[TriLUG] Securely and Accurately transmit passwords

Andrew C. Oliver acoliver at buni.org
Thu Oct 4 00:22:48 EDT 2007


Maybe I'll reveal too much about my misspent youth...but...

Strictly speaking you're not using password authentication, you're using 
a combination of password authentication, time lapses, blacklists and 
such.  You obviously have to restrict what passwords users choose or 
they'll chose the name of your company.  The problem is that your 
average medium to large-sized company has mostly relatively naive people 
of average intelligence who probably value your company's security less 
than you do.  In a small company, you can handle this through hiring.  
Once you scale it seems less possible.

More than likely the way to screw your company would be to create a 
distributed denial of service attack that tried all combinations of 
probable user ids and bad passwords.  That way your whole company could 
be taken out at once.  As far as having half the net to do it...not 
really a big problem: 
http://en.wikipedia.org/wiki/Code_Red_%28computer_worm%29 
http://en.wikipedia.org/wiki/Code_Red_II_%28computer_worm%29 
http://en.wikipedia.org/wiki/ILOVEYOU

Moreover if you have windows boxes on your network then a firewall is 
really trivial protection.  All you need is one dumb person who really 
wants to see the picture of the bunny with the pancake on its head and a 
proxy can be installed locally to a remote computer over the almighty 
safe port 80.  Recently I even discovered this can be done with NTLM 
(http://ntlmaps.sourceforge.net/ - btw there are some elementary 
programming error in the proxy_client.py where it misses EOFs and hangs 
indefinitely unless you patch it but I can't manage to submit my patch 
because my Sf account seems dead...or maybe I forgot the password) :-).  
Sticking that into an installer in a worm activeX control shouldn't be 
too hard. 

Or an obvious thing to do from a worm is to fake the occasional password 
popup dialog.  You can probably even get the browser proxy settings and 
test the authentication against the proxy.  Anyhow there are so many fun 
things you can do with human frailty and the weakness of any 
user-entered token.

Relax, hacking a phone company is probably too boring for a deliberative 
attempt these days -- MySpace, FaceBook, Skype, AIM or YIM are probably 
more appealing :-)

-andy

jonc at nc.rr.com wrote:
> <Shakes head> Maybe I'm missing something, but these guys seem to be living in their own mental worlds.... Worlds that for some reason don't contain limits on login attempts. 
>
> The maximum number of times I let folks try a password (before locking the account for an hour) is 10 times. Tell me how some cracker is going to use a dictionary attack and crack one of my accounts. Unless he lucks into the password in the first 10 tries, his app is simply going to be spinning its' wheels uselessly for the next 59 minutes and 59 seconds...
>
> Also, most admins I know use the security app Denyhosts.  It was mentioned by someone else earlier in this thread. I have some very strict Denyhost rules for my secure accounts (admin/root accounts). If a hacker is trying to break into a secure account, the python app Denyhosts locks out all the IP's used in his attacks. The hacker would have to harvest the entire net to stand a chance of breaking in, and even then he'll only have a window of opportunity of 10 attempts every hour.
>
> Are there folks out there, that don't set limits on invalid login attempts? Are they windows admins?
>
> Jon (wobble head) