[10289] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Plain text passwords--necessary

daemon@ATHENA.MIT.EDU (Densin Roy.)
Tue Apr 20 14:14:50 1999

Date: 	Tue, 20 Apr 1999 04:59:21 +0700
Reply-To: "Densin Roy." <den@FTP.LOXINFO.CO.TH>
From: "Densin Roy." <den@FTP.LOXINFO.CO.TH>
X-To:         Trevor Schroeder <tschroed@ACM.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.BSO.4.10.9904191259560.1035@duckdog.zweknu.org>

see
http://world.std.com/~dpj


On Mon, 19 Apr 1999, Trevor Schroeder wrote:

> (Here's hoping this makes it past the censor ;)
>
> On Fri, 16 Apr 1999, Aleph One wrote:
>
> > Lots of replies to this message but they all failed to really answer
> > the questions raised by the original post.
>
> It seems to me that a lot of this could be avoided using tickets similar to
> Kerberos.  We have a trusted third party (TTP) that receives your
> credentials once and returns a ticket for a set of services with a given
> lifetime.  This ticket is good only within a certain context (certain
> services, servers, clients, times, dates, you name it and it can be rolled
> into the ticket).  That way if the ticket is compromised, it is of limited
> use (versus a full blown password with may be useful in other contexts.)
>
> The client could then use the old ticket (before it expires) to get a new
> ticket.  That way an attacker cannot get ahold of an unlimited use ticket
> but must continue to get new tickets from the client.  (or reveal himself
> by registering for his own new tickets).
>
> There is another rule to obey here:  have security levels associated with
> your passwords.  This would seem to be a no-brainer, but I guess it's not.
> It's usually not very feasible to have a separate password for everything
> so people pick a few.  If you do this, delegate one password (or set of
> passwords) as low security.  Think about what kind of service this is and
> how your password is likely to be stored.  Think about how much damage
> could be inflicted if blahblahblah.com accidentally lets out your chat
> password.  Don't let passwords for systems with secure password schemes
> (such as UNIX) be used for those with insecure schemes such as Netscape.
> (Using any of those "remember my password" features violates this nostrum.)
>
> The wisdom of this rule was highlighted by this very same Real Server oops.
> In an attempt to demonstrate to a friend that he needed to subscribe to
> BugTraq, I logged in and grabbed his RS password.  The disturbing thing is,
> I know that it's also a root password on some machines.  Oops, a silly
> mistake has now been elevated to a catastrophe.
>
> Otherwise, use a separate password for absolutely everything and record
> them securely.  That is to say, PGP encrypt them and take any steps
> necessary (such as disk wiping) to insure that it can only be recovered by
> someone who has the appropriate private key.
>
> Just my thoughts.
> .......................................................................
> : Bureaucracy is the enemy of innovation.          : Trevor Schroeder :
> :                           -- Mark Sheperd        : tschroed@acm.org :
> :........... http://www.zweknu.org/ for PGP key and more .............:
>

home help back first fref pref prev next nref lref last post