T.R | Title | User | Personal Name | Date | Lines |
---|
2377.1 | It doesn't work here either....what did I do wrong?!!! | 28250::STENGEL | | Fri Feb 19 1993 13:18 | 11 |
| RE: 0 dave
>>> This basenote has expired.
>>> Please enter new basenote:
GET_BACK_TO_WORK_DAVE_LUNCH_HOUR_IS_OVER!
%SET-F-INVBSNLEN, basenote length must be between 250 and 255 characters;
basenote not changed
$
Sorry, I couldn't resist! :^)
|
2377.2 | | ICS::CROUCH | Subterranean Dharma Bum | Fri Feb 19 1993 13:18 | 6 |
| Please don't take this issue up with system management. They are
only following standards which they are measured against. Take
your issues up with Corporate Security which defines the standard.
Jim C.
|
2377.3 | | MU::PORTER | savage pencil | Fri Feb 19 1993 13:22 | 7 |
| I've tried to use the argument "but I'll have to write the
generated passwords down". The answer, which in my opinion
is a valid counter-argument, is that there is indeed an
exposure from people who can look into my desk drawer, or
in my wallet (depending on where I choose to keep the list),
but the rules strengthen protection against network breakins,
which are by far the greatest threat.
|
2377.4 | | ECADSR::SHERMAN | Steve ECADSR::Sherman DTN 223-3326 MLO5-2/26a | Fri Feb 19 1993 14:12 | 6 |
| For me, they're not passwords. They are now passsentences.
What was a bother has now become a feature as I typically use the
opportunity to secretly express my rage at having to type in and
remember so many characters.
Steve
|
2377.5 | Required password length | FUNYET::ANDERSON | Imagine whirled peas | Fri Feb 19 1993 14:12 | 14 |
| I thought the corporate security standard said:
Account type Password Length Password Expiration
------------ --------------- -------------------
Nonprivileged 8 90 days
Privileged 15 30 days
At least this is what is enforced by DECinspect, er, POLYCENTER Compliance
Manager, which enforces the Digital corporate standard.
Anything more, including requiring longer or system-generated passwords, is not
required but is at the option of your system manager.
Paul
|
2377.6 | How many 15 letter words do you know?? | STOWOA::CROWTHER | Maxine 276-8226 | Fri Feb 19 1993 14:57 | 14 |
| I love this issue. I currently log into at least 5 different accounts on
a daily basis, not to mention 2 different voicemail accounts! and Lat
passwords and WATN passwords and dial-in passwords . . .
I try to keep some characters the same on all the accounts and modify only
a few of them. It also helps to keep them synchronized so you can change
them all at the same time.
This is a real hot button for me. Instead of designing the software to
be more bulletproof, all the burden is put on the 99.99% of the folks who
have no bad intentions at all, but just want to get their work accomplished.
Pfui!!
|
2377.8 | | AKO598::SHERK | | Fri Feb 19 1993 15:14 | 6 |
| Wonder if the standard password guessers check things like-
"verylongpassword"
"whytypeallofthis"
"fifteen****ingcharacters"
Ken
|
2377.9 | | 11SRUS::DELBALSO | I (spade) my (dog face) | Fri Feb 19 1993 15:15 | 21 |
| Well, Maxine, that just goes to show that software can only be just so
bullet-proof, and no more, I guess . . . . :^)
The matter becomes even worse with passwords for things that are very rarely
accessed. Only by sheer luck do I ever remember my SMS password or my
ELF password between the infrequent uses of them that I might make.
We used to preach to our customers that there was a tradeoff that they
needed to evaluate and make on an individual basis with respect to
security vs. flexibility/friendliness. Over the last five years I note that
we internally have opted for the "security at all costs, convenience be
damned" attitude. I've never quite been convinced that the decision was
at all really justified, either, but I guess there are more critical
things for me to concern myself with than the minor loss of productivity
attributable to this nonsense.
In line somewhat with the recent comment about using pwd's to express ire,
I value the fact that passwords are one of the few places on the Enet where
we can use recognizeable obscenities with impunity. :^)
-Jack
|
2377.10 | | GUIDUK::FARLEE | Insufficient Virtual...um...er... | Fri Feb 19 1993 15:21 | 17 |
| > -< How many 15 letter words do you know?? >-
As was pointed out, the answer is passsentences.
One from my distant past (which can never be used again) was:
15CHARACTERPASSWORDSSUCK. So its a bit more to type,
It wasn't hard to remember at all! ;-) Its really not hard to think up a 15
character phrase.
The best response to the problem of lots of accounts on lots of machines
(and the standard here is that you may NOT use the same password on more than
one machine/account) Was a friend who used an electronic organizer to
keep a table of systems/accounts/passwords. The organizer was always with him
(he referred to it as his "brain in a box"), and it had a security feature
which prevented the casual person from getting a peek. What I don't know
is what he did when the batteries ran out :-(
Kevin Farlee
|
2377.11 | my views on this subject | STAR::ABBASI | i think iam psychic | Fri Feb 19 1993 15:22 | 23 |
|
when i change my password (i mean when the computer tells me to change
it) the computer gives me that list of words to choose from, so i try
to pick one that is common , not like so stupid that no way i could
even remember , so i keep hitting return and keep getting new list of
words to choose from, until i finally find one that is easy to remember,
one time i remember like spending the whole weekend hitting returns until i
finally got one that is easy to recall.
please note too on a related issues that our brains has enough storage
capacity, you can put in it so much, this is a true medical and
scientific informations from the worlds top physicians, after you reach the
plateau of the brain memeory, things will start to spill over, and that
is why i think this keeping changing the password every 4 weeks or so
is putting more undue stress on our memory and brains and lives in
general and that is why people dont like it as before.
hope this helps
\bye
\nasser
|
2377.12 | "password architecture" | LGP30::FLEISCHER | without vision the people perish (381-0899 ZKO3-2/T63) | Fri Feb 19 1993 15:39 | 19 |
| re Note 2377.4 by ECADSR::SHERMAN:
> For me, they're not passwords. They are now passsentences.
