[Lynn R Grant: Password Aging]
Steven M. Bellovin
smb at ulysses.homer.nj.att.com
Thu Dec 29 06:37:03 AEST 1988
In article <4506 at xenna.Encore.COM>, bzs at Encore.COM (Barry Shein) writes:
> Of course the obvious question is does anyone have any good cases of
> systems broken into where, if password aging had been in effect, the
> break-in would have been prevented? Reasoning appreciated.
The DoD reasoning is fairly simple: they want to prevent brute-force
attacks on a particular password. I don't have their booklet handy,
but they show you how to work through the calculations. Figure out
how many possible passwords there are, and assume some value (which
I believe they supply) for the time to make one trial. That gives you
an upper bound on how long a particular password is secure. The aging
constant is set to be some small fraction of that time.
This is the same reasoning, of course, that leads the military to change
codes and ciphers periodically. Read Kahn's ``The Codebreakers'' for
examples of how this has helped, and how failure to do this has hurt.
More information about the Comp.unix.wizards
mailing list