Bug 1032175

Summary: "nope" used as a password hash in /etc/shadow
Product: Red Hat Enterprise Linux 6 Reporter: Jaroslav Henner <jhenner>
Component: guest-imagesAssignee: Joey Boggs <jboggs>
Status: CLOSED ERRATA QA Contact: Virtualization Bugs <virt-bugs>
Severity: high Docs Contact:
Priority: high    
Version: 6.5CC: dgregor, fdeutsch, jgreguske, jkurik, leiwang, tlavigne, wshi, yuliu
Target Milestone: rcKeywords: ZStream
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: node
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-10-22 18:43:18 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1045488, 1045489, 1045490    

Description Jaroslav Henner 2013-11-19 16:30:58 UTC
Description of problem:
There is a string, considered as a hash of some kind, reading "nope" in the shaddow for root. I think it should rather be "!" to explicitly disable root console login.


Version-Release number of selected component (if applicable):
rhel-guest-image-6-6.5-20131115.0?


How reproducible:
always

Steps to Reproduce:
1. nova boot with root key injected, add floating ip
2. ssh
3. cat /etc/shaddow
4. su cloud-user
   su  # type nope

Actual results:
3) reads
root:nope:16024:0:99999:7:::
4) Login denied which is OK. It should just be made sure the system is not using any default password.

Expected results:
3) reads 
root:!:16024:0:99999:7:::
4) Login still denied

Additional info:

Comment 2 RHEL Program Management 2013-11-22 17:24:26 UTC
This request was not resolved in time for the current release.
Red Hat invites you to ask your support representative to
propose this request, if still desired, for consideration in
the next release of Red Hat Enterprise Linux.

Comment 7 yuliu 2014-09-11 06:11:58 UTC
Version:
rhel-guest-image-6.6-20140910.0.x86_64.qcow2

Steps:
1.check the default shadow file
# virt-cat rhel-guest-image-6.6-20140910.0.x86_64.qcow2 /etc/shadow |grep root
root:!!:16323:0:99999:7:::


Verified as above.

Comment 9 errata-xmlrpc 2014-10-22 18:43:18 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2014-1697.html