> What was a bother has now become a feature as I typically use the
> opportunity to secretly express my rage at having to type in and
> remember so many characters.
Oh, you do that too? That's my "password architecture" as
well!
Actually, it has resulted in another security benefit. I am
very reluctant to give my password even to the most trusted
person for the most important business reasons, since my
"passsentences" often contain unsavory language. :-}
On the other hand, only a small part of my "passsentence"
changes each time I am required to change.
Bob
|
2377.13 | | ECADSR::SHERMAN | Steve ECADSR::Sherman DTN 223-3326 MLO5-2/26a | Fri Feb 19 1993 16:28 | 10 |
| re: .12
> On the other hand, only a small part of my "passsentence"
> changes each time I am required to change.
Yabbut. Let's not give that little secret away. Then they'd change
the system so that it's not easy to do. For those that haven't figured
it out ... well ...
Steve
|
2377.14 | YABBUT back | SPECXN::BLEY | | Fri Feb 19 1993 17:57 | 13 |
|
But how would you like to log in some Monday morning and find out
that there was NOTHING in your account, or that ALL the files had
been trashed.
IMHO, it is a VERY small price to pay for security. I have another
"sceem" for passwords, but if I tell you, then it won't be secret
anymore.....so theeeere!!!
OH, BTW, I heard that the password software is going to check for
obscene words being used, and will report you to the ethics VP.
|
2377.15 | | NEWPRT::NEWELL_JO | Jodi Newell - Irvine CA | Fri Feb 19 1993 18:40 | 11 |
| ><<< Note 2377.11 by STAR::ABBASI "i think iam psychic" >>>
>-< my views on this subject >-
>hope this helps
No sir, it doesn't.
Jodi-who hates having to remember so many "passentences"
|
2377.16 | BIG BROTHER LIVES | SWAM2::KLINE_ST | | Fri Feb 19 1993 18:45 | 2 |
| i.s. management has routinely over the last 10 years looked at obscene
passwords and reported same to employees managers!
|
2377.17 | who needs passwords when... | 10386::GOLDSMITH_TH | Tom Goldsmith | Fri Feb 19 1993 18:55 | 10 |
| re: .14
>> But how would you like to log in some Monday morning and find out
>> that there was NOTHING in your account, or that ALL the files had
>> been trashed.
Hmmmm, how would you like to try and login and find out that someone
changed your username with NO prior notice ? This happened this
week to my cube mate.
|
2377.18 | ;^) | ALOS01::KOZAKIEWICZ | Shoes for industry | Fri Feb 19 1993 19:16 | 22 |
| re: .16
It's been a very long time since I took VMS internals, but I thought
user passwords were both encypted and hashed to some fixed-length
(32/64 bits) object. Even if I'm wrong about the hashing, the
encyption algorithm (as I recall) was one-way; you can not determine
the password by examining the encrypted value, and there are more than
one password which will yield the same encrypted values.
I distinctly remember the analogy taught at the time: VMS throws your
password into a bucket of water and remembers what the splash sounds
like. Every time it needs to validate your password, it throws the user
response into the same bucket of water and compares the sound of the
splash with the one it recorded. If they sound the same, the password
is valid.
Of course, I could be all wet here. I'm sure some techno-dweeb engineer
who actually works with this stuff or took internals since VMS V4 was
brand new will correct me if I'm wrong. Like I care.
Al
|
2377.19 | | 11SRUS::DELBALSO | I (spade) my (dog face) | Fri Feb 19 1993 19:28 | 17 |
| re: .14, "Empty account on Monday AM"
Personally, I'd be more concerned about the integrity of the last backup
and of the operations people, than about the security issue.
re: Obscenity checkers
We missed the smileys, but I'm sure you intended them. It's pretty obvious
that an obscenity checker in a password mechanism is as bad as, if not worse
than, a trap door.
re: .18, Al K.
Your recollection is pretty accurate. Respectfully, your friendly techno-dweeb.
:^)
-Jack
|
2377.20 | sweet dreams... :-) | GUIDUK::EVANS_BR | Bruce Evans, CASE Consultant | Fri Feb 19 1993 19:32 | 25 |
| Reporting in from the "Brain-in-the-box"
I'm the one Kevin was referring to back in reply .xx, and I put all my
systems paswords into this CASIO organizer. I remember 1 password,
which I change occassionally (mostly to annoy my wife :-), and have
changed the batteries several times - CASIO was smart: there's 3, which
you change 1 at a time.
Yeah, sure, one can drop it, or erase the info, or... but it hasn't
happened yet. I'll cross that bridge when I get there.
More to the point - all 25 passwrods are in there, and when I come
back from vacation, I reset my memory, and am fine.
Personally, I've held the opinion that if DEC was really serious
about security, they'd buy each of us one of those 50 name/number
credit card thing-ies, and let us put all our passwords in there.
For that matter, if DEC was *really* serious, we'd build in card
readers into the monitors (or system boxes), and you'd have to scan
them and have a retinal scan before using the ....
<slap> <slap>
Oh, agh -- huh...... where am I!!??? Oh. whew --
heck of a nightmare there....
:-) bwe
|
2377.21 | Digital enjoys the illusion of security | TLE::AMARTIN | Alan H. Martin | Sat Feb 20 1993 09:40 | 26 |
| Re .19:
>Personally, I'd be more concerned about the integrity of the last backup
>and of the operations people, than about the security issue.
Bingo. In the 12+ years I've worked here, I've never met anyone who lost files
from intruders, but I've seen 4 projects lose weeks or months of work because
operations wasn't backing up their disks.
Of course, you'd think the priorities would shift once it became obvious how
dangerous intruder-inserted Trojan Horses are. But:
1. There's still very little protection against password collection by
eavesdropping on Ethernets around here.
2. I've never worked in a Digital organization where system management put a
record of every computer account in an individual's personnel record. When
someone leaves, seldom are anything but their local accounts independantly
disabled.
3. Even in 1993, group accounts where everyone knows the password "in case I
have to submit the build batch job" are all the rage. It's the exception when
those passwords get changed when someone leaves. We just hope that everyone
will list all the accounts they have in their exit interview, and cross our
fingers.
