[1091] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Unix links subverting Web security

daemon@ATHENA.MIT.EDU (David M. Chess)
Fri Oct 27 13:03:56 1995

Date: Fri, 27 Oct 95 09:20:02 EDT
From: "David M. Chess" <chess@watson.ibm.com>
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

> only one type of password that is acceptable today: random gibberish (mean
> gibberish - nothing phonetic even) created by a RNG seeded by a non
> deterministic source (some good ones available). a really random 8 char
> passwd will make brute force attack not much fun. now do this with 12 char

Unfortunately, a completely random password will make the "walk
casually around in the office memorizing all the passwords written
on post-it notes on the walls" attack work even better than it
normally does.  You win some, you lose some.  Allowing long
passphrases (PGP model, for instance) seems a better solution;
a somewhat higher plane in the tradeoff-space.

DC (hoping he hasn't accidentally started the Password Thread)

home help back first fref pref prev next nref lref last post