Grex Helpers Conference

Item 89: System Problems Item

Entered by i on Tue Mar 21 03:08:49 2000:

166 new of 222 responses total.


#57 of 222 by scott on Thu May 11 14:33:34 2000:

There's a little shareware out there called "cookie cutter" which you can use
to selectively delete cookies.  When I downloaded it you could use it free
for 10 times, and then have to pay for further use.  The only confusing thing
is that you mark what you want to save, insead of marking what you want to
delete.


#58 of 222 by rcurl on Thu May 11 15:21:46 2000:

I have a Cookie Monster. It is called 'locked'. I have my MagicCookie
file locked, so that when I quit Netscape, no cookies are written
to it. However the cookies needed while 'surfing' are available in
active memory. Best of both worlds, perhaps. 

It is so easy to edit cookies, if you save them, that I don't see any
reason to pay for a utility to do it - unless it costs less than $2 maybe. 



#59 of 222 by goose on Thu May 11 16:06:56 2000:

Is MagicCookie the software that does this or is it called Locked?


#60 of 222 by sno on Thu May 11 16:08:53 2000:

My ~/.netscape/cookies file is linked to /dev/null
Never had a problem, and I don't care that I retype my cgi login info.



#61 of 222 by rcurl on Thu May 11 16:19:10 2000:

MagicCookie is where Netscape stores cookies. One just locks that file
so nothing can be written to it (this is an OS option - no extra software).
I am, incidentally, running MacOs (and I gather sno is running Unix), but
something equivalent should be available on the DOS platform.


#62 of 222 by remmers on Thu May 11 17:09:27 2000:

Netscape doesn't give you error messages when it finds it
can't write to the file?


#63 of 222 by rcurl on Thu May 11 17:29:16 2000:

Nope. It is "user friendly". (Why should Netscape care?)


#64 of 222 by remmers on Fri May 12 00:42:14 2000:

It depends on what the user wants, and Netscape can't read minds.
If the user *wants* to save cookies but the file had gotten
locked inadvertently, the it would be more user-friendly to give
an error message.


#65 of 222 by janc on Fri May 12 03:20:09 2000:

From time to time I run vi on my cookie file and delete all the trash.


#66 of 222 by janc on Fri May 12 03:29:03 2000:

Grex wasn't serving web pages of any kind for a while today.  Scott rebooted
the system after 52 days of uptime (just because he thought it might change
the air a bit), and uncovered the fact that the last time I upgraded Apache
I forgot to do one step needed to make the new apache get run after a reboot.

Oops.

Apache is still running out of processes occasionally.  I don't understand
why.  If someone notices this happening (sudden requests to re-login, sudden
system error pages appearing instead of backtalk pages) if you quickly log
in and do 'ps -auxwww | mail janc' then it might give me some data I can
make sense of.


#67 of 222 by rcurl on Fri May 12 04:56:19 2000:

Well, you have a point John, though locking a file "inadvertently"
on a Mac isn't easy. If it is easy on a PC, then maybe the PC version
does give a warning? 


#68 of 222 by n8nxf on Fri May 12 11:16:24 2000:

Not easy?  Don't you just have to get "file info" and click on the lock box?


#69 of 222 by cyklone on Fri May 12 11:27:16 2000:

He said "inadvertently" . . .


#70 of 222 by davel on Fri May 12 14:40:54 2000:

I inadvertently click on the wrong thing sometimes.  Especially since I
usually use keystroke shortcuts, which are *much* faster & don't require
taking my hands off the keyboard.


#71 of 222 by rcurl on Fri May 12 16:21:54 2000:

There is no keystroke to lock a file on a Mac. You have to open Get Info,
move your cursor to the lock box, and click on it. Nearly impossible to
do inadvertently. You have to *want* to lock the file (...cheeeeez....).


#72 of 222 by gelinas on Sun May 14 03:23:12 2000:

Even though <CMD>I is the keyboard shortcut for Get Info, there is still
the problem of selecting the file and mouse-clicking the Lock box.  Nope,
not easy to do inadvertently.

In DOS/Windows, set the Read Only attribute.  In WinNT (and 95/98/2K?) 
use Find to find the files named "cookie", right-click on them, select
Properties, and click the read-only box.  Works just fine.


#73 of 222 by bru on Mon May 15 01:48:21 2000:

I have been having  a problem telnetting in from work.  I keep getting athe
prompt in the middle of the text.  yes, I am set to vt-100.


#74 of 222 by n8nxf on Mon May 15 12:12:59 2000:

Seems like it's difficult to accidentally lock a file on the PC too.


#75 of 222 by jor on Thu May 18 12:42:11 2000:

        disk full?


#76 of 222 by remmers on Thu May 18 22:19:22 2000:

The /tmp partition was full, causing certain program to not function.
Fixed now.


#77 of 222 by remmers on Thu May 18 22:19:40 2000:

Er, programs.


#78 of 222 by i on Sat May 20 02:40:14 2000:

Last night & a couple times tonight, i dialed in to 761-3000 and got 
"NO CARRIER" a few seconds after the modem stopped publicly dickering
over protocols.  Dialing in to -5041 got me in okay both times.


#79 of 222 by tpryan on Mon May 22 11:32:42 2000:

        I often have the problem in #78.


#80 of 222 by i on Fri May 26 01:27:34 2000:

Same at #78, but 3 fails on -3000, then in on -3554, all in the past few
minutes.


#81 of 222 by otaking on Fri Jun 2 21:33:25 2000:

I've had a problem with the conferences lately. I have to keep looking at the
same responses to some conferences 3 or 4 times. That's not bad when it's one
of the smaller conferences, but very annoying on agora.


#82 of 222 by other on Sat Jun 3 04:51:06 2000:

I have been having a consistent problem with being dumped off of Grex (telnet
connection) recently.  Especially annoying for the reasons stated in the
previous response.  My configurations have not changed, so I'm assuming this
is a Grex issue.  Other folks seem to have been reporting this quite a bit
lately.  Any ideas, Staff?