/AHM
|
2377.22 | | MU::PORTER | savage pencil | Sat Feb 20 1993 17:40 | 13 |
| OK, so real computer passwords are A Good Thing.
But why the ^%&* do I have to have a fifteen-digit password
on my voicemail account? I don't care if anyone hears
my phone messages. I don't care about the risk of someone
sending a voicemail message pretending to be me.
It does a great job of keeping me out of my own voicemail
though. Once again, it's got irked because I don't use it
often enough, and decided to stop letting me in.
What a system.
|
2377.23 | | TOOK::MORRISON | Bob M. LKG2-2/BB9 226-7570 | Sat Feb 20 1993 21:36 | 6 |
| Don't get me started talking about Voicemail. On our system, you only need an
8-char password, so I suppose I'm lucky.
I feel that the need to remember several 16-character passwords, and a new
set of same every month, discriminates against people who don't have good
memories. Believe it or not, it is possible to have a poor memory for things
like that and still be smart enough to excel in your job.
|
2377.24 | my observations on this issue and related matters | STAR::ABBASI | i think iam psychic | Sun Feb 21 1993 02:38 | 18 |
| .23
>it is possible to have a poor memory for things like that and still be
>smart enough to excel in your job.
i agree too, i think people with bad memories is a sign for high IQ,
i read that Einstine could not remember his home phone number too,
and he used to forget to tie up his shoes, also many other smart people
were like that, they forget things, i also read that Netwon used to forget
where he was going to when he walked around in Cambridge univ. one day
he had to ask his friend if he had already had his lunch because he
forgot if he did or not.
\bye
\nasser
|
2377.25 | | LGP30::FLEISCHER | without vision the people perish (381-0899 ZKO3-2/T63) | Sun Feb 21 1993 06:31 | 11 |
| re Note 2377.19 by 11SRUS::DELBALSO:
> re: .18, Al K.
>
> Your recollection is pretty accurate. Respectfully, your friendly techno-dweeb.
I would hope that the password history mechanism is likewise
encrypted, and that real (former) passwords are not stored in
the clear.
Bob
|
2377.26 | Time to jump out of the system, imho | RDVAX::KALIKOW | Parody error, please retry | Sun Feb 21 1993 14:29 | 80 |
| Yes, password proliferation is terrible, and it is an expanding fact of
hi-tech life. What is to be done? Surely we can't let our guard down,
in an increasingly internetworked world, and in a downsizing company.
Customers I visit with as part of the Engineering Interface Program
regularly beat us (and our competition!) up on this same point -- they
can't keep track of all their ever-changing, ever-lengthening, non-
reusable passwords either. The last time out, several major accounts
mentioned a nifty solution, which happens to have been invented by an
old friend. I have no financial interest in it, but a considerable
intellectual admiration for the technology, which frankly is the best
I've seen.
My "password" now changes once a minute (!!). I get it from a
badge-sized gizmo that I now carry around with me, along with my DEC
badge and NCS> card. Without it, I can't log in. It's enhanceable
such that I must demonstrate something I *know* -- my PIN -- by
entering it into something I *have* -- my "SecurID" card from Security
Dynamics Inc. (SDI) of Cambridge MA.
I now use it on my DECpc325P laptop, in a product SDI co-developed with
the Fischer International "WatchDog" product. I could also be using
the same token on all my VMS and ULTRIX accounts, if I could but
convince various SysAdmin's to give it a whirl. (For this reason, it's
superior imho to the DataMedia "SecureCard" product we sell for PCs,
too.)
My PC's data are secure against any thief who might steal it; with the
associated SW (no HW changes whatever are needed on the laptop), you
can boot up from its floppy drive, but you can't see the built-in hard
drive. You can't boot up from the internal drive without having the
SecurID card around, from the LCD display of which the number must be
entered. If you rip out the hard drive, you'll find that all the
really crucial data (my autologin routines for termulation (including
my EasyNet password(s)), my Corporate AT&T Credit Card #, WATN group
account and password, etc.) are all DES-encrypted on disk; my company-
private docs are encrypted too, but slightly more efficiently. When I
use it "normally," it's completely transparent to me.
It's not a perfect system (yet; there's no central administration
facility for the PC version, but that's soon to come, when the age of
wireless finally arrives), but it more than meets my needs.
It needs expansion, such that you authenticate yourself ONCE to a
Kerberos-like authentication server, which then "vouches for you"
through public-key encryption, wherever else you go for data. But for
now, one can arrange for SecurID-mediated separate logins to various
data and even telecomms services. Password problem solved, and
replaced with the necessity of carrying this encrypted authentication
token.
Solutions built around this token & system are now in use by many
businesses and western government agencies in a position to buy the
best (I can't state them in this semipublic forum, but imagine the most
security-conscious shops and you'll be OK).
SecurID technology is not unknown around DEC -- it was evaluated during
the course of our own "smart-card" R&D, which group has since (as I
understand it) been disbanded. It's been incorporated in one version
of our IP InterNet Gateway authentication service (from DEC-NSL, Palo
Alto). There have been some contacts between SDI and the group at OSF
responsible for DCE and DME, though I don't know of the current state
of that possible collaboration. I'm interested in leveraging SDI's
strong position in encrypted authentication into solving our internal
(and possibly our customers') problems. In these days of downsizing
and outsourcing, it makes sense to me.
If you're interested in learning more, or if you know of SDI and/or
other solutions in this space, let's correspond. Pointers to DEC
groups or NotesFiles concerned with security gratefully received (I
know of IAMOK::PC_SECURITY). I can't promise fast response -- this
isn't my main or only project -- but I'm interested in learning more,
and perhaps helping. I believe that SIMPLE encrypted user authenti-
cation, in the coming age of wireless, PDA's, and the information
utility -- will be a key technology determining customer preference.
And, returning to this string's topic: If, to run our OWN business, we
can't ignore the security requirements that force "password inflation"
on us, we must imho look outside the current system for solutions.
|
2377.27 | | ERLANG::HERBISON | B.J. | Mon Feb 22 1993 08:11 | 28 |
| Re: .6
> This is a real hot button for me. Instead of designing the software to
> be more bulletproof, all the burden is put on the 99.99% of the folks who
> have no bad intentions at all, but just want to get their work accomplished.
Please let us know when you find a way to force the bad guys on
the network use 15 character passwords. Then we good guys can
all use 1 character passwords and always be safe from the bad
guys (I guess you also need a fool-proof way to tell good guys
from bad guys).
>Bingo. In the 12+ years I've worked here, I've never met anyone who lost files
>from intruders, but I've seen 4 projects lose weeks or months of work because
>operations wasn't backing up their disks.
Well, I haven't lost files directly to an intruder, but I've
been prevented from using my systems because we needed to
recover from an intruder.
I agree that good backups are important -- but remember that
Digital also has corporate security policies that mandate
backups, and fire protection, and emergency recovery plans.
Don't blame corporate security if good passwords don't save
your files--they try to cover all the bases with policy but
they don't control the implementation.
B.J.
|
2377.28 | Investment and return | TLE::AMARTIN | Alan H. Martin | Mon Feb 22 1993 09:47 | 10 |
| Re .27:
> Well, I haven't lost files directly to an intruder, but I've
> been prevented from using my systems because we needed to
> recover from an intruder.
I wonder whether I've lost more time because we needed to make backups.
(Whoever taught the MR1-2 operators about ^ESET RUNTIME-GUARANTEE should have
been taken out and shot).
/AHM
|
2377.29 | | ECADSR::SHERMAN | Steve ECADSR::Sherman DTN 223-3326 MLO5-2/26a | Mon Feb 22 1993 10:15 | 14 |
| re: .22
Voicemail passwords ... phooey! I got shafted by that system when it
changed my password unexpectedly and I was unable to get in touch with
the person that had the new one. I was able to tell that I had
messages, but couldn't do anything about it. People left messages
thinking they got through to me. Ever since then, I've had my phone
yanked off voicemail and my life is MUCH easier. I give out my home
number and have a regular, old, non-password answering machine there.
People have not had trouble reaching me and can have reasonable
assurance that their messages got through. And, they'll never again
have to worry about the system interfering with our communications.
Steve
|
2377.30 | | XLIB::SCHAFER | Mark Schafer, ISV Tech. Support | Mon Feb 22 1993 10:27 | 9 |
| VOICEMAIL is great! Our group has been able to avoid replacing a
secretary (they're hard to find) and I have not had a garbled phone
message in weeks!
Passwords are necessary, but I marvel that we accept a 4 digit password
on our personal things (like ATM cards). Shouldn't my money have as
much protection as my business correspondence? :-)
Mark
|
2377.31 | | STAR::ABBASI | i think iam psychic | Mon Feb 22 1993 10:52 | 20 |
| .30
> but I marvel that we accept a 4 digit password
> on our personal things (like ATM cards). Shouldn't my money have
> as much protection as my business correspondence? :-)
yes, but with ATM they need the card too along with the 4 digits.
plus, even if they get the card, they have to try from 0000 to 9999
numbers, that's 10,000 tries at most, on average, they have to try
5,000 times to guess your number, but most ATM machines will eat your
card away if it sees you making too many wrong numbers, something like
10 times or so and you have to go to the bank and ask for it back.
this is why ATM card is different from computer passwords.
hope this helps.
\bye
\nasser
|
2377.32 | Ve haf vays of improving your typing | TLE::AMARTIN | Alan H. Martin | Mon Feb 22 1993 12:42 | 13 |
| Re .31:
>... but most ATM machines will eat your
> card away if it sees you making too many wrong numbers, something like
> 10 times or so and you have to go to the bank and ask for it back.
>
> this is why ATM card is different from computer passwords.
Yeah, try mistyping your password 10 times on the STAR cluster and I'd expect it
won't merely activate break-in evasion on your account, it will probably use a
low-level electric current to lock your hands to the keyboard until the VMS
police arrive.
/AHM
|
2377.33 | mush | MYGUY::LANDINGHAM | Mrs. Kip | Mon Feb 22 1993 12:56 | 24 |
| Passwords I need to Remember (from an administrator):
Workstation (user & system)
VMS Cluster Password
Voicemail Password
COSMOS Password (office supplies)
IPA Password (purchasing system)
OTHERS:
mgr's passwords: (CORE, Cluster
IPA Approval, Voicemail, etc.)
Then, when we go home we need to remember:
The DCU PIN Number,
the other bank PIN number
and any other number we might have!
|
2377.34 | | MU::PORTER | savage pencil | Mon Feb 22 1993 13:09 | 5 |
| By the way, how come that Baybank ATMs only parse "passwords"
to the first 4 characters? Did Dave Cutler ever write
any ATM software?
Whoops, wrong notesfile...
|
2377.35 | | STAR::ABBASI | i think iam psychic | Mon Feb 22 1993 14:25 | 16 |
| .34
Dave, i know you said that with your tongue in cheeks type of way
but that is actually a good question because doctors and scientists
have found that most human brains can remember 4 items with little
problems and 7 just about and that is why also they have the phone
number to be 7 digits (without the area code offcourse) and that is
why people dont like those 15 letters computer password because they go
over the limit of remembering without undue efforts on your part to
remember it, so the issues are not that clear cut as it may seems at
first to the passing eyes.
hope this helps.
\bye
\nasser
|
2377.36 | | AXEL::FOLEY | Rebel without a Clue | Mon Feb 22 1993 18:01 | 9 |
| RE: .32
Not so! The electrical current generation software was in Phoenix.
That went the way of the dodo bird.. But with V6 and the Gammatron
Disruptor Interface to the audit server, you best be on your best
behaviour..
mike
FORMER system manager for STAR
|
2377.37 | No standard voice mail password length | BTOVT::SOJDA_L | | Mon Feb 22 1993 21:35 | 5 |
| For what it's worth, the voice mail systems here in BTO only require
a 4 digit password.
Larry
|
2377.38 | | NOTIME::SACKS | Gerald Sacks ZKO2-3/N30 DTN:381-2085 | Tue Feb 23 1993 11:48 | 3 |
| Here at ZKO, voicemail passwords must be at least 8 characters. Area code
+ phone number is 10, so I just use familiar phone numbers. It's very
easy to key in a number you're used to calling.
|
2377.39 | | 2730::PARODI | John H. Parodi DTN 381-1640 | Wed Feb 24 1993 08:24 | 15 |
|
There is nothing wrong with writing down passwords, as long as you use
reasonable care and some common sense.
Do not put the written password (or list of them) in an obvious place
(e.g., do not scratch the SYSTEM password into the plastic on the
system console). Do not write down the system name or username that is
associated with the password.
When I forget a password, I usually draw a complete blank. So my
written list has only enough of the passwords to jog my memory, but not
enough to allow an intruder to use them. I don't keep the list in my
wallet, but that would certainly be a reasonable place...
JP
|
2377.40 | Don't You Just Hate It When... | ALAMOS::ADAMS | Visualize Whirled Peas! | Sun Feb 28 1993 11:54 | 32 |
| Nasser:
There are those (not me!) who would argue that someones 15 character
password should be made up of 2-4 groupings of words. For instance,
one of my old passwords was: ibmpersonalcomputer. Three words
(ibm)(personal)(computer). For me it's easier to remember then some
randomly generated 8 character password (non-VMS generated). Of
course, now I go to bed and have bad dreams about little snippets of
the English language!
re: PINS and SecurID
I agree with those who have said, "Hey, my ATM card only has a 4 digit
PIN. _That_ number protects my money!" If everyone was issued a
SecurID card, Kerberos was implemented network-wide, and the
appropriate software was installed on all Enet machines, we could get
away with _2_ pin numbers (one for regular access, one for access under
duress). Of course the card cost just a tad of $50, so scratch that
idea! :)
My biggest b*tch is our front door combo. We have the ?ACS? access
cards that you have to swipe, a camera pointing at the door, _and_ a
cyperlock that we have to change the number on each time someone
leaves. I can [sorta] see the logic behind changing the combo for
security reasons, but without an access card, there's no way in. I
assume we collect these cards when employees or contractors leave.
When your work only lets you get by the office before or after hours,
and if you don't know the new combo...
Oh well, enough b*tching,
--- Gavin
|
2377.41 | re: Gavin Adams' .40 | RDVAX::KALIKOW | Parody error, please retry | Sun Feb 28 1993 19:09 | 16 |
| A couple comments --
(1) SecurID cards -- if they cost ~$50 each, that's BEFORE any bulk
discounts, I'll wager. And how much wasted motion might we save?
(updating, distributing, prohibiting the writing down of, administering
lost... passwords) Might that be worth throwing into the mix
(assuming we return to profitability such that cash resources liquefy a
bit)? How much is EasyNet and mobile notebook data security worth?
(2) Re the ACS> Swipe-cards... Wouldn't it be nice if your SmartCard
had a radio or IR link with the door...? Why carry two tokens, one for
door-opening and another for electronic-access-authenticating? It's
not here yet, but it's past the gleam-in-the-eye stage in the lab.
Your note didn't sound like "b*tching" to me, it sounded constructive.
Frustrated, but thoughtful. Dan
|
2377.42 | | GIDDAY::BURT | Chele Burt - CSC Sydney, DTN 7355693 | Sun Feb 28 1993 23:00 | 4 |
| Re: a few back & the use of "passsentences"
How about using "pass verses" - ie pick a poem, use one line one month, the
next line the next month etc
|
2377.43 | | RPSTRY::CDDA::DICKSON | | Mon Mar 01 1993 09:41 | 7 |
| I pick a new word from a language I would like to learn. It helps to
use a language with long words in it, like German, but failing that you
could use a short phrase.
Make those pesky expiring passwords into a vocabulary builder.
Last month's password: "hopitutuqayi"
|
2377.44 | COuld be worse | HGOVC::JOELBERMAN | | Mon Mar 01 1993 09:57 | 11 |
| At my customers site people are issued a random number as username and
then have to pick one of the VMS generated passwords. No wonder people
prefer PC's.
I think of a phrase or song lyrics and then use the first letter of
each word. It is suprisingly easy to type in, but even if someone sees
you type it in they have trouble remembering it.
gtbfmbdbtsfb for example.
/joel
|
2377.45 | | BHAJEE::JAERVINEN | No Pentium inside | Mon Mar 01 1993 10:48 | 9 |
| re .43:
�Last month's password: "hopitutuqayi"
I thought my German is pretty good, but I don't know what "hopitutuqayi"
means... HELP!
:-)
|
2377.46 | | RPSTRY::CDDA::DICKSON | | Mon Mar 01 1993 10:53 | 6 |
| I said "like German", because I thought more people would be familiar
with what those words look like. The language I am actually using
is Hopi. My password from last month means more or less "he is
learning Hopi". Like German, the Hopi language sticks lots of
modifiers onto root words, resulting in some pretty long
conglomerations.
|
2377.47 | The mother of all conglomerations (or a close relative at least)... | RANGER::BACKSTROM | bwk,pjp;SwTools;pg2;lines23-24 | Mon Mar 01 1993 11:25 | 9 |
| ...from Finland:
ep�j�rjestelm�llistytt�m�tt�myydell�ns�k��n
...petri
N.B. This doesn't really mean anything, but it can be broken down to
a number of Finnish "modifiers".
|
2377.48 | place names are good.... | SMURF::WALTERS | | Mon Mar 01 1993 11:57 | 13 |
| Or you could use place names like the Welsh:
LLanfairpwllgwyngychgogerychchwyndroblllantyssilogogogoch
(probably spelt incorrectly)
There's a Maori place name that's considerably longer.
Colin
|
2377.49 | | ELWOOD::LANE | Yeah, we can do that | Mon Mar 01 1993 12:23 | 5 |
| > LLanfairpwllgwyngychgogerychchwyndroblllantyssilogogogoch
Chargoggagoggmanchaugagoggchaubunagungamaug
was always my favorite. It's a lake in Webster, MA.
|
2377.50 | you could be on to something here.... | SMURF::WALTERS | | Mon Mar 01 1993 12:36 | 10 |
|
This is probably what lies behind the legend of Prince Madoc
and the Indians. An old Welsh tale about a Prince who sailed West,
somehow missed Ireland and landed in the US. Left a trail of
Welsh-speaking native Americans according to the tale.
Sorry for the digression....
Colin
|
2377.51 | sfbb? | MAST::HOUSE | Kenny House - MLO3-6/C9 - DTN 223-6720 | Mon Mar 01 1993 12:53 | 5 |
| RE .44 - gtbfmbdbtsfb ...
San Francisco Bay Blues ?
-- Kenny House
|
2377.52 | | STAR::ABBASI | i think iam psychic | Mon Mar 01 1993 12:55 | 23 |
| .48
> Or you could use place names like the Welsh:
> LLanfairpwllgwyngychgogerychchwyndroblllantyssilogogogoch
> (probably spelt incorrectly)
> There's a Maori place name that's considerably longer.
.49
> Chargoggagoggmanchaugagoggchaubunagungamaug
> was always my favorite. It's a lake in Webster, MA.
ok guys, are you pulling our feet this morning or what??
i know i was not born yesterday, there is no way a place can be called
like this. how will some one lost ask for directions with a name like
this?
i bet you 5 boiled eggs no one can pronounce these words let alone have
them a password for a secure system too.
\bye
\nasser
|
2377.53 | Lake Chargoggagoggmanchaugagoggchaubunagungamaug is for real | FUNYET::ANDERSON | Cut spending first | Mon Mar 01 1993 13:09 | 9 |
| Nasser,
Lake Chargoggagoggmanchaugagoggchaubunagungamaug does indeed exist. In fact,
there is or used to be a soft drink company in Webster that spelled the name out
on their soda bottles.
The lake does not, however, have a rathole like this topic does.
Paul
|
2377.54 | ratholes live! | BLUMON::QUAYLE | fries *my* clams | Mon Mar 01 1993 13:16 | 7 |
| When my oldest daughter was in fifth grade, she did a report on
Massachusetts. I had suggested that she find a little known item of
interest to begin her report. She did so, mentioning Lake Charg... and
giving the translation: "You fish on your side; we fish on our side;
nobody fish in the middle."
|
2377.55 | | GSFSYS::MACDONALD | | Mon Mar 01 1993 13:27 | 8 |
|
Re: .52
The place name in Wales is no joke either. It exists and is
world famous for its long name.
Steve
|
2377.56 | | POBOX::RILEY | I *am* the D.J. | Mon Mar 01 1993 17:58 | 6 |
|
re: the ratholes on Lake c........
...and it's a nice digression at that.
"jackin' the house", Bob
|
2377.57 | | ELWOOD::LANE | Yeah, we can do that | Mon Mar 01 1993 20:28 | 5 |
| | re: the ratholes on Lake c........
| ...and it's a nice digression at that.
'specially on a nice hot day kicked back in a canoe...a long line
of mono off to that log....a BiG lunker coming up out of the goo...
|
2377.58 | great!!! | HGOVC::JOELBERMAN | | Tue Mar 02 1993 00:52 | 4 |
| .51
Right, but that was last months password.
/j
|
2377.59 | The light is loose, too | GLDOA::FULLER | They don't call me stupid for nothing | Tue Mar 02 1993 10:58 | 8 |
| As long as we're doing passwords in non-English, may I suggest:
S O C K S
which, as most American radio listeners know, is Spanish for "That's
what it is" ;^)
Stu
|
2377.60 | Then again, I spell it S O X | VMSDEV::HALLYB | Fish have no concept of fire. | Tue Mar 02 1993 15:40 | 9 |
| > S O C K S
>
> which, as most American radio listeners know, is Spanish for "That's
> what it is" ;^)
Of course if you heard the first set of commercials pitching S O C K S
they had it translated as "that's what I want".
John
|
2377.61 | A world-famous security expert's view of this | CSC32::K_HYDE | Rdb �ber alles! CX03-2/J4 592-4181 | Tue Mar 02 1993 18:32 | 57 |
| I was working at DEC site where one of the security people suggested
that we force 15 character, machine-generated on people.
Having studied some computer crime case studies, I've noticed that
many intruders just look around (scavenge) after hours and find
passwords written under keyboards, on terminals, in telephone
directories, etc. So, I asked Peter G Neumann of the ACM RISKS Forum
if he knew which password length might be the turning point where the
increase in password length actually degraded security. My guess is
that the password length at which increasing the length actually
degrades security rather than increases it is somewhere between 6-10
characters. 15 characters is so absurd that Peter G Neumann wouldn't
even print it as bad example. I've included Peter's reply at the end
of this. It's very interesting to see how one of the World's greatest
experts in computer security uses the word "absurd" to describe 15
character passwords.
If random guessing were the only possible attack on computer security,
then it would makes sense. But, random guessing isn't the only
unauthorized way into a computer system.
How much longer can Digital stay in business if our corporate security
rules increase our internal costs without increasing benefits?
Kurt
Here is Peter G Neumann's reply:
From: DECSRC::"[email protected]" "RISKS Forum 10-Nov-89 0858 PST" 10-NOV-1989 11:59:46.53
To: rita::hyde (Migratory Database Worker 264-3839 MKO1-1/B02)
CC:
Subj: Re: Password Security And Common Sense
15+ characters is absurd.
Passwords are intrinsically not secure, because there are so many ways of
compromising them without trying random attacks:
* written down (especially if that long)
* exposed (e.g., via unencrypted network communications)
* sharing among people
* multiply used passwords
* implicit authentication (e.g., stored inside a macro or program)
* guessable (although you can avoid dictionary words)
* preencryptive attacks (e.g., based on dictionaries, initials, etc.)
* replay of captured authenticators (encrypted or not)
* trapdoors
and so on. You might consider token authenticators before going to
15-digit passwords. Peter
========================================================================
Received: from decwrl.dec.com by src.pa.dec.com (5.54.5/4.7.34)
for rita::hyde; id AA03701; Fri, 10 Nov 89 09:01:13 PST
Received: by decwrl.dec.com; id AA06579; Fri, 10 Nov 89 08:59:54 -0800
Received: by hercules.csl.sri.com at Fri, 10 Nov 89 08:58:55 -0800.
(5.61.14/XIDA-1.2.8.35) id AA05701 for hyde%[email protected]
In-Reply-To: Your message of Fri, 10 Nov 89 08:08:49 PST
Message-Id: <[email protected]>
|
2377.62 | re Kurt HYDE's .61 quote from Peter NEUMANN -- Right On! | RDVAX::KALIKOW | Parody error, please retry | Tue Mar 02 1993 22:00 | 11 |
| .61> and so on. You might consider token authenticators before going to
.61> 15-digit passwords. Peter
Yes! _vide_ 2377.26, .41; and we'd get more potential benefits from
token authenticators than then just the reduction/elimination of
escalating-length password hassles; we'd get increased mobile PC
security plus a means for authentication of access to other electronic
media, as well...
Dan
|
2377.63 | view on how PeeCee handles security and related issues | STAR::ABBASI | i think iam psychic | Wed Mar 03 1993 08:51 | 18 |
| when i leave my apt. i lock my PeeCee with the key. it comes with a key
you lock the keyboard with it, no one case use it. the PeeCee wont even
complete the boot with the key locked.
i feel much save when i do that, much better than a password,
i just take the key with me wherever i go knowing my PeeCee is save
and sound.
that is why iam starting to like PeeCee's they are so easy to use
too and you cant believe how much software there is for them, and very
nice too, except they seem to crash too much on you if you do something too
complicated, i ordered more memory for mine so i hope this will help,
i save my work every 5 minutes so that if it crashes i dont lose too
much work. i think when PeeCees software become more reliable and
resilient PeeCees will be even more important than they are already.
\bye
\nasser
|
2377.64 | one reason why banks use 4 characters | SMURF::WALTERS | | Wed Mar 03 1993 09:21 | 56 |
|
re "Absurd 15"
Psychologists refer to the memory limit it as "the magical number
seven, plus or minus 2" to reflect the fact that many people have
problems with even a 5 digit sequence under certain circumstances.
This is one of the reasons why ATM cards use 4 digits - the cost of a
workload on bank support desks just wasn't worth writing off the
potential costs of fraud. That is, more people would forget their
number and require new cards more frequently.
But this capacity guideline is based on the concept of "chunking" data
in human information processing, so (in theory) we can remember a five
word password as easily as a five digit. Since the early work on this
by researchers like Ebbinghaus back in the 1800's, psychologists have
identified several techniques for improving your memory to cope with a
series of passwords. I have five accounts that I use, plus other
passwords for Voicemail etc. I basically use the same information for
all passwords, chunked and reorganised for each application. This
means that I only have to recall one basic sequence.
When a password expires, I can reorganise it. When all possibilities
are reorganised, I choose another sequence and create the individual
passwords from it. This technique makes use of a very simple memory
technique - the act of manipulating the information transfers it from
short term memory to long term memory in a more efficient way than rote
learning. Another good technique already mentioned is to use a poem,
where the rhyme reinforces remembering. If you know some particularly
fruity limericks, any penchant for obscenity in passwords can be
maintained easily!
These are simple techniques and the information is in the
public domain. Perhaps we should include them in our product user
information.
However, this whole concept of passwords is becoming outmoded. As PC's
become more common, the stylus will replace the keyboard, another
major barrier to computer access. In these machines the user will
simply use the most familiar security measure - their signature.
The portable system will be highly secure because it will only react
to authorised persons handwriting. To prevent forgery, the system will
not simply template the characters, but also extract mathematical and
temporal constants from writing dynamics - things that cannot be forged
like a conventional signature.
Regards,
Colin
PS: Einstein explained why he did not know his own telephone number.
He said that he did not want to clutter his mind with trivialities so
that he could devote more of it to creative thinking - it's a trait he
shares with many thinkers. Although one of his successors, Stephen
Hawking, has a prodigious memory and was once able to dictate over 20
pages of complex mathematical equations from memory.
|
2377.65 | | ALOS01::ALTMNT::Kozakiewicz | Shoes for industry | Wed Mar 03 1993 09:34 | 9 |
| re: .63
Should I find myself in your apartment while you're not at home (lusting
after the data in your PeeCee), the fact that you have the key will not
deter me in the least from absconding with the box and, using a
screwdriver, having my way with it later.
Al
|
2377.66 | since on the subject of memory | STAR::ABBASI | i think iam psychic | Wed Mar 03 1993 09:40 | 22 |
|
>Although one of his successors, Stephen Hawking, has a prodigious
>memory and was once able to dictate over 20
>pages of complex mathematical equations from memory.
there is also Euler, the most amazing scientific memory in the history
of man kind, Euler got blind half way through his life, yet he
kept publishing as much as before, almost 700 papers and books in his
life time, he knew by memory most of the mathematical formulas
and did all the publication after he got blind just by doing all
the calculation in his brain only.
that was almost 180 or so years ago . he did not even use a PeeCee or
any computer and he did not even need a password !
i can also dictate over 20 pages of complex equations from memory,
as long as they dont have to be correct equations.
well. hope this helps.
\bye
\nasser
|
2377.67 | | STAR::ABBASI | i think iam psychic | Wed Mar 03 1993 09:48 | 21 |
| .65
>Should I find myself in your apartment while you're not at home (lusting
>after the data in your PeeCee), the fact that you have the key will not
>deter me in the least from absconding with the box and, using a
>screwdriver, having my way with it later.
i think my PeeCee is designed to detente when any one tries to temper
with it without the proper key usage to unlock it .
i also backup my PeeCee data every 2 hours on my little tape backup
tape drive.
hope this help.
\bye
\nasser
ps. also i think my neighbors have a little doggy in their apt that will
park very loud when any stranger is in site.
|
2377.68 | Discussion of points in Colin Walters' .64 | RDVAX::KALIKOW | Unintelligiblets | Wed Mar 03 1993 10:38 | 36 |
| _Pace_ Ebbinghaus, but imho the solution to problem with multiple
passwords is NOT improved mnemonic techniques, such as you have devised
(and of which you are mentally capable). I'm sure you're aware that
you're in the extreme minority of folks with the "mental pigeonhole
space" to carry such low-content information, because you're good at
embellishing it with whatever works for you to add memorability to it.
Others, unable to cope in that way, write 'em down and/or bug their
System Administrators when they lose 'em. And if the various systems
IMPOSE their own machine-generated passwords, so that folks lose the
ability to synchronize or string together the info, sometimes they come
after the SAs with sharp poignant sticks. :-)
(-: Reminds me of one of my favorite moments from my grad student days
at Brown -- when the Psych Department convened for the first time after
I matriculated there, we all "went around the room" doing intros and
short sketches of our areas of research and teaching interest. One
fellow whose research involved computerized studies of human memory
along the lines of Ebbinghaus' research in the 1880's got up and said
"My name is Art Reber, and I teach nonsense to Freshmen -- one syllable
at a time." :-)
And regarding signature access to pen-based PCs by pattern- and
writing-dynamics recognition -- no quarrel that such authentication
may well be possible (and even available now?), but here's a "followup
question" regarding security for such a unit.
Say I "stylus-authorize" my way into my wirelessly-connected notebook
or PDA, and through it I access my home-base data server. I'm "logged
in" to my corporate EasyNet... and then my PDA gets lost or (worse!)
ripped off. How long does the authorized data connection last? What
damage can be done to my home-base data, and/or what can be copied out,
until I report it stolen? And what of the data directly ON the unit?
How long does IT remain accessible to the hands of the finder/thief?
Dan
|
2377.69 | Explosive Memory | VMSNET::STEFFENSEN | | Wed Mar 03 1993 11:14 | 10 |
|
Nasser,
You and your PeeCee didn't happen to go for a little walk in New
York did you? Like around last Friday?
Ken
|
2377.70 | Aha, another psycho lurks.... | SMURF::WALTERS | | Wed Mar 03 1993 11:33 | 23 |
|
.68
You're right - a definite case of "it works for me!". (Hence the
example from ATMs, which was designed to cater to the "lowest common
factor".) But I wasn't advocating mnemonic strategies in support of 15
char passwords, only as a possible solution to an existing dilemma.
There are much simpler techniques that people can use that would only
take a page of online help to describe! Don't ask me what they are.
I can't remember them...... ;-)
Otherwise, I agree with the contention that 15 char passwords are
counterproductive, but maybe a necessary evil.
Many thanks for the "pen input" - I'll work it into my model!
Regards,
Colin
|
2377.71 | Detente? | CX3PT2::CODE3::BANKS | David Banks -- N�ION | Fri Mar 05 1993 10:42 | 9 |
| Re: <<< Note 2377.67 by STAR::ABBASI "i think iam psychic" >>>
> i think my PeeCee is designed to detente when any one tries to temper
> with it without the proper key usage to unlock it .
It would seem that the PC you're using here doesn't have a spell/grammer
checker, right? :-) :-)
- David
|
2377.72 | Chwarae teg nawr! | SMURF::WALTERS | | Fri Mar 05 1993 12:41 | 9 |
|
> It would seem that the PC you're using here doesn't have a spell/grammer
> checker, right? :-) :-)
Hey, he's pretty good at speaking our language. Question is,
can *we* speak his? :-}
Colin
|
2377.73 | | ICS::CROUCH | Subterranean Dharma Bum | Fri Mar 05 1993 17:36 | 9 |
| You haven't yet figured out the keen wit that Nassar has? I bet he
has better grammar than most of us, myself included. English was
far down my list of favorite subjects.
Read between the lines and laugh along. I know he cheers my day up
now and then.
Jim C.
|
2377.74 | Hidden problem with signature access | TOOK::MORRISON | Bob M. LKG2-2/BB9 226-7570 | Fri Mar 05 1993 18:23 | 4 |
| Re singature-access stylus PC's: it sounds like if you break your writing
arm, you can't access your PC because your signature will look bogus. Also,
if you can use your signature to access the computer at work, how does the
system manager de-authorize you when you leave the company?
|
2377.75 | Serious Rathole (I'll Stop! I Promise!) | ALAMOS::ADAMS | Visualize Whirled Peas! | Sat Mar 06 1993 23:20 | 39 |
| re: .74
My rebuttal to this is:
1) You break your arm skiing over the weekend
2) Monday [afternoon] you call the office and indicate you'll be out
for a while
3) A few days later you go on STD (per company policy)
4) A new and improved version of DECinspect notices your account hasn't
been accessed for the past 2+ weeks, and notifies the SM
5) The SM, per company policy, deletes your account (and the latest
build of VMS) due to the fact you've obviously been TFSO'd
6) You get the cast removed, and return to work on a Monday
7) You notice the absence of your account, the hate memo from the rest
of the VMS team, and the lack of any expense voucher reimbursments (no
account, no way to have the e-mail notifications sent out)
8) You call personnell, travel, finance, and make up with the VMS team
"It was all a terrible mistake"
9) Your boss comes in [afternoon] and says, "I thought you were
TFSO'd?"
10) You arrive at the hospital with a broken hand due to hitting your
boss
11) goto step 1
--- Gavin
(sorry, but a lot of thoughts came together and had to expressed)
:) :) :) :) (for da humor impaired)
|
2377.76 | | SPECXN::BLEY | | Mon Mar 08 1993 11:19 | 11 |
|
RE: .72
>>>Hey, he's pretty good at speaking our language. Question is,
>>>can *we* speak his? :-}
*WE* are not in his land...*HE* is in ours. If we go to his land
then we should be able to communicate at least as well there as /Nasser
does here.
|
2377.77 | Twwwweeeeeettttttttt! | ROWLET::AINSLEY | Less than 150 kts. is TOO slow! | Mon Mar 08 1993 12:09 | 5 |
| re: .76
Did you miss the smiley-face in .72?
Bob
|