You are not logged in. Login Now
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-199   200-222 
 
Author Message
25 new of 222 responses total.
jmsaul
response 100 of 222: Mark Unseen   Jun 6 18:38 UTC 2000

Cool!  What is it?

(Just kidding.  ;-)
gull
response 101 of 222: Mark Unseen   Jun 6 18:56 UTC 2000

Grex's isn't too bad.  I've been unable to change the password on my
Michigan Tech account, though, because I can't come up with one that
satisfies *their* password program.  Sigh.
mcnally
response 102 of 222: Mark Unseen   Jun 6 19:09 UTC 2000

  re #98:  That would be quite a trick..  The system shouldn't know what
  your old password was..
cconroy
response 103 of 222: Mark Unseen   Jun 6 19:58 UTC 2000

And then there's NT, which won't let you reuse any previous password 
(which is understandable to maintain tighter security, but gets really 
annoying when the system is configured to make you change passwords 
every three months whether you like it or not).

rcurl
response 104 of 222: Mark Unseen   Jun 6 21:03 UTC 2000

Re #102 re #98: it knows it at the time you are trying to change it.
ryan
response 105 of 222: Mark Unseen   Jun 6 21:30 UTC 2000

This response has been erased.

scg
response 106 of 222: Mark Unseen   Jun 6 22:15 UTC 2000

passwd asks first for your old password, to verify that you aren't just some
random person who walked up to an already logged in terminal, and then for
the new password.  I assume it does its comparison from what you tell it your
old password was (which it then verifies), rather than by pulling it out of
a database somewhere.
drew
response 107 of 222: Mark Unseen   Jun 6 22:26 UTC 2000

As I recall, passwords are not stored plaintext anywhere on the system.
Rather, a hashing algorithm is used, that's supposed to be one-way. When it
needs to check your password for any reason, whatever program is doing the
checking takes what you type in and calls the hashing routine, and compares
the result to what's in the shadow file (formerly in /etc/passwd). Thus it
can convert 'foobar' to $%H8@feJK&^, but given the string $%H8@feJK&^, there
is no way to derive the plaintext 'foobar'.

I would guess that on today's faster machines, given the list of hashed
passwords, it might be possible to write a program to try every possible
plaintext password starting with the letter ^A until it finds one that
matches; and that's why shadow files were implimented. Or is this feasible?
steve
response 108 of 222: Mark Unseen   Jun 6 23:38 UTC 2000

   Drew's explaination of how passwords are stored is right.

   As for trying to guess passwords, thats what the "crack" program
does, only it uses dictionaries of words along with some other algorithms,
and for people who choose "bad" passwords, can be *very* effective.

   *That* is why Grex;s passwd program is so very picky.  I don't
normally like the idea of software being so grumpy about human
behavior, but all too many people choose HORRIBLE passwords if
left to their own devices.
bruin
response 109 of 222: Mark Unseen   Jun 6 23:45 UTC 2000

BTW, as I use Backtalk to access Grex, what would be the procedure for 
changing a password?
other
response 110 of 222: Mark Unseen   Jun 6 23:48 UTC 2000

I just sometimes use words from human languages for which no dictionaries 
exist. (Transliterated, of course.)
mary
response 111 of 222: Mark Unseen   Jun 7 00:35 UTC 2000

Grex's password program isn't picky.  I've had the same one for
the past 8 years.  When it prompts for a change I give it one
then immediately run the set password program and change it back
to the one I had.  I'm not worried about my password being abused.
I'd bet whomever got ahold of it would be nicer than I am. ;-)

Some people are concerned about such things and it's nice the system
allows them a higher level of security.

steve
response 112 of 222: Mark Unseen   Jun 7 01:59 UTC 2000

   Yes Mary but they might do something using your account that would
be *less* than pleasent.  A prof in a college to the west of us just
recently had his pw stolen, and guess what?  The little vandal sent a
death threat to Al Gore apparently.  Said prof had some explaining to
do, etc.

   Not changing your pw is 8 years is just plain risky.  I hope that
pw is not used on anything that ever has any form of value flowing
through it.
mcnally
response 113 of 222: Mark Unseen   Jun 7 02:06 UTC 2000

  as opposed to Grex?
steve
response 114 of 222: Mark Unseen   Jun 7 02:21 UTC 2000

   Grex represents its own set of value, but I'm talking of systems
such as anything used in a business where obtaining a pw might result
in a vandal being able to manipulate something like product that a
company has, or something else of direct value in the real world.

   Grex doesn't have any of that kind of stuff online, so the most
dangerous thing that could happen is all related to email, which isn't
saying that emails to the wrong people can't land someone in a fair
amount of trouble.
cmcgee
response 115 of 222: Mark Unseen   Jun 7 02:40 UTC 2000

The UM password checker is even snippier than Grex.  I finally used my
favorite password with punctuation marks separating some letters.  It didn't
like my "first letter of each word in the title of a book, song, etc"
algorithm.
twinkie
response 116 of 222: Mark Unseen   Jun 7 02:57 UTC 2000

re: 103 -- By default, Windows NT *will* let you reuse an old password. You
can set it to never accept a used password, or you can set a threshold, such
that NT will not accept a used password until there have been 10 unused ones.
(Which can easily be defeated by changing your password 10 times in a row)

bdh3
response 117 of 222: Mark Unseen   Jun 7 03:29 UTC 2000

The yuckey mainframes at where I work have a very picky 
password program that not only requires 1 non alpha, but don't let you
reuse passwords ever and you have to change it every 90 days and you
can't use the same password on different machines.  
In my group we all have thinkpads as we are 'mobile'. As a result
of the 'very secure' password scheme the mainframe gangy uses just
about all if my cadre have a label stuck to our laptops with system
name and password pairs written on them.  (I at least keep them in my
palm pilot encrypted under a central password.)

Humans are the weak link in any security system.

 
jmsaul
response 118 of 222: Mark Unseen   Jun 7 03:49 UTC 2000

Yep, and the pickier the password program is, the weaker a link the humans
become.  It's a tradeoff.
steve
response 119 of 222: Mark Unseen   Jun 7 04:28 UTC 2000

   I dunno.  Grex has trained a lot of people into thinking about passwords
in ways that they didn't, before.  I have had many many conversations with
people about the pickyness of our passwd program, and at least some people
who use Grex have an awareness of passowrds that they didn't before.  Now,
some people are probably the opposite, and rebell and use the same one
difficult pw over and over, so in that sense, there is a tradeoff in the
general population of people.  But I do think that some people here choose
better pw's because of Grex's pickyness, which is a good thing.
omni
response 120 of 222: Mark Unseen   Jun 7 04:29 UTC 2000

  If I've learned anything in the last 7 years, I've learned that when
STeve advises you to do something it is in your best interest to heed
his advice. 
  Just before I got my ham license, I asked STeve about radios. He told
me ICOM was just about the best one on the market. I followed his counsel
and have not been sorry. That was almost 8 years ago.
  I changed my password this morning. The new one wull be a pain to learn,
but I will learn it. It is better than a death threat sent to the president
in my name.

  Thanks for being vigilant, STeve.
omni
response 121 of 222: Mark Unseen   Jun 7 04:30 UTC 2000

STeve slipped in.
senna
response 122 of 222: Mark Unseen   Jun 7 04:38 UTC 2000

I have a number of rotating passwords, so I shuffled around to satisfy my
desire for security.
jmsaul
response 123 of 222: Mark Unseen   Jun 7 04:40 UTC 2000

Re #119:  Programs which require strong passwords do help against people
          running crack and the like, there's no doubt.  Unfortunately,
          they lead to other security problems, like people writing passwords
          down on post-it notes stuck to their monitors.  Whether it's a
          good tradeoff depends on which threat you're more worried about.
          In an institutional environment, I'd usually worry more about the
          post-it notes.  Here, worrying more about script kiddies may be
          a good call.  In any event, Grex isn't doing the thing that provokes
          the worst "weak link" behavior -- timed expiration.

          On general principle, though, I'm not so sure you should be
          encouraging people to write their passwords down.  Even if it
          isn't a problem here, it's a bad habit to be in in an office
          environment.
omni
response 124 of 222: Mark Unseen   Jun 7 07:44 UTC 2000

If I don't write it down, I'm gonna forget it.

I think I'm gettin' old. My bones is getting creaky and
I'm forgettin things I should remember and rememberin'
things I should have forgot. Oh dear. ;)

I do have a large supply of potential passwords. I'm not
worried about the password program rejecting one of my potentials.
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   175-199   200-222 
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss