Perl 6 - the future is here, just unevenly distributed

IRC log for #crimsonfu, 2017-11-29

crimsonfu - sysadmins who code

| Channels | #crimsonfu index | Today | | Search | Google Search | Plain-Text | summary

All times shown according to UTC.

Time Nick Message
00:26 jri joined #crimsonfu
01:30 sivoais joined #crimsonfu
02:57 ilbot3 joined #crimsonfu
02:57 Topic for #crimsonfu is now http://crimsonfu.github.com - ConfiguRatIon Management of Systems Or Network kung FU | logs at http://irclog.perlgeek.de/crimsonfu/today
03:21 pdurbin "The bypass works by putting the word "root" (without the quotes) in the user name field of a login window, moving the cursor into the password field, and then hitting enter button with the password field empty. With that—after a few tries in some cases—the latest version of Apple's operating system logs the user in with root privileges."
03:21 pdurbin https://arstechnica.com/information-technology/2017/11/macos-bug-lets-you-log-in-as-admin-with-no-password-required/
04:27 jri joined #crimsonfu
04:30 sivoais joined #crimsonfu
04:40 sivoais joined #crimsonfu
08:03 jri joined #crimsonfu
10:44 jri joined #crimsonfu
10:53 jri_ joined #crimsonfu
11:51 pdurbin Huh, I wonder if this tweet is how the vulnerability was disclosed: https://twitter.com/lemiorhan/status/935578694541770752 . If so, how terrible.
11:53 pdurbin Looks like he explains himself here: https://medium.com/@lemiorhan/the-story-behind-anyone-can-login-as-root-tweet-33731b5ded71
11:54 pdurbin "The issue was very serious. It has already been mentioned in forums and revealed in public few weeks ago."
11:54 pdurbin Makes a little more sense, I guess.
14:22 jri joined #crimsonfu
17:54 jri joined #crimsonfu
20:27 prologic joined #crimsonfu
22:23 jri joined #crimsonfu

| Channels | #crimsonfu index | Today | | Search | Google Search | Plain-Text | summary

crimsonfu - sysadmins who code