#83 of 222 by pfv on Sat Jun 3 17:22:03 2000:

        /var: write failed, file system is full




#84 of 222 by willard on Sat Jun 3 17:24:37 2000:

Dear Grex,

/dev/sd2e             699223  668176       0   106%    /var

Your Pal,
Mike

Hi Pete.  Wasabi?


#85 of 222 by styles on Sat Jun 3 18:58:20 2000:

Newuser doesn't list all of the available shells.
I know that at least zsh is not listed, and it seemed like perhaps more were
also not listed (not as many as /etc/shells).

And chsh won't let you update the passwd database to zsh if you answer "no"
to when it prompts for either the creation of a .login (should be .zlogin,
I believe) or a .cshrc (again, pretty sure it should be .zshrc; .zlogin,
.zshenv, and .zshrc are the associated files, and though zsh is some sort of
derivation of bourne and c shells, I believe it only checks for the .z*'s).


#86 of 222 by cmcgee on Mon Jun 5 18:06:33 2000:

I couldn't dial in today.  Both 3000 and 3411 would answer the phone, but not
give me a welcome.  Left it running for 1.5 minutes, still now cheery
greeting.


#87 of 222 by jep on Mon Jun 5 19:47:27 2000:

The MOTD says:

M-Net is down temporarily. Read Item 32 in the M-Net Conference. -dpc

Can this message be changed to point people to the "mnet" conference?  
There is no conference on Grex called either M-Net or m-net, at least 
the way Backtalk understands conference names.

Thanks!


#88 of 222 by cmcgee on Tue Jun 6 00:15:06 2000:

Still unable to dial in to Grex.


#89 of 222 by scg on Tue Jun 6 01:45:45 2000:

The terminal server was down.  I just rebooted it.


#90 of 222 by janc on Tue Jun 6 03:05:38 2000:

Resp:87 - I took the liberty of making "join M-Net" work instead of editing
the motd.


#91 of 222 by steve on Tue Jun 6 06:06:56 2000:

   Grex had a root breakin on another machine we use for things,
in which the vandal MAY have tried grabbing passwords from users
as they typed them in.

   Grex itself was NOT affected.  The machine that was, gryps, is
used for some functions like teaching the terminal server what to
do when it boots up, and some other things.  This machine was running
an an older copy of the FreeBSD operating system, and apparently,
a vandal saw this, and applied some exploit to it, and got in.  We
see clearly that the vandal installed some software to steal passwords
(called a network sniffer), but we do not know how much time the
vandal had to run this and harvest passwords.  It doesn't look like
they (it?) had much time, but we can't tell for sure.

   It is for this reason that we strongly suggest that anyone who
logged in between June 3rd and June 6th to change their passwords
now.  We know that whatever damaged this cyberslime did will be
minimized by folks changing their passwords.  IF YOU USE YOUR GREX
PASSWORD ON SOME OTHER MACHINE, CHANGE THAT TOO!

   Grex was down today as we looked at it, and there is no evidence
that the vandal did anything to Grex.  The vandal was not terribly
sophisticated, left tracks, and in general did not display either
the intelligence or panache needed to harm Grex itself.

   The FreeBSD machine is currently powered down.  We have another
machine waiting to be used which runs the OpenBSD operating system
which will be the new Gryps within a day or two.

   We do not think that anything else on the system has been 
damaged, but of course there is the possibility that we have missed
something, so if you see something weird, please tell staff right
away (mail to staff).



#92 of 222 by tpryan on Tue Jun 6 11:21:20 2000:

        Please make the password change program less agrumentative.


#93 of 222 by cyklone on Tue Jun 6 12:33:44 2000:

The dial-ins work intermittently


#94 of 222 by tpryan on Tue Jun 6 15:51:26 2000:

        and the dial-in server no longer has the 'it may take a momnet
message'.


#95 of 222 by rcurl on Tue Jun 6 16:53:47 2000:

I just used !change from here to change my password, and wondered what
tpryan meant by it being "agrumentative", unless he really was referring
to all the extra words that have *grown* there. 


#96 of 222 by janc on Tue Jun 6 16:59:18 2000:

He means the "your password is too obvious" thing.  Grex is really picky
about passwords.  


#97 of 222 by rcurl on Tue Jun 6 17:41:22 2000:

OK...I've never had that problem, so didn't think of that.


#98 of 222 by mooncat on Tue Jun 6 17:42:28 2000:

Or it tells you if you new password is too similar to the old one, and 
tells you to be more creative. (paraphrasing)


#99 of 222 by rcurl on Tue Jun 6 17:56:54 2000:

I use a password generating scheme that easily creates new ones based
on old ones, but so different that algorithm can't detect the relation.


#100 of 222 by jmsaul on Tue Jun 6 18:38:42 2000:

Cool!  What is it?

(Just kidding.  ;-)


#101 of 222 by gull on Tue Jun 6 18:56:01 2000:

Grex's isn't too bad.  I've been unable to change the password on my
Michigan Tech account, though, because I can't come up with one that
satisfies *their* password program.  Sigh.


#102 of 222 by mcnally on Tue Jun 6 19:09:21 2000:

  re #98:  That would be quite a trick..  The system shouldn't know what
  your old password was..


#103 of 222 by cconroy on Tue Jun 6 19:58:44 2000:

And then there's NT, which won't let you reuse any previous password 
(which is understandable to maintain tighter security, but gets really 
annoying when the system is configured to make you change passwords 
every three months whether you like it or not).



#104 of 222 by rcurl on Tue Jun 6 21:03:54 2000:

Re #102 re #98: it knows it at the time you are trying to change it.


#105 of 222 by ryan on Tue Jun 6 21:30:39 2000:

This response has been erased.



#106 of 222 by scg on Tue Jun 6 22:15:35 2000:

passwd asks first for your old password, to verify that you aren't just some
random person who walked up to an already logged in terminal, and then for
the new password.  I assume it does its comparison from what you tell it your
old password was (which it then verifies), rather than by pulling it out of
a database somewhere.


#107 of 222 by drew on Tue Jun 6 22:26:07 2000:

As I recall, passwords are not stored plaintext anywhere on the system.
Rather, a hashing algorithm is used, that's supposed to be one-way. When it
needs to check your password for any reason, whatever program is doing the
checking takes what you type in and calls the hashing routine, and compares
the result to what's in the shadow file (formerly in /etc/passwd). Thus it
can convert 'foobar' to $%H8@feJK&^, but given the string $%H8@feJK&^, there
is no way to derive the plaintext 'foobar'.

I would guess that on today's faster machines, given the list of hashed
passwords, it might be possible to write a program to try every possible
plaintext password starting with the letter ^A until it finds one that
matches; and that's why shadow files were implimented. Or is this feasible?


#108 of 222 by steve on Tue Jun 6 23:38:48 2000:

   Drew's explaination of how passwords are stored is right.

   As for trying to guess passwords, thats what the "crack" program
does, only it uses dictionaries of words along with some other algorithms,
and for people who choose "bad" passwords, can be *very* effective.

   *That* is why Grex;s passwd program is so very picky.  I don't
normally like the idea of software being so grumpy about human
behavior, but all too many people choose HORRIBLE passwords if
left to their own devices.


#109 of 222 by bruin on Tue Jun 6 23:45:08 2000:

BTW, as I use Backtalk to access Grex, what would be the procedure for 
changing a password?


#110 of 222 by other on Tue Jun 6 23:48:56 2000:

I just sometimes use words from human languages for which no dictionaries 
exist. (Transliterated, of course.)


#111 of 222 by mary on Wed Jun 7 00:35:54 2000:

Grex's password program isn't picky.  I've had the same one for
the past 8 years.  When it prompts for a change I give it one
then immediately run the set password program and change it back
to the one I had.  I'm not worried about my password being abused.
I'd bet whomever got ahold of it would be nicer than I am. ;-)

Some people are concerned about such things and it's nice the system
allows them a higher level of security.



#112 of 222 by steve on Wed Jun 7 01:59:35 2000:

   Yes Mary but they might do something using your account that would
be *less* than pleasent.  A prof in a college to the west of us just
recently had his pw stolen, and guess what?  The little vandal sent a
death threat to Al Gore apparently.  Said prof had some explaining to
do, etc.

   Not changing your pw is 8 years is just plain risky.  I hope that
pw is not used on anything that ever has any form of value flowing
through it.


#113 of 222 by mcnally on Wed Jun 7 02:06:22 2000:

  as opposed to Grex?


#114 of 222 by steve on Wed Jun 7 02:21:48 2000:

   Grex represents its own set of value, but I'm talking of systems
such as anything used in a business where obtaining a pw might result
in a vandal being able to manipulate something like product that a
company has, or something else of direct value in the real world.

   Grex doesn't have any of that kind of stuff online, so the most
dangerous thing that could happen is all related to email, which isn't
saying that emails to the wrong people can't land someone in a fair
amount of trouble.


#115 of 222 by cmcgee on Wed Jun 7 02:40:31 2000:

The UM password checker is even snippier than Grex.  I finally used my
favorite password with punctuation marks separating some letters.  It didn't
like my "first letter of each word in the title of a book, song, etc"
algorithm.


#116 of 222 by twinkie on Wed Jun 7 02:57:28 2000:

re: 103 -- By default, Windows NT *will* let you reuse an old password. You
can set it to never accept a used password, or you can set a threshold, such
that NT will not accept a used password until there have been 10 unused ones.
(Which can easily be defeated by changing your password 10 times in a row)



#117 of 222 by bdh3 on Wed Jun 7 03:29:00 2000:

The yuckey mainframes at where I work have a very picky 
password program that not only requires 1 non alpha, but don't let you
reuse passwords ever and you have to change it every 90 days and you
can't use the same password on different machines.  
In my group we all have thinkpads as we are 'mobile'. As a result
of the 'very secure' password scheme the mainframe gangy uses just
about all if my cadre have a label stuck to our laptops with system
name and password pairs written on them.  (I at least keep them in my
palm pilot encrypted under a central password.)

Humans are the weak link in any security system.

 


#118 of 222 by jmsaul on Wed Jun 7 03:49:02 2000:

Yep, and the pickier the password program is, the weaker a link the humans
become.  It's a tradeoff.


#119 of 222 by steve on Wed Jun 7 04:28:57 2000:

   I dunno.  Grex has trained a lot of people into thinking about passwords
in ways that they didn't, before.  I have had many many conversations with
people about the pickyness of our passwd program, and at least some people
who use Grex have an awareness of passowrds that they didn't before.  Now,
some people are probably the opposite, and rebell and use the same one
difficult pw over and over, so in that sense, there is a tradeoff in the
general population of people.  But I do think that some people here choose
better pw's because of Grex's pickyness, which is a good thing.


#120 of 222 by omni on Wed Jun 7 04:29:13 2000:

  If I've learned anything in the last 7 years, I've learned that when
STeve advises you to do something it is in your best interest to heed
his advice. 
  Just before I got my ham license, I asked STeve about radios. He told
me ICOM was just about the best one on the market. I followed his counsel
and have not been sorry. That was almost 8 years ago.
  I changed my password this morning. The new one wull be a pain to learn,
but I will learn it. It is better than a death threat sent to the president
in my name.

  Thanks for being vigilant, STeve.


#121 of 222 by omni on Wed Jun 7 04:30:15 2000:

STeve slipped in.


#122 of 222 by senna on Wed Jun 7 04:38:47 2000:

I have a number of rotating passwords, so I shuffled around to satisfy my
desire for security.


#123 of 222 by jmsaul on Wed Jun 7 04:40:55 2000:

Re #119:  Programs which require strong passwords do help against people
          running crack and the like, there's no doubt.  Unfortunately,
          they lead to other security problems, like people writing passwords
          down on post-it notes stuck to their monitors.  Whether it's a
          good tradeoff depends on which threat you're more worried about.
          In an institutional environment, I'd usually worry more about the
          post-it notes.  Here, worrying more about script kiddies may be
          a good call.  In any event, Grex isn't doing the thing that provokes
          the worst "weak link" behavior -- timed expiration.

          On general principle, though, I'm not so sure you should be
          encouraging people to write their passwords down.  Even if it
          isn't a problem here, it's a bad habit to be in in an office
          environment.


#124 of 222 by omni on Wed Jun 7 07:44:21 2000:

If I don't write it down, I'm gonna forget it.

I think I'm gettin' old. My bones is getting creaky and
I'm forgettin things I should remember and rememberin'
things I should have forgot. Oh dear. ;)

I do have a large supply of potential passwords. I'm not
worried about the password program rejecting one of my potentials.


#125 of 222 by goose on Wed Jun 7 11:10:25 2000:

(RE:Icom -- I liek and trust STeve, but I've not been happy with my Icom.
I'd much rather have a Yaesu HT, and a Kenwood Mobile)


#126 of 222 by iggy on Wed Jun 7 12:35:24 2000:

the stupidest password i hadever known anyone to have was 'password'


#127 of 222 by jmsaul on Wed Jun 7 12:37:25 2000:

"secret" is another popular one.


#128 of 222 by jep on Wed Jun 7 13:02:21 2000:

It's amusing, working in an office where passwords have to be changed 
often.  You can walk around and find out anyone's password, from the 
post-it note on the front of their computer.


#129 of 222 by jazz on Wed Jun 7 15:42:08 2000:

        Yet another thing that is not commonly understood in IT is that
convenience, security, and ease of setup are related in a Heisenbergian way.
The more security you have, the less convenience or ease of setup ...


#130 of 222 by rcurl on Wed Jun 7 16:08:21 2000:

Most of my passwords for various systems are on postit notes on my
computer...verfy handy 8^}


#131 of 222 by remmers on Wed Jun 7 16:46:16 2000:

The last time Grex forced me to change my password, I came up
with what I thought was a paragon of obscurity.  "Too obvious",
said the passwd program.  So I chose an even more obscure-
seeming one.  "Too obvious".

Finally, I chose one that seemed (to me) distinctly more obvious
than the first two.  The passwd program took it without objection.
Go figure.


#132 of 222 by remmers on Wed Jun 7 16:50:02 2000:

(Password-cracker wannabes should take note that my current
password is now different than the "more obvious" one mentioned
above.  I changed it again in the wake of the recent gryps
vandalism.)


#133 of 222 by drew on Wed Jun 7 19:37:52 2000:

If a password is not in any dictionary, is it still possible/feasible for the
crack program to find it by trial and error? Assume it to be running on a 500
MHz PC.


#134 of 222 by scg on Wed Jun 7 19:40:53 2000:

That would depend.  If it's truely a string of random characters, there's a
huge number of possibilities, and that would take a very long time.  If it's
something like all numbers, all lower case letters, or something like that,
it won't be that hard.


#135 of 222 by mdw on Wed Jun 7 20:17:09 2000:

If it's short enough, it doesn't matter how random the characters are.
Crack programs generally iterate all the possible permutations of
characters for short lengths, then use rules to generate a small set of
variations (such as mixed case, added digit, etc.) based on every entry
in a set of word lists.

The logic in passwd tries to forbid choices like this - so it forbids
passwords that are "too short", and it has its own set of word lists
which it checks.  A password that fails the check in passwd is almost
certainly a bad choice.  Just because it passes the check doesn't mean
it's a good choice however, the question there would be if it's
something that could be generated by a rule selected by a vandal, and
it's somewhat difficult to predict just what rules a vandal might
actually select.


#136 of 222 by spooked on Wed Jun 7 23:32:39 2000:

The one-way Hash function on Unix password systems are all the same,
correct?  If so, why?


#137 of 222 by mcnally on Thu Jun 8 00:38:35 2000:

  I don't think that is correct, actually..


#138 of 222 by spooked on Thu Jun 8 00:41:03 2000:

I was wondering, I had a suspicion they were, but not sure.  Marcus? (:


#139 of 222 by scg on Thu Jun 8 00:49:15 2000:

My impression is that by default most but not all Unix systems use the same
hashing algorythm.  There's a good standardization argument for that, since
it allows password files to be moved between systems, but I suspect it has
more to do with people creating new Unix systems tending to reuse stuff from
older systems.

However, there is nothing stopping somebody from writing their own crypt()
function.  Some systems are different from others, by default.  Grex has its
own password encryption function that Marcus wrote, in order to be less useful
to somebody trying to run crack on stuff here.


#140 of 222 by spooked on Thu Jun 8 00:51:51 2000:

Yep, thanks Steve.  Like I thought.


#141 of 222 by janc on Thu Jun 8 03:43:59 2000:

Most Unix systems use crypt, which is derived from DES.  Most systems
don't meddle with it, because creating good encryption algorithms is a
very subtle and sophisticated art.  In many, many cases if you try to
make "improvements" you may be weakening it instead.  So most people are
well advised not to fiddle with these things.

Grex has been through no less than three password encryption algorithms.

The original one was the standard Unix one, which takes the first eight
characters of your password, and converts them into a 14 character
gobbilty gook string (of which only 12 characters really count).

When we switched over to the shadow password system, we also started
using the "encrypt" password encryption algorithm that came with that. 
This wanted to use more than eight characters of your password, so it
encrypted the first eight, and then the second eight with the old crypt
algorithm, giving two 12 character strings, and stored them both.

That's better, right?  Wrong.  In practice, if people's password is
longer than eight characters, it is usually only a few characters long. 
So the second crypt is usually an encryption of strings only a few
characters long - hence easy to crack.  Knowing the last few letters of
someone's password actually makes guessing the first eight easier.  So
the net effect of this "improved" algorithm is that it is weaker than
the original.

Marcus replaced that with his own algorithm, which also uses more than
the first eight letters, but does it much more intelligently.  It's
based on a well-established encryption algorithm called SHA.

If you want to know everything there is to know about how Grex encrypts
and stores passwords, see
    http://www.cyberspace.org/staffnote/passwd.html

I've seen some talk about Linux systems using MD5 password encryption,
and various other Unix versions have used various other password
encryption techniques.


#142 of 222 by mdw on Thu Jun 8 03:47:43 2000:

For a long time, the "standard" unix crypt() function used a version of
DES that had been hacked by the bell labs folks to randomly permute the
S table 4096 different ways (using a 12-bit value randomly generated and
stored as the first two characters of the hashed password).  Many years
after the initial algorithm, after some of the properties of DES were
better understood, it was found that scrambling the S box the way bell
labs had done it actually weakened DES, but I don't think anyone ever
came up with a serious attack on crypt() based on this.  More serious
problems (in practice) included the fact that since crypt() used des,
the US gov't claimed jurisdiction based on ITAR, which complicated
distribution.  This wasn't a problem for binary-only distributions of
Unix though since crypt() is only used for authentication not encryption
and there are special loopholes in ITAR for authentication-only systems.
This was an issue for linux and 386bsd however.  Other problems included
the inherent weakness of DES (against today's greatly enhanced CPU
power, which renders DES vulnerable to brute-force attacks), and the
widespread deployment of "crack", which made des-based crypt Unix
password files the stuff of dreams for vandals.  Since there are "only"
4096 different salts, "crack" could be optimized for attack against
large password files.  An additional weakness of crypt() is that it only
uses 56 bits of key information from the user password - meaning it only
works with passwords of up to 8 characters in length.  Indeed,
getpass(), which is the "standard" unix function to get a password, also
has this 8 character limit wired in.

Modern versions of bsd, and very probably some versions of linux by now,
support a number of other hash algorithms in addition to the standard
des based crypt - these additional algorithms often include a larger
salt (making it harder to optimize crack), use of stronger cryptographic
functions such as md5, sha-1, or blowfish, and support for passwords of
more than 8 characters.

The hash algorithm we use here on grex differs from bsd, because the bsd
functions use the same keyspace on every machine and because they
weren't obviously adaptable for use with kerberos.  The grex function
was designed to faciliate its use with kerberos in the future, so when
we migrate to that, we should be able to just dump the current shadow
file into kerberos and and not require that people change their
password.


#143 of 222 by keesan on Fri Jun 9 00:54:13 2000:

I had no trouble getting grex to accept a password from a language that has
dictionaries (in transcription) and another account accepted a password from
another language that uses the Latin alphabet.  I don't see why grex should
scan every language of Europe into its password computer.  Grex might,
however, want to prevent people from using passwords with an obvious relation
to logins.  Is there some program to prevent this?

It is taking much longer than usual for the login script to appear when I dial
in, or maybe it only seems that way because there is no wait message.


#144 of 222 by jmsaul on Fri Jun 9 01:49:06 2000:

There are a number of potential bad passwords that it's very hard to scan for.
Words in languages other than English are a problem, because it's difficult
to put every language in the world into your scanning program, but you never
know what some script kiddie will come up with a handy Basque dictionary or
something.  Other bad passwords are only bad for a specific user -- words
related to their loginid, names of pets, words with significance obvious to
anyone who reads the person's web page, etc. -- and they're pretty much
impossible to check for.  That's why some password programs insist on numeric
characters and/or characters that aren't alpha-numeric:  it cuts down on the
worst possibilities.


#145 of 222 by mdw on Fri Jun 9 02:08:04 2000:

passwd does check for passwords that bear an "obvious" relationship to
the loginid.  When I was collecting word lists out on the web, I didn't
succeed in finding a word list for every european language, nor every
language that can be transcribed using the latin alphabet.  I do see in
checking that I actually do have a much better word list that somehow
never made it onto grex.  Perhaps I'll do so in due course (my best
collection of words does include japanese & some swahili, among other
things.)


#146 of 222 by gull on Fri Jun 9 04:36:13 2000:

I was going to change my password on a RedHat system, but got frustrated and
ended up leaving it.  The reason is that it kept insisting my new passworld
was "too similar to the old one."  They had practically nothing in common
that I could see, except for both using a capital letter as their first
character.  Bah. :P  I have better things to do than play "guess what I want
you to do" with a program that wants to pretend to be smarter than it is. 
Grex's passwd program is quite tolerable by comparison.


#147 of 222 by bdh3 on Fri Jun 9 04:55:33 2000:

Any password that is a 'word' as spelled in a dictionary
in any language is a bad password as crack can be used
to crack it.  Years ago when I ran against a large unix
password file it cracked about 25% with just an english
dictionary.  When I added spanish, french, german, russian,
and a 'jargon/technical' dictionary the crack rate was close
to doubled.


#148 of 222 by steve on Fri Jun 9 05:51:07 2000:

   I believe that.  Recently I have seen dictionary files for
most (and I do mean most) of the languages in Africa, eastern
european languages, and some native american.  No password that
is a word in any language is safe.  Not any more.


#149 of 222 by bdh3 on Fri Jun 9 09:52:42 2000:

(perhaps a separate item discussing the pitfalls of
any password that is a 'word'?)


#150 of 222 by tpryan on Fri Jun 9 11:26:17 2000:

        Why would machines allow hundreds of attempts on an account
without shutting down the connection?  Anything beyond 5 attempts is
reason to disconnect.


#151 of 222 by keesan on Fri Jun 9 14:46:08 2000:

Grex accepted a common Bulgarian word (in BGN transcription).   I have not
tried it yet on Albanian or Latvian or Finnish or even Romanian.  How long
would it take someone to find my password if they were told it was in a
language of Europe, even one that does not need to be transliterated?
English, German, Dutch, Swedish, Norwegian, Danish, Icelandic, French, Basque,
Romansh (sp?), Portuguese, Spanish, Italian, Romanian, ten Slavic languages,
Finnish, Hungarian, Latvian, Lithuanian, Latin, modern and ancient Greek,
Albanian, Turkish, Welsh, Scots Gaelic, Irish Gaelic - and let's not forget
every possible verbal ending (I used a verb with an ending in some other
account) and plurals and adjective endings.    Grex does accept combinations
of English words with numbers.  Like tpryan says, if you only give someone
5 guesses, there is no need to worry about other languages.


#152 of 222 by krj on Fri Jun 9 15:33:40 2000:

In a sophisticated attack, the encrypted password file would be taken
off of Grex so the thief could play with it as long as he wanted.


#153 of 222 by jmsaul on Fri Jun 9 16:09:07 2000:

WHat he said.  If you care about the security of your account, do not use
words in other languages.


#154 of 222 by keesan on Fri Jun 9 17:33:15 2000:

So why would anyone want to waste time feeding every dictionary in the library
into their scanner so as to be able to read my email?  After that, theywould
need several dictionaries to read the email (and grammar books).


#155 of 222 by jmsaul on Fri Jun 9 17:39:30 2000:

They don't necessarily care about you personally.  They may just want an
account to work from so some other sucker gets the blame for what they're
doing.  They'd use other dictionaries simply because more dictionaries will
bag them more passwords.

As for whether they could read your email if they wanted to, keep in mind that
the US does not have a monopoly on computer access or skills.  The intruder
who hits you might be a native speaker of whatever language your email is in.
There are a heck of a lot of Russian script-kiddies out there, and there are
even some working out of other slavic-speaking countries as well.


#156 of 222 by drew on Fri Jun 9 19:11:44 2000:

'sides which, they'd already have the dictionaries they need - they used them
in the crack program.


#157 of 222 by omni on Fri Jun 9 19:31:45 2000:

 re 154  There are things called scanners which can enter dictionaries without
too much effort.


#158 of 222 by keesan on Fri Jun 9 19:36:43 2000:

Re 157, I mentioned scanners in 154. :]
For what it is worth, i am not currently using a Bulgarian password.


#159 of 222 by mdw on Fri Jun 9 23:57:50 2000:

Most vandals would not care about keesan in particular.  They would
merely be trying the largest collection of words they can acquire
against what they hope are the hashed passwords from grex.  If they
acquire the password to a real account, they hope to be able to log in,
read through your e-mail to see where else you might have an account, or
who your friends are, and they may then try to leverage your access to
also gain access themselves to that machine.  This is, in fact, how
gryps was initially compromised - a site elsewhere was compromised, a
grex staff member happened to have access at that site, and the vandal
discovered the grex staff person's password was the same on gryps.
Obviously, this is now fixed, but this is a good illustration of the
line of attack many vandals pursue.


#160 of 222 by keesan on Sat Jun 10 01:23:35 2000:

Does this mean we should not use the same passwords on grex and elsewhere?
(How does one keep straight all ones passwords if they are different?)


#161 of 222 by mdw on Sat Jun 10 02:13:30 2000:

(1) yes.  (2) don't use a system that would be obvious to a vandal.  Ie,
"this is my grex password" would probably pass the grex password test,
but a vandal might well guess that your nether.net password is something
along the lines of "this is my nether.net password".


#162 of 222 by void on Sat Jun 10 02:39:39 2000:

   one way to keep track of passwords is to make them out of phrases
which are meaningful to you, but which others, especially complete
strangers, are not likely to guess.  for instance, if your great-aunt
from poughkeepsie always called you her little pink snickerdoodle, or
something equally silly, you could easily turn that into a password
along the lines of "ltpnksnrdl," assuming a system allowed passwords
that long.  you'd also have a built-in mnemonic for remembering the
password.  or, if for some reason you had managed to strongly associate
grex with, say, fast-food restaurants, you could turn "would you like
fries with that?" into "wylfwt?" and have another sort of built-in
mnemonic for remembering the password.


#163 of 222 by gull on Sat Jun 10 03:03:24 2000:

I suspect neither of those examples would be accepted by most real password
programs, since they consist entirely of lowercase letters.


#164 of 222 by jmsaul on Sat Jun 10 04:13:05 2000:

Re #160:  Don't use the same password on more than one system.


#165 of 222 by void on Sat Jun 10 05:26:35 2000:

   re resp:163: well, yeah, but they're not supposed to be real
passwords.


#166 of 222 by mdw on Sat Jun 10 06:06:25 2000:

Grex will accept all lower-case, if it's long enough.  Generally
speaking, length is more important than the number of classes of
characters used for increasing the size of the key search space.


#167 of 222 by jor on Sat Jun 10 11:06:30 2000:

    Can't telnet in. Here via web.
    Stuggling with the controls.


#168 of 222 by jor on Sat Jun 10 11:07:09 2000:

    Is this pistachio. Over.


#169 of 222 by scott on Sat Jun 10 12:51:38 2000:

<chsssch> Roger we read you 5x5 <chsssch>

inetd had died.  I restarted it.


#170 of 222 by aruba on Sat Jun 10 18:39:39 2000:

Since the reboot the terminal server doesn't say "It may take a few moments
to connect".  It does take a while, though, but it just sits there appearing
to have hung.


#171 of 222 by janc on Sun Jun 11 00:04:42 2000:

The terminal server downloads its half it's brain from gryps when it powers
up.  Gryps is gone, so the terminal server is running on half a brain.  I
am pleased to believe that some of the other staff people are working on a
replacement for gryps.


#172 of 222 by wwallace on Mon Jun 12 05:12:35 2000:

does anybody know how the recent hack on the system was done? what hole they
found? what process they used to exploit it?


#173 of 222 by mdw on Mon Jun 12 05:43:46 2000:

We don't know the whole story, but we know enough to prevent a
repetition.  Short version: a grex staffer had the same password on
grex/gryps, as well as at another well-respected "serious" site.  The
local site got hacked, this staffer's password was stolen (probably
sniffed off the wire), and the hacker proceeded to exploit all the
systems the staffer was using.  Gryps was one of them.  Gryps was
running a very old version of freebsd.  It was probably well enough
hardened against an attack from "outside", but it wasn't at all hardened
from an attack on the "inside".  So, the vandal was able to get root on
gryps.

The vandal then proceeded to install a "rootkit", which was apparently
designed to protect the vandal against unintended discovery.
Unfortunately for the vandal, gryps was probably running a much older
version of freebsd than what the rootkit was designed to run on, so it
became obvious that something was broken (the "ls" command, of all
things, had an obvious "off-by-4" error reading directories.) The vandal
had also copied over a rather bad network sniffer.  It appears to have
been designed to steal passwords, but would *probably* have been very
tedious to use in practice.  We ran the sniffer long enough (after
taking appropriate precautions) to satisfy ourselves that it *could* be
used to steal passwords.  The evidence suggests that the vandal was
rather stupid, and we don't know that he ever actually got around to
running the sniffer.  So, we can *hope* he didn't have the time.
Nevertheless, we don't have any proof this is so, and it's conceivable
he could have stolen any # of passwords (perhaps even using another
better tool) before we noticed.

Gryps is down for the moment.  It will probably be replaced by much
better hardware running openbsd, so hopefully we won't ever need to know
more about all the exact details of how the vandal compromised gryps.
Also, the staff member who unluckly got compromised claims to now be
using different passwords everywhere, so hopefully that will not be a
problem as well.


#174 of 222 by steve on Tue Jun 13 22:45:35 2000:

   A delightful soul in Labanon filled up /c with millions and millions
of "y"'s today, courtesy of the yes program.  I found it just after the
last bit of disk had been eaten and got rid of it all.


#175 of 222 by mcnally on Tue Jun 13 23:17:15 2000:

  Lab-anon?  Is that that support group for those who want to kick their
  technical and scientfic habits?


#176 of 222 by keesan on Wed Jun 14 11:23:07 2000:

What is the yes program?


#177 of 222 by davel on Wed Jun 14 12:06:13 2000:

Try "man yes" to see.


#178 of 222 by janc on Wed Jun 14 17:11:53 2000:

I just did "man yes" on my Linux system.  It says:

NAME
       yes - output a string repeatedly until killed
SYNOPSIS
       yes [OPTION]... [STRING]...
DESCRIPTION
       Repeatedly  output a line with all specified STRING(s), or `y'.
       --help display this help and exit
       --version output version information and exit
SEE ALSO
       The full documentation for yes is maintained as a  Texinfo
       manual.   If  the  info  and  yes  programs  are  properly
       installed at your site, the command
              info yes
       should give you access to the complete manual.

Note that the "full documentation" in "info" is shorter than the
instructions to look in "info" for full documentation.  Gnu software is
a wonderful thing, but sometimes I think the authors would benefit from
electroshock treatments.


#179 of 222 by remmers on Wed Jun 14 17:55:30 2000:

Well, I'd expect a silly program to have silly documentation.

(The last paragraph of the man page was probably auto-generated
from a template that's used for all GNU software.  Major GNU
programs do tend to have more extensive info documentation than
man documentation.)


#180 of 222 by krj on Wed Jun 14 19:52:37 2000:

Any ideas why the queue to log in to Grex has soared this week?  


#181 of 222 by steve on Wed Jun 14 20:30:57 2000:

   M-Net's being down? I think thats it.  I've seen a slew of new logins and I
   kinda
get the feeling that we're handing more mail than we usually do, too.


#182 of 222 by krj on Wed Jun 14 20:35:41 2000:

I thought of the M-net outage too, but the queue surge has just been in 
the last couple of days.


#183 of 222 by willard on Wed Jun 14 20:52:08 2000:

Trying 204.212.46.130...
telnet: connect to address 204.212.46.130: Connection refused
telnet: Unable to connect to remote host


#184 of 222 by scg on Wed Jun 14 21:05:45 2000:

inetd was dead.  I just restarted it.


#185 of 222 by cconroy on Wed Jun 14 21:33:23 2000:

Is there any legitimate use for the "yes" command (other than for 
filling a disk)?


#186 of 222 by janc on Thu Jun 15 00:04:33 2000:

Long long ago, some Unix admins would flick a switch that made "rm" ask "do
you really want to delete this file?" everytime you did "rm file".  This was
really annoying because there was then no way to turn the prompt off, so when
you did "rm *" in a directory with 1000 files, you had to type "y" 1000 times.
So someone wrote "yes".  "yes | rm *" worked.  These days you can turn on the
prompt in "rm" without making it impossible to turn off, so I haven't seen
anyone do "yes | rm *" for about 17 years now.  I presume "yes" is still there
for backwards compatibility.  Lots of unix systems don't have it anymore.


#187 of 222 by mcnally on Thu Jun 15 00:21:21 2000:

  Basically it's a program to pipe stupid answers to programs that
  ask stupid questions..  I've used it on occasion on certain installer
  programs when I knew in advance that everything which was going to be
  asked would take the same answer.


#188 of 222 by willard on Thu Jun 15 14:14:23 2000:

It's also funny to use in party... "if ur from bangalore and u like
american girls with big booms, type !yes now"


#189 of 222 by dpc on Fri Jun 16 14:21:39 2000:

When I tried to retrieve my mail just now here is what happened:

Ok: !mail

/tmp: write failed, file system is full
panic: Message temporary file corrupted

/tmp: write failed, file system is full
terminated: IOT

Should I panic?  Could someone check this out?  Thanx!


#190 of 222 by goose on Fri Jun 16 15:25:33 2000:

when I logged in just now, it took my login and passwd, started to log me in
and then before giving me a prompt it went back to the login prompt complete
with beep and I had to log in again.  In light of recent events should I be
worried about another passwd sniffer?


#191 of 222 by iggy on Fri Jun 16 15:45:31 2000:

only if it is around your crotch...
hahaha


#192 of 222 by janc on Fri Jun 16 16:10:22 2000:

Dave:  Sounds like /tmp filled up.  This shouldn't have caused you to
lose any mail.

Chris:  I don't know what caused that, but it wouldn't have been a
password sniffer.  I think those just monitor packets on the network,
without interupting their flow.  A password sniffer would normally not
be noticable.


#193 of 222 by goose on Sat Jun 17 03:30:36 2000:

Yeah, bad choice of word, I was thinking more of a passwd "grabber".


#194 of 222 by janc on Sat Jun 17 03:47:58 2000:

Trojan horse, that pretends to be the login program, but instead grabs
your password, saves it, prints a "password incorrect" message, and
drops you to the real login prompt so you'll never guess what happened.

I haven't heard of this being done on a modern Unix system.  Normally
telnetd won't allocate a pseudo-tty to a new person connecting in if
there are still any processes open on it, so for as long as the Trojan
hangs around, nobody else would connect to that pseudo tty so nothing
would happen.  You'd probably have to do something clever like exploit a
race condition to get the Trojan in on a pseudotty that was actually
connected to someone.  I don't know enough about this stuff to say it
can't be done, but I'd be surprised.


