Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] Backdoors?
  2008-10-21  9:59 ` Peter Korsgaard
@ 2008-10-21  6:31   ` Hans-Christian Egtvedt
  2008-10-21 10:09   ` Anders Blomdell
  1 sibling, 0 replies; 5+ messages in thread
From: Hans-Christian Egtvedt @ 2008-10-21  6:31 UTC (permalink / raw)
  To: buildroot

Peter Korsgaard wrote:
>>>>>> "Anders" == Anders Blomdell <anders.blomdell@control.lth.se> writes:
> 
> Hi,
> 
>  Anders> Nowhere in the documentation, I can find the passwords for:
>  Anders> target/device/Atmel/atngw100/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::
> 
>  Anders> are they there only to provide a backdoor into generated systems? :-)
> 
> I guess so. Atmel people?
> 

root / roota
avr32 / avr32!

Documented in the AVR32 wiki on avrfreaks.net AFAIK. Did not know they 
made it into uclibc.org repository.

Feel free to remove them.

-- 
HC

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Buildroot] Backdoors?
@ 2008-10-21  7:14 Anders Blomdell
  2008-10-21  9:59 ` Peter Korsgaard
  2008-10-23 14:47 ` Arnar Mar Sigurðsson
  0 siblings, 2 replies; 5+ messages in thread
From: Anders Blomdell @ 2008-10-21  7:14 UTC (permalink / raw)
  To: buildroot

Nowhere in the documentation, I can find the passwords for:

target/device/valka/target_skeleton/etc/shadow:root:$1$3P2nFqtv$yuwcUwEGBusYZtAOvzOrF/:13200:0:99999:7:::
target/device/valka/target_skeleton/etc/shadow:valka:$1$rDBo1uCh$EVSlBaeBgyHiSpZpShyW./:0:0:99999:7:::
target/device/Atmel/atngw100-base/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atstk100x/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atstk100x/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::
target/device/Atmel/atngw100-expanded/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atngw100-expanded/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::
target/device/Atmel/atngw100/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atngw100/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::

are they there only to provide a backdoor into generated systems? :-)

Regards

Anders Blomdell

-- 
Anders Blomdell                  Email: anders.blomdell at control.lth.se
Department of Automatic Control
Lund University                  Phone:    +46 46 222 4625
P.O. Box 118                     Fax:      +46 46 138118
SE-221 00 Lund, Sweden

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Buildroot] Backdoors?
  2008-10-21  7:14 [Buildroot] Backdoors? Anders Blomdell
@ 2008-10-21  9:59 ` Peter Korsgaard
  2008-10-21  6:31   ` Hans-Christian Egtvedt
  2008-10-21 10:09   ` Anders Blomdell
  2008-10-23 14:47 ` Arnar Mar Sigurðsson
  1 sibling, 2 replies; 5+ messages in thread
From: Peter Korsgaard @ 2008-10-21  9:59 UTC (permalink / raw)
  To: buildroot

>>>>> "Anders" == Anders Blomdell <anders.blomdell@control.lth.se> writes:

Hi,

 Anders> Nowhere in the documentation, I can find the passwords for:
 Anders> target/device/Atmel/atngw100/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::

 Anders> are they there only to provide a backdoor into generated systems? :-)

I guess so. Atmel people?

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Buildroot] Backdoors?
  2008-10-21  9:59 ` Peter Korsgaard
  2008-10-21  6:31   ` Hans-Christian Egtvedt
@ 2008-10-21 10:09   ` Anders Blomdell
  1 sibling, 0 replies; 5+ messages in thread
From: Anders Blomdell @ 2008-10-21 10:09 UTC (permalink / raw)
  To: buildroot

Peter Korsgaard wrote:
>>>>>> "Anders" == Anders Blomdell <anders.blomdell@control.lth.se> writes:
> 
> Hi,
> 
>  Anders> Nowhere in the documentation, I can find the passwords for:
>  Anders> target/device/Atmel/atngw100/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::
> 
>  Anders> are they there only to provide a backdoor into generated systems? :-)
> 
> I guess so. Atmel people?
I would suggest removing them (or I could provide you with the passwords for at
least 3 of them (valka and avr32 took less than a second to find, atmel/root
about an hour, john-the-ripper still working on the valka/root))

Regards

Anders Blomdell

-- 
Anders Blomdell                  Email: anders.blomdell at control.lth.se
Department of Automatic Control
Lund University                  Phone:    +46 46 222 4625
P.O. Box 118                     Fax:      +46 46 138118
SE-221 00 Lund, Sweden

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [Buildroot] Backdoors?
  2008-10-21  7:14 [Buildroot] Backdoors? Anders Blomdell
  2008-10-21  9:59 ` Peter Korsgaard
@ 2008-10-23 14:47 ` Arnar Mar Sigurðsson
  1 sibling, 0 replies; 5+ messages in thread
From: Arnar Mar Sigurðsson @ 2008-10-23 14:47 UTC (permalink / raw)
  To: buildroot

root/v100sc2
valka/valka00
Documented as default password in our internel docs, but forgot to add a README about them here. I'll make them blank when i update the target skeleton soon.

Greets
   Arnar Mar Sig

-----Original Message-----
From: buildroot-bounces@uclibc.org on behalf of Anders Blomdell
Sent: Tue 10/21/2008 7:14 AM
To: buildroot at uclibc.org
Subject: [Buildroot] Backdoors?
 
Nowhere in the documentation, I can find the passwords for:

target/device/valka/target_skeleton/etc/shadow:root:$1$3P2nFqtv$yuwcUwEGBusYZtAOvzOrF/:13200:0:99999:7:::
target/device/valka/target_skeleton/etc/shadow:valka:$1$rDBo1uCh$EVSlBaeBgyHiSpZpShyW./:0:0:99999:7:::
target/device/Atmel/atngw100-base/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atstk100x/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atstk100x/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::
target/device/Atmel/atngw100-expanded/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atngw100-expanded/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::
target/device/Atmel/atngw100/target_skeleton/etc/shadow:root:$1$OJeedGT3$uG0eWkNhkeq0WO6Wldk1Y.:13200:0:99999:7:::
target/device/Atmel/atngw100/target_skeleton/etc/shadow:avr32:$1$TVWxUVs7$/ze18sFeD6F26w0hgyB6M.:13200:0:99999:7:::

are they there only to provide a backdoor into generated systems? :-)

Regards

Anders Blomdell

-- 
Anders Blomdell                  Email: anders.blomdell at control.lth.se
Department of Automatic Control
Lund University                  Phone:    +46 46 222 4625
P.O. Box 118                     Fax:      +46 46 138118
SE-221 00 Lund, Sweden
_______________________________________________
buildroot mailing list
buildroot at uclibc.org
http://busybox.net/mailman/listinfo/buildroot

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://busybox.net/lists/buildroot/attachments/20081023/8f7d41c7/attachment-0001.htm 

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2008-10-23 14:47 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-10-21  7:14 [Buildroot] Backdoors? Anders Blomdell
2008-10-21  9:59 ` Peter Korsgaard
2008-10-21  6:31   ` Hans-Christian Egtvedt
2008-10-21 10:09   ` Anders Blomdell
2008-10-23 14:47 ` Arnar Mar Sigurðsson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox