion" is flat wrong.

# uncomment below to see *s when typing passwords # Defaults pwfeedback

All of the dev thinking on the matter is based on narrow use-cased "if you're on a a host where login to a login screen and people can see you... "

When users connect via ssh keys to production hosts and type sudo passwords, I do not one iota of potential security benefit lost.


It's not a downgrade to security for any password length:

- If it's so short that the knowledge of the length makes bruteforcing noticeably faster, the password is so short that the total length taken would be very short regardless.

- In all other cases, it removes such a small fraction of time needed (on the scale of removing one age-of-the-universe from a process that would otherwise take thousands of ages-of-the-universe) that it doesn't change any infeasible timescale to a feasible one.

So either the information isn't needed, or it won't help. So not a security decrease.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: