|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T p
Length: 3859 (0xf13) Types: TextFile Names: »passwd.policy.ideas«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦this⟧ »./misc/passwd.policy.ideas«
From stripes@eng.umd.edu Fri Dec 28 17:35:25 1990 Received: from frob.eng.umd.edu by bacchus.eng.umd.edu (5.64/UMDENG-0.4/09-20-90) id AA02816; Fri, 28 Dec 90 17:35:22 -0500 Received: by frob.eng.umd.edu (5.64/umdeng-0.4/09-20-90) id AA00786; Thu, 27 Dec 90 00:36:07 -0500 Date: Thu, 27 Dec 90 00:36:07 -0500 From: stripes@eng.umd.edu (Joshua Osborne) To: istari@eng.umd.edu Subject: passwords... Status: RO In article <1990Dec21.023312.29311@lokkur.dexter.mi.us>, scs@lokkur.dexter.mi.us (Steve Simmons) writes: > The best way to prevent guessable passwords is to prevent users from > using guessable ones. Dan Klein has a paper in the Proceedings of the > Second UNIX Security Workshop "A Survey of, and Improvements to, > Password Security". It's available from the USENIX Association, 2560 > Ninth Street, Suite 215, Berkeley, CA 94710, $13.00 for members, $16.00 > for nonmembers. He presents the following list of things to reject in > passwords (I've assigned numbers so I can refer to them): > > 1. Passwords based on the user's account name > 2. Passwords which exactly match a word in a dictionary (not just > /usr/dict/words) > 3. 2, with words reversed > 4. Passwords which are simple conjugations of a dictionary word > (ie, plurals, adding "ing" or "ed" to the end of the word, etc.) > 5. Passwords which match a word in a dictionary with an arbitrary > letter turned into a control character [[I'd assume this means > mapping A to ^A, B to ^B, etc. --scs ]] > 6. Passwords based on the users initials or given name > 7. Passwords which match a word in the dictionary with some or all > letters capitalized > 8. 6, with words reversed > 9. Passwords which match a dictionary word with the numbers `0', > `1', `2' and `5' substituted for the letters `o', `l' [[the > rest of this sentence is scrambled.]] > 10. Passwords which are patterns from the keyboard (i.e, "aaaaaa" > or "qwerty"). > 11. Passwords which are shorter than a specific length. > 12. Passwords which do not contain mixed upper and lower case, or > mixed letters and number, or mixed letters and punctuation > 13. Passwords which consist solely of numeric characters (SSN, > telephone numbers, etc) > 14. Passwords which look like licence numbers from Your State. > > (advance apologies for any errors in transcription, Dan). > > The Bishop passwd program Tom Christiansen mentioned gives you the > ability to screen passwords in categories 1-3, 6-8, and 10-14. Running > this on a DECSystem 5810 (a bit faster than a 3100, but not twice as > fast) it requires about 2 seconds of wall time to change a password on > a loaded system. About 90% of this time is spent comparing against the > dictionary(ies). A hashed dictionary would shorten this tremendously. > Even so, given the relative infrequency with which users change passwords > two seconds is acceptable. It's my not-so-humble opinion that Bishops > program could be trivially modified to handle case 5, and a proper > `dictionary' could be built to handle case 4. > > And Bishop's passwd program can give reasonable descriptions of why > a given password was rejected. > > So what's my point? If you want your users to use better passwords, > there is no technical barrier to prevent it. The only real hard parts > are political acceptance and explaining to them what's a good password. > The password program will tell them explicitly what's not. > -- > "SO be it! The fate of the UNIVERSE is in your hands!" > "Talk about job-related stress." -- stripes@eng.umd.edu "Security for Unix is like Josh_Osborne@Real_World,The Multitasking for MS-DOS" "The dyslexic porgramer" - Kevin Lockwood "Don't over-comment" - p151 The Elements of Programming Style 2nd Edition Kernighan and Plauger