[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

607.0. "Null password" by TSG::PROIA () Tue Nov 24 1987 20:49

    I've heard that there is a way to set your password to null (thus
    having an Open account). This was by pressing <ESC> at the "New
    password: " prompt. Unfortunetly, this only works under older versions
    of VMS.
    
    Does anyone know how to do this under new versions (around 4.5)?
    
    Thanks alot for your help.
    
        Nate Proia (TSG::PROIA).
    
T.RTitleUserPersonal
Name
DateLines
607.1HSTSSC::PEURAPekka Peura, Country Support FinlandTue Nov 24 1987 22:257
    
    How about
    
    $MC AUTHORIZE
    UAF> mod xyz/nopassword
    
    or are you looking somthing that unprivileged user could do?
607.2AUTHORIZE won't doTSG::PROIAWed Nov 25 1987 12:339
    Sorry, but it must be for non-privileged users.
    
    I'm primarily looking for a way to do it with the SET PASSWORD command,
    but any other way for non-privileged users is fine.
    
                                                           Thanks alot.
    
                                                               Nate.
    
607.3NEWVAX::CRITZRichard aka KB4N &amp; N11506Wed Nov 25 1987 13:484
    I wouldn't count on finding a way for a non-priv'd user to do it.
    Allowing such qualifies as a rather large security hole.  I'm sure
    something could probably be hacked up to do it but why do you want
    to?
607.4PASTIS::MONAHANI am not a free number, I am a telephone boxWed Nov 25 1987 17:483
    It would be trivial to write something to be installed with SYSPRV
    that would just "fix" the SYSUAF record of the current user, but
    why?
607.5Reason for a null passwordTSG::PROIAWed Nov 25 1987 18:0614
    The reason I would like to set a null password is to assist in the
    modem testing on our system. I need it non-privileged so I can set
    the password on and off as I need to.
    
    It's also good to have as other reasons come and go.
    
    I don't expect someone to write code for it. I was just seeing if
    their was a quick & dirty way to do it like on the old versions
    of VMS.

                                                Happy Thanksgiving.
    
                                                    Nate.
    
607.6worth a try (?)FOR10::JOHNLet&#039;s Go Caps!!!Wed Nov 25 1987 18:407
    I haven't tried this in a while, but you used to be able to simply
    type return at the "new password" and "verification" prompts.

    Of course, the minimum password length would have to be 0 in the UAF.

    If you try it, let us know if it works...

607.7Pressing <RETURN> doesn't workTSG::PROIAWed Nov 25 1987 20:3239
    
    Pressing <RETURN> in answer to the "New password: " and
    "Verification: " prompts yields the "Minimum password length is
    xxx / Password not changed" error message. My minimum password length
    is 8, so I don't know what happens if you have a minimum password
    length of 0.
    
    I don't know if you people know this or not, but I was reading an
    old Hackers note the other day and found a way to have passwords
    shorter than your authorized minimum length:
    
    $ SET PASS
    Old password: <OLD PASSWORD>
    New password: <NEW PASSWORD>UUUUUUUUUUUUUUUUVVVVVVVV
    Verification: <NEW PASSWORD>UUUUUUUUUUUUUUUUVVVVVVVV
    $
    
    If you had, for example, a minimum password length of 6, and you
    wanted your password to be "A" you would type:
    
    AUUUUUUUUUUUUUUUUVVVVVVVV for a New password.
    
    If I wanted my password to be my initials (NRP) I would type:
    
    NRPUUUUUUUUUUUUUUUUVVVVVVVV for a New password.
    
    This will work even though I have a minimum password length of 8.

    In summary, you type your desired password, followed by 16 U's and
    8 V's. The author of the note telling this says it screws up the
    password's encryption algorithm.
    
    Keep in mind that this is someone else's hack. I'm not trying to
    steal any credit.
    
                                                  Thanks for trying,
    
                                                      Nate.
    
607.8Ask your system manager, they are people tooTOOK::MICHAUDJeff MichaudThu Nov 26 1987 01:155
    If you are doing some kind of testing, I don't see why you couldn't
    do like somebody said, and just ask your system manager to set your
    min password length to 0 for until you are done your testing.
    
    
607.9BIRMIC::BELLALL-IN-1, OA of life!Thu Nov 26 1987 03:549
    Re: .6
    
    There is a subtle difference between a NULL password by typing RETURN
    at the "New Password" prompt, and having NO password by setting an
    account /NOPASS in authorize.
    
    The former STILL prompts for the password on login!
    
    mb
607.10RE: .9MARVIN::HEALEYBrendan Healey, WACEThu Nov 26 1987 20:5010
    RE: .9, no it doesn't. If your PWDMIN field in the UAF is set to
    0, you can type return as input to set password, and loginout will
    not prompt for Password:. Same with setting /NOPASSWORD in authorize.
    
    I have to agree that the 16 x U + 8 x V thing seems to work, though
    not for nul passwords. We must have a mathematician out there somwehere.
    
    Brendan.

    p.s. has anyone got a copy of the password decryption program?
607.11MARVIN::WARWICKDNA puts life into your networkFri Nov 27 1987 04:348
    
    I don't think there _is_ a way of decrypting VMS passwords - the
    encryption is not reversible. When you log in, I think the password you
    type gets encrypted and compared with the encrypted one stored in the
    UAF. 
    
    Trev
     
607.12VIDEO::LEICHTERJJerry LeichterSat Nov 28 1987 13:2927
re: .10, .11
The password algorithm isn't invertible "in the weak sense" because the
encrypted password is shorter than the original - information is lost, so
many passwords produce the same encryption.  Thus, it isn't possible, even
in principle, to always recover the original password.  (In principle, it
is POSSIBLE that all but one encrypted value comes from a unique password,
and that all the rest of the possible inputs encrypt to the same, remaining
value.  Obviously, if this were true, you wouldn't want to use the particular
encryption algorithm.  We also KNOW that it's not true in exactly this from
becuse of the 16 U's - 8 V's trick, which, BTW, it due to Eric Osman.)

The password algorithm is BELIEVED to be uninverible "in the strong sense"
that, given an encrypted password, it is BELIEVED to be very difficult to
find the original password it came from - "very difficult" meaning that you
might as well just try all possible passwrods and see which ones produce
the right encryption.  Note the "BELIEVED":  If P=NP, NO password algorithm
can be uninvertible in this sense.  Even if P != NP, as is widely assumed, I
know of no proof that the algorithm used isn't invertible if you are just
clever enough - though I also know of no one who claims to know how to do it.

If E(P) is the encryption of the password P, then what is stored in your
UAF entry is E(Correct-password).  When you log in, you enter password
Try.  LOGINOUT computes E(Try) and compares to E(Correct-Password); if they
match - which they certainly will if Try equals Correct-Password! - you are
in.  LOGINOUT need not be able to compute your actual password.

							-- Jerry