Password choices
thad at cup.portal.com
thad at cup.portal.com
Sun Jul 10 11:19:29 AEST 1988
The following is something pertinent to your question regarding selection
of passwords. Because it IS of general interest, I'm posting it; don't
know if there ever was a followup, but the suggestions contained herein
are good advice nonetheless.
Enjoy!
thad at cup.portal.com
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DDN-MGT-BULLETIN 18 NETWORK INFO CENTER for
13 Jan 1984 DCA DDN Program Mgmt Office
(415) 859-3695 NIC at SRI-NIC
Defense Data Network
MANAGEMENT BULLETIN
The DDN MANAGEMENT BULLETIN is published by the Network Information
Center under DCA contract as a means of communicating official policy,
procedures and other information of concern to management personnel at
DDN facilities. Back issues may be obtained by FTP from the directory
<DDN-NEWS> at SRI-NIC [26.0.0.73 and 10.0.0.51].
**********************************************************************
INTERIM GUIDANCE FOR HOST PASSWORD DISCIPLINE
(The following is issued as interim guidance with the intent of
issuing permanent mandatory guidance within six months. The
instructions in this Management Bulletin should be followed until
superceded. Your comments, criticisms, and recommendations for
improvement are welcome and should be submitted by netmail to
GPARK at DDN1.)
---------------
The past two years have seen an increase in the number of unauthorized
accesses to ARPANET/MILNET host computers. While many of these
penetrations have been relatively benign, there has also been an
increase in the number of malicious attacks. In response, some host
administrators have implemented effective password systems, while
others have not, leaving themselves vulnerable to the hacker
community.
Analysis of host penetrations reported to DCA has consistently pointed
to inadequate host password discipline as the primary weakness making
these break-ins possible. Some examples of improper password practices
which have permitted successful intrusion are:
Passwords which can be logically derived from the users name, such
as initials, middle names, parts of names, combinations, etc.
Passwords based on proper names (relatives, States, cars, boats,
ball teams, beers, etc.)
Null passwords (e.g., carriage return for password).
Unencrypted password files (where encryption is feasible).
Unlimited password attempts permitted without disconnection.
Considerable effort has been expended by DCA and by DARPA to develop
an effective network access control mechanism without denying required
services to legitimate users. The TAC Access Control System (TACACS)
Phase 1, an outcome of this effort, becomes operational on the MILNET
17 Jan 1984 with a universal User ID and Access Code (in the TAC
Herald) for familiarization purposes, and will be fully implemented
February 15, 1984.
TACACS is expected to effectively accomplish the task it is designed
for. It must not, however, be viewed as a complete solution to the
problem, since, as its name implies, it only protects against
intrusion via TAC ports. It provides no protection against
penetration via host backside dial-ins. TACACS is like a fence built
only around the front yard. It remains the responsibility of each
host to extend the fence around the backside. It is imperative that
host managers examine their facilities and implement the improvements
needed to correct the weaknesses discovered.
A survey of hosts which do have good password discipline reveals some
effective practices which can be applied elsewhere. Either of the
following two options are recommended as a minimum, with Option One
preferred.
OPTION ONE:
Discontinue the practice of allowing users to select their own
passwords, and, instead, issue passwords consisting of at least 8
alphanumeric characters. If possible, passwords should be machine
generated and distributed to preclude viewing by persons other than
the intended recipient. Disable routines which permit the user to
change his password once issued unless the changed password is also
machine generated. Change and reissue passwords at least annually.
It is recommended that passwords be pronounceable.
OPTION TWO:
Develop and implement a password filter routine which will be
automatically invoked whenever a password is changed, and which
will reject any unacceptable user selected password. When the
password filter is implemented, require existing passwords to be
changed to insure all passwords pass the test of acceptability. A
password may be considered acceptable if it does not fall into any
of the unacceptable password categories listed below.
UNACCEPTABLE PASSWORDS:
- Null passwords, i.e., carriage return for password
- Passwords of less than eight characters
- Passwords which can be found in the English dictionary
- Proper names for passwords
- Passwords which are permutations of the user's name, account
number, etc.
Anonymous/guest passwords, although acceptable, are discouraged on
most machines. Hosts which do allow this convention must insure
that adequate internal safeguards exist to limit usage to only that
which is intended.
Whichever of the two options above are chosen, all hosts should also
implement automatic routines to provide for the following.
- Provide 30 day advance notice of the password expiration date.
Coupled with the notice should be a message explaining to the
user the standards for password selection and the reasons for
requiring strict password discipline. Upon expiration of the
password the user should be allowed to log-in with the expired
password, but only for the purpose of changing the password.
- Encryption of password files is strongly encouraged on those
machines where, in the judgement of host managers, it will
produce a true gain in security.
- All unsuccessful log-in attempts (Server TELNET, Server FTP,
regular log-in, etc.) should be logged and periodically
reviewed. If the machine is attended by an operator, the
operator should be notified. A notice of unsuccessful attempts
should be published to the account user at the time of the
next successful log-in.
- Auto-disconnect should occur after no more than three unsuccess-
ful log-in attempts. This is regardless of the means of
accessing the machine.
It is a standing requirement that the DDN be used for official Federal
Government business only. Activities operating host computers on the
DDN must insure that utilization of their facilites, via the network,
meets this requirement. Netwide adoption of the standards and
practices requested in this bulletin will substantually reduce the
susceptability of individual hosts to successful penetration by
unauthorized users. Simultaneously, the opportunity for any given
host to be used as an avenue into the network for penetration of other
hosts will be correspondingly reduced.
-------END OF MESSAGE-------
More information about the Comp.unix.questions
mailing list