It appears that at least Mac OS X 10.3.X stores passwords in plain-text.
Running this command "sudo strings -8 /var/vm/swapfile0 | grep -A 4 -i longname" Or one of the various other swap files in the directory(e.g. /var/vm/swapfile3) can yield your password in plain-text.
Although I realize that swap files require root access and/or physical access, the swap files are simply "ready to be deleted" when Mac OS X reboots, they are not purged. One could possibly enter single-user mode or boot with the installation disks and check if the passwords are still stored somewhere.
This could render FileVault and Keychain encryption moot.
Found on BugTraq: http://securityfocus.com/archive/1/367116/2004-06-24/2004-06-30/2
Running this command "sudo strings -8 /var/vm/swapfile0 | grep -A 4 -i longname" Or one of the various other swap files in the directory(e.g. /var/vm/swapfile3) can yield your password in plain-text.
Although I realize that swap files require root access and/or physical access, the swap files are simply "ready to be deleted" when Mac OS X reboots, they are not purged. One could possibly enter single-user mode or boot with the installation disks and check if the passwords are still stored somewhere.
This could render FileVault and Keychain encryption moot.
Found on BugTraq: http://securityfocus.com/archive/1/367116/2004-06-24/2004-06-30/2