#195 of 222 by gelinas on Sat Jun 17 05:02:39 2000:

An easier way: modify .login to mimic the prompt a second time.  An easy
way to promulgate the modified .login is with a message like "for a great
time, telnet to trojan-source.com and login as sucker with the password
gotcha."


#196 of 222 by jazz on Sat Jun 17 16:13:33 2000:

        I've seen programs that closely mimic the NT login screen and xlockmore
being used to troll for student passwords (and occsasionally, for the bold,
lab administrator passwords), before.  


#197 of 222 by gull on Sat Jun 17 23:50:49 2000:

Is this why you're supposed to hit Ctrl-Alt-Del before logging into NT?


#198 of 222 by keesan on Sun Jun 18 01:34:21 2000:

What is the proper procedure for someone who changed their password but
apparently typed it wrong to obtain the correct spelling?  Our friend read
the book and typed in trouble at the login prompt, Wednesday, and says nobody
has gotten back to her to help, or if they have, they emailed and she cannot
read her mail.  (I emailed staff to send me her password or phone her).

Does anyone else have to dial three times on average to connect rather than
getting 'no carrier'?


#199 of 222 by twinkie on Sun Jun 18 03:38:57 2000:

re: 197 -- Yes.



#200 of 222 by gelinas on Sun Jun 18 04:13:28 2000:

No, it's not.  The three-fingered salute is required because it seemed a good
idea to Microsoft.


#201 of 222 by mcnally on Sun Jun 18 06:41:02 2000:

  Actually, that *is* the reasoning behind the Ctrl-Alt-Del combo being used
  for NT login.  Since that's one of the few (only?) keypress combos that a
  user program can't catch, it's a great choice for login.  It's one of the
  better non-obvious ideas in NT


#202 of 222 by twinkie on Sun Jun 18 07:58:24 2000:

re: 200 -- I really hope you're being sarcastic. Otherwise, I'd suggest
finding someone with a two-by-four and asking them to smack the ignorance out
of you.



#203 of 222 by gypsi on Sun Jun 18 08:53:08 2000:

Re #201 - You would have laughed at me during my first day at UMI.  To start
my computer (NT), it told me to hit Ctrl-Alt-Del to bring up the login
prompt.  I thought it was a practical joke until my boss assured me that it
would not restart the computer.  =)


#204 of 222 by tpryan on Sun Jun 18 13:15:18 2000:

        I continue to get non-connections upon dialing in, also.


#205 of 222 by gelinas on Sun Jun 18 17:16:18 2000:

No, I wasn't being sarcastic.  Microsoft does a lot of things that make
absolutely NO sense to anyone else.  Why not this?  #201 explains something
I didn't know, much more usefully than a 2x4 would.


#206 of 222 by mdw on Sun Jun 18 21:57:48 2000:

Actually, under windows & dos, it's perfectly feasible to catch
ctrl-alt-del.  I gather under NT it's a "SAK" key - the one that engages
the attention of some "trusted" part of the OS that is presumably harder
to compromise, but I sure wouldn't want to bet it's impossible to
compromise.


#207 of 222 by i on Mon Jun 19 04:03:56 2000:

My understanding is that an OS could make *any* keystroke combination
uncatchable...so long as it's a real protected-mode OS that doesn't let
applications programs play with the keyboard controller, interrupt tables,
etc. (like DOS, Win3.X, etc. do).  Ctrl-Alt-Del is treated as special by
the PC BIOS - but the BIOS stuff pretty much goes away when a protected
OS takes over.  The big reason to use Ctrl-Alt-Del as the uncatchable
key combination in NT is that *very* few old DOS, Win3.X, etc. programs
that one might want to run under NT have any legit need to intercept it.


#208 of 222 by scott on Tue Jun 20 20:07:06 2000:

The modem server is finally able to get the rest of its brain from the new
gryps box, so modems should be working normally again.


#209 of 222 by tpryan on Tue Jun 20 21:59:31 2000:

        Thank you for the fix-up.  I noticed it this afternoon.


#210 of 222 by aruba on Wed Jun 21 02:52:02 2000:

Thanks Scott!


#211 of 222 by janc on Wed Jun 21 04:38:59 2000:

Thanks Scott.  Also thanks to Charles (arthurp) who built the new gryps
for us.


#212 of 222 by aruba on Wed Jun 21 04:51:33 2000:

THanks Charles!


#213 of 222 by jor on Wed Jun 21 18:09:43 2000:

        can't telnet in
        in via modem
        only two users
        beep beep


#214 of 222 by carson on Wed Jun 21 18:24:38 2000:

(time for a "look who's on" item!)


#215 of 222 by jor on Wed Jun 21 19:00:06 2000:

        "Can not stop the Dancin' Chickens"

        Think I'll try TalkBack or whatever it is


#216 of 222 by cmcgee on Wed Jun 21 19:40:33 2000:

I couldnt get to Grex from UM using telnet.  I tried several times over a two
hour period.  Connection was refused, and connection timed out.  Came home,
dialed in, no problem.


#217 of 222 by tpryan on Wed Jun 21 21:39:03 2000:

        And here I thought the drop in agora activity was a big parcell
of people waiting for the summer edition to show up.


#218 of 222 by scott on Thu Jun 22 00:51:24 2000:

Nope, net is down.


#219 of 222 by cyklone on Thu Jun 22 12:05:02 2000:

Anyone working on this? Is mail affected?


#220 of 222 by jor on Thu Jun 22 13:52:43 2000:

        just tested email: negative function


#221 of 222 by scott on Thu Jun 22 14:36:20 2000:

Not sure if anybody is on this.  Normally scg would be handling it, but he's
on his way to the west coast at the moment.  STeve sent mail to our provider,
but the provider may be the place with the problems.  Hm.


#222 of 222 by drew on Thu Jun 22 21:11:54 2000:

I hope the mail was sent from somewhere other than grex.


There are no more items selected.

You have several choices: