You are not logged in. Login Now
 0-24   25-49   50-74   63-87   88-112   113-137   138-162   163-187   188-212 
 213-222          
 
Author Message
25 new of 222 responses total.
cmcgee
response 88 of 222: Mark Unseen   Jun 6 00:15 UTC 2000

Still unable to dial in to Grex.
scg
response 89 of 222: Mark Unseen   Jun 6 01:45 UTC 2000

The terminal server was down.  I just rebooted it.
janc
response 90 of 222: Mark Unseen   Jun 6 03:05 UTC 2000

Resp:87 - I took the liberty of making "join M-Net" work instead of editing
the motd.
steve
response 91 of 222: Mark Unseen   Jun 6 06:06 UTC 2000

   Grex had a root breakin on another machine we use for things,
in which the vandal MAY have tried grabbing passwords from users
as they typed them in.

   Grex itself was NOT affected.  The machine that was, gryps, is
used for some functions like teaching the terminal server what to
do when it boots up, and some other things.  This machine was running
an an older copy of the FreeBSD operating system, and apparently,
a vandal saw this, and applied some exploit to it, and got in.  We
see clearly that the vandal installed some software to steal passwords
(called a network sniffer), but we do not know how much time the
vandal had to run this and harvest passwords.  It doesn't look like
they (it?) had much time, but we can't tell for sure.

   It is for this reason that we strongly suggest that anyone who
logged in between June 3rd and June 6th to change their passwords
now.  We know that whatever damaged this cyberslime did will be
minimized by folks changing their passwords.  IF YOU USE YOUR GREX
PASSWORD ON SOME OTHER MACHINE, CHANGE THAT TOO!

   Grex was down today as we looked at it, and there is no evidence
that the vandal did anything to Grex.  The vandal was not terribly
sophisticated, left tracks, and in general did not display either
the intelligence or panache needed to harm Grex itself.

   The FreeBSD machine is currently powered down.  We have another
machine waiting to be used which runs the OpenBSD operating system
which will be the new Gryps within a day or two.

   We do not think that anything else on the system has been 
damaged, but of course there is the possibility that we have missed
something, so if you see something weird, please tell staff right
away (mail to staff).

tpryan
response 92 of 222: Mark Unseen   Jun 6 11:21 UTC 2000

        Please make the password change program less agrumentative.
cyklone
response 93 of 222: Mark Unseen   Jun 6 12:33 UTC 2000

The dial-ins work intermittently
tpryan
response 94 of 222: Mark Unseen   Jun 6 15:51 UTC 2000

        and the dial-in server no longer has the 'it may take a momnet
message'.
rcurl
response 95 of 222: Mark Unseen   Jun 6 16:53 UTC 2000

I just used !change from here to change my password, and wondered what
tpryan meant by it being "agrumentative", unless he really was referring
to all the extra words that have *grown* there. 
janc
response 96 of 222: Mark Unseen   Jun 6 16:59 UTC 2000

He means the "your password is too obvious" thing.  Grex is really picky
about passwords.  
rcurl
response 97 of 222: Mark Unseen   Jun 6 17:41 UTC 2000

OK...I've never had that problem, so didn't think of that.
mooncat
response 98 of 222: Mark Unseen   Jun 6 17:42 UTC 2000

Or it tells you if you new password is too similar to the old one, and 
tells you to be more creative. (paraphrasing)
rcurl
response 99 of 222: Mark Unseen   Jun 6 17:56 UTC 2000

I use a password generating scheme that easily creates new ones based
on old ones, but so different that algorithm can't detect the relation.
jmsaul
response 100 of 222: Mark Unseen   Jun 6 18:38 UTC 2000

Cool!  What is it?

(Just kidding.  ;-)
gull
response 101 of 222: Mark Unseen   Jun 6 18:56 UTC 2000

Grex's isn't too bad.  I've been unable to change the password on my
Michigan Tech account, though, because I can't come up with one that
satisfies *their* password program.  Sigh.
mcnally
response 102 of 222: Mark Unseen   Jun 6 19:09 UTC 2000

  re #98:  That would be quite a trick..  The system shouldn't know what
  your old password was..
cconroy
response 103 of 222: Mark Unseen   Jun 6 19:58 UTC 2000

And then there's NT, which won't let you reuse any previous password 
(which is understandable to maintain tighter security, but gets really 
annoying when the system is configured to make you change passwords 
every three months whether you like it or not).

rcurl
response 104 of 222: Mark Unseen   Jun 6 21:03 UTC 2000

Re #102 re #98: it knows it at the time you are trying to change it.
ryan
response 105 of 222: Mark Unseen   Jun 6 21:30 UTC 2000

This response has been erased.

scg
response 106 of 222: Mark Unseen   Jun 6 22:15 UTC 2000

passwd asks first for your old password, to verify that you aren't just some
random person who walked up to an already logged in terminal, and then for
the new password.  I assume it does its comparison from what you tell it your
old password was (which it then verifies), rather than by pulling it out of
a database somewhere.
drew
response 107 of 222: Mark Unseen   Jun 6 22:26 UTC 2000

As I recall, passwords are not stored plaintext anywhere on the system.
Rather, a hashing algorithm is used, that's supposed to be one-way. When it
needs to check your password for any reason, whatever program is doing the
checking takes what you type in and calls the hashing routine, and compares
the result to what's in the shadow file (formerly in /etc/passwd). Thus it
can convert 'foobar' to $%H8@feJK&^, but given the string $%H8@feJK&^, there
is no way to derive the plaintext 'foobar'.

I would guess that on today's faster machines, given the list of hashed
passwords, it might be possible to write a program to try every possible
plaintext password starting with the letter ^A until it finds one that
matches; and that's why shadow files were implimented. Or is this feasible?
steve
response 108 of 222: Mark Unseen   Jun 6 23:38 UTC 2000

   Drew's explaination of how passwords are stored is right.

   As for trying to guess passwords, thats what the "crack" program
does, only it uses dictionaries of words along with some other algorithms,
and for people who choose "bad" passwords, can be *very* effective.

   *That* is why Grex;s passwd program is so very picky.  I don't
normally like the idea of software being so grumpy about human
behavior, but all too many people choose HORRIBLE passwords if
left to their own devices.
bruin
response 109 of 222: Mark Unseen   Jun 6 23:45 UTC 2000

BTW, as I use Backtalk to access Grex, what would be the procedure for 
changing a password?
other
response 110 of 222: Mark Unseen   Jun 6 23:48 UTC 2000

I just sometimes use words from human languages for which no dictionaries 
exist. (Transliterated, of course.)
mary
response 111 of 222: Mark Unseen   Jun 7 00:35 UTC 2000

Grex's password program isn't picky.  I've had the same one for
the past 8 years.  When it prompts for a change I give it one
then immediately run the set password program and change it back
to the one I had.  I'm not worried about my password being abused.
I'd bet whomever got ahold of it would be nicer than I am. ;-)

Some people are concerned about such things and it's nice the system
allows them a higher level of security.

steve
response 112 of 222: Mark Unseen   Jun 7 01:59 UTC 2000

   Yes Mary but they might do something using your account that would
be *less* than pleasent.  A prof in a college to the west of us just
recently had his pw stolen, and guess what?  The little vandal sent a
death threat to Al Gore apparently.  Said prof had some explaining to
do, etc.

   Not changing your pw is 8 years is just plain risky.  I hope that
pw is not used on anything that ever has any form of value flowing
through it.
 0-24   25-49   50-74   63-87   88-112   113-137   138-162   163-187   188-212 
 213-222          
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss