Password security - Another idea
Barry Shein
bzs at Encore.COM
Sat Jan 7 08:41:45 AEST 1989
From: jal3495 at ultb.UUCP (Jeff Leyser)
>The encryption techology currently used is adequate. What is not
>adequate are the users. The recent Internet worm proves this.
>The author of the worm didn't really 'break' the encryption on
>passwords, he just looked for 'obvious' passwords, and he found more
>than a few.
GET NEW USERS...ok, ok...I know...
The humorous thing about this oft-repeated line of reasoning is that
"obvious" passwords were only tried AFTER THE WORM HAD BROKEN INTO
YOUR SYSTEM! To try to propagate to other systems. And it wasn't all
that successful when compared to the other major methods of attack
used (the bug in sendmail, the evil finger DAEMON as the papers called
it and .rhosts files.) Attacking passwd files was its last resort when
all that failed, which apparently wasn't very often.
It really is like buying a better lock for the front door because the
thieves keep breaking in through the glass...
It shouldn't be that hard to have the password changing program nudge
people towards better password choices so the rest of the argument
("to get users to avoid obvious passwords...may be next to
impossible") seems unfounded founded.
-Barry Shein, ||Encore||
More information about the Comp.unix.wizards
mailing list