<br><br><div class="gmail_quote">On Sun, Jan 8, 2012 at 5:30 PM, Jan Schaumann <span dir="ltr"><<a href="mailto:jschauma@netmeister.org">jschauma@netmeister.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">Jason Hellenthal <<a href="mailto:jhell@dataix.net">jhell@dataix.net</a>> wrote:<br>
<br>
> I don't see an advantage here besides "I don't have to type my password".<br>
<br>
</div>For starters / in addition to what others have already said, you don't<br>
have to actually have to _have_ a password hash sitting on the server in<br>
question. In some cases it's unacceptable to have your password hash be<br>
exposed to the host in question.</blockquote><div><br></div><div>Well, the password hash could be safely sitting in an LDAP server somewhere.</div><div><br></div><div>The bigger issue is that the server that you're sudo-ing on gets your password in plaintext that could be snooped by a clever enough attacker with access to your pty or if they have superuser you've really lost because it would be even easier to get your password in plaintext by replacing the sudo binary or screwing with PAM.</div>
<div><br></div><div>-bob</div></div>