DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T p

⟦90c1fe136⟧ TextFile

    Length: 4982 (0x1376)
    Types: TextFile
    Names: »pass.mail«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦3da311d67⟧ »./cops/1.04/cops_104.tar.Z« 
        └─⟦6a2577110⟧ 
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦6a2577110⟧ »./cops/1.04/cops_104.tar« 
            └─⟦this⟧ »cops_104/extra_src/pass.mail« 

TextFile

#!/bin/sh
#
#  Usage: pass.mail cops_result_file
#
# This scans through a result file and mails a warning note to
# anyone who had their password guessed.  You'll need to edit
# the note sent to correspond with your own site information.
#
#  Originally was sent to me by Bud Bowman -- I changed it a bit;
# put everything in one file, rather than having a separate
# warning message file, and put in what I think to be a more
# generic warning note, mostly stolen from Dave Curry's excellent
# "white paper" from SRI (via anon-ftp, SPAM.ITSTD.SRI.COM (128.18.4.3)
# as the file "pub/security-doc.tar.Z, last time I looked.)
#

AWK=/bin/awk
MAIL=/bin/mail
TEST=/bin/test
ECHO=/bin/echo

# usage stuff:
if $TEST $# -gt 1 -o $# -eq 0 ; then
        $ECHO "Usage: $0 cops_result_file"
        exit 2
	fi

if $TEST ! -f "$1" ; then
	$ECHO "Can't open $1"
	exit 2
	fi

#
# Search for guessed passwords and notify the owners
######################################################
#
# for user in zen
for user in `$AWK '/Guessed:/ {print $5}' $1` 
	do
	$MAIL $user << END_OF_NOTE

  Hello, $user -- your password has been discovered by our automatic
security password guesser.  This means that you must change your
password within 7 days, or your account will be disabled (you can get
the account reinstated by calling or mailing the number provided below.)
If you are not sure how to choose a "good", or difficult to guess
password, I've included some guidelines at the bottom of this letter.
In case you are wondering, you have not been singled out -- all passwords
on the system are checked periodically.

  If you have any comments/questions regarding this message, or
if you believe you received this note in error, feel free to call
or e-mail <name #2> at:

<foo@bar>

x99999

=====================================

     The object when choosing a password is to  make  it  as
difficult as possible for a cracker to make educated guesses
about what you've chosen.  This leaves  him  no  alternative
but  a brute-force search, trying every possible combination
of letters, numbers, and  punctuation.   A  search  of  this
sort, even conducted on a machine that could try one million
passwords per second (most machines can try  less  than  one
hundred per second), would require, on the average, over one
hundred years to complete.  With this as our  goal,  and  by
using the information in the preceding text, a set of guide-
lines for password selection can be constructed:

     o    Don't use your login  name  in  any  form  (as-is,
          reversed, capitalized, doubled, etc.).

     o    Don't use your first or last name in any form.

     o    Don't use your spouse's or child's name.

     o    Don't use other information easily obtained  about
          you.   This  includes license plate numbers, tele-
          phone numbers, social security numbers, the  brand
          of  your  automobile,  the  name of the street you
          live on, etc.

     o    Don't use a password of all  digits,  or  all  the
          same  letter.   This  significantly  decreases the
          search time for a cracker.

     o    Don't use a word contained in (English or  foreign
          language)  dictionaries,  spelling lists, or other
          lists of words.

     o    Don't use a password shorter than six characters.

     o    Do use a password with mixed-case alphabetics.

     o    Do use a password with  nonalphabetic  characters,
          e.g., digits or punctuation.

     o    Do use a password that is easy to remember, so you
          don't have to write it down.

     o    Do use a  password  that  you  can  type  quickly,
          without  having  to  look  at  the keyboard.  This
          makes it harder for someone to steal your password
          by watching over your shoulder.

     Although this list may seem to restrict passwords to an
extreme,  there  are  several  methods  for choosing secure,
easy-to-remember passwords that obey the above rules.   Some
of these include the following:

     o    Choose a line or two from a song or poem, and  use
          the  first letter of each word.  For example, ``In
          Xanadu did Kubla  Kahn  a  stately  pleasure  dome
          decree'' becomes ``IXdKKaspdd.''

     o    Alternate between one consonant  and  one  or  two
          vowels,  up  to  eight  characters.  This provides
          nonsense words that are usually pronounceable, and
          thus  easily remembered.  Examples include ``rout-
          boo,'' ``quadpop,'' and so on.

     o    Choose  two  short  words  and  concatenate   them
          together with a punctation character between them.
          For    example:    ``dog;rain,''     ``book+mug,''
          ``kid?goat.''

     The importance  of  obeying  these  password  selection
rules  cannot be overemphasized.  The Internet worm, as part
of its strategy for breaking into new machines, attempted to
crack  user passwords.
END_OF_NOTE

done