Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Sep 2002 23:56:13 +0300 (EEST)
From:      Evren Yurtesen <yurtesen@ispro.net.tr>
To:        twig les <twigles@yahoo.com>
Cc:        Crispin Cowan <crispin@wirex.com>, Nate Lawson <nate@cryptography.com>, <freebsd-security@FreeBSD.ORG>
Subject:   Re: Password Security Policy Question
Message-ID:  <20020918235353.O28015-100000@finland.ispro.net.tr>
In-Reply-To: <20020918201336.17551.qmail@web10101.mail.yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help
you can always set the priority of the process to use more cpu time or
less.
there is this slurpie port in freebsd ports but obviously it doesnt work I
just got segmentation faults on freebsd and linux. and the slurp daemon
was conecting to wrong port.
if it works its supposed to do distributed password cracking.
also on the web I have found medussa program but it wasnt compiling
even, complaining about pthread library.

if you can get any of these programs to work please let me know =)

Evren

On Wed, 18 Sep 2002, twig les wrote:

> While we're on the subject of passwords, I'm
> considering setting up a semi-dedicated box to do some
> password cracking at work.  Is there a good paper on
> how to set up some good libraries?  I have john the
> ripper running right now but the default ability to
> crack passwds isn't very good (I threw it some obvious
> ones...didn't get them).
>
> Also, is there anything involved in this process aside
> from raw CPU time?  For the next time I get to build a
> box, it'd be good to know.
>
>
> --- Crispin Cowan <crispin@wirex.com> wrote:
> > Nate Lawson wrote:
> >
> > > At 11:36 AM 9/10/2002 -0500, L. Adrian Griffis
> > wrote:
> > > > I am aware of a company that has instituted a
> > policy that limits a
> > > > specific character in people's passwords to
> > being a numeric character.
> >
> > This policy, as described, does seem to be a very
> > bad idea. I can't tell
> > whether it is because the policy has not been
> > faithfully described.
> >
> > > This is a bad idea.  Ross Anderson's group did a
> > good study on different
> > > password selection approaches:
> > > http://www.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf
> >
> > Interesting paper. Good to see some solid empirical
> > study in this
> > critical area. Some commentary on the conclusions:
> >
> >    1. The  first folk belief is that users have
> > difficulty remembering
> >       random passwords. This belief is confirmed.
> >    2. The second folk belief is that passwords based
> > on mnemonic phrases
> >       are harder for an attacker to guess than
> > naively selected
> >       passwords. This belief is confirmed.
> >    3. The third folk belief is that random passwords
> > are better than
> >       those based on mnemonic phrases. However, each
> > appeared to be just
> >       as strong as the other. So this belief is
> > debunked.
> >    4. The fourth folk belief is that passwords based
> > on mnemonic phrases
> >       are harder to remember than naively selected
> > passwords. However,
> >       each ap- peared to be just as easy to remember
> > as the other. So
> >       this belief is de- bunked.
> >    5. The  fifth folk belief is that by educating
> > users to use random
> >       passwords or mnemonic passwords, we can gain a
> > significant
> >       improvement in security. However, both random
> > passwords and
> >       mnemonic passwords su ered from a
> > non-compliance rate of about 10%
> >       (including both too-short passwords and
> > passwords not chosen
> >       according to the instructions). While this is
> > better than the 35%
> >       or so of users who choose bad passwords with
> > only cursory
> >       instruction, it is not really a huge
> > improvement. The attacker may
> >       have to work three times harder, but in the
> > absence of password
> >       policy enforcement mechanisms there seems no
> > way to make the
> >       attacker work a thousand times harder. In
> > fact, our experimental
> >       group may be about the most compliant a
> > systems administrator can
> >       expect to get. So this belief appears to be
> > de- bunked.
> >
> > I like most of these conclusions. Confirming most of
> > the common folk
> > beliefs is good. #5 is particularly significant:
> > password policy
> > enforcement is critical.
> >
> > The only one I have trouble with is #3: the study
> > found passphrase
> > passwords to be just as strong as random pass
> > phrases. I submit that
> > this conclusion is primarily a function of the
> > strength of the cracking
> > software employed, and will change. It is unclear
> > whether the study used
> > a standard password cracker (Crack, John the Ripper,
> > etc.) or rolled
> > their own. But in any case, if we convince all users
> > to use pass
> > phrases, then crack software will evolve to attempt
> > to crack pass
> > phrases. How hard would it be to encode the first
> > letter of the popular
> > quotations from Bartlett's Quotations into a crack
> > dictionary?
> >
> > Disclaimer: none the less, I believe that pass
> > phrases is the most
> > cost-effective form of password discipline. Random
> > is just too hard for
> > most humans to remember.
> >
> > Crispin
> >
> > --
> > Crispin Cowan, Ph.D.
> > Chief Scientist, WireX
> > http://wirex.com/~crispin/
> > Security Hardened Linux Distribution:
> > http://immunix.org
> > Available for purchase:
> > http://wirex.com/Products/Immunix/purchase.html
> >
> >
>
> > ATTACHMENT part 2 application/pgp-signature
>
>
>
> =====
> -----------------------------------------------------------
> Heavy metal made me do it.
> -----------------------------------------------------------
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Health - Feel better, live better
> http://health.yahoo.com
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020918235353.O28015-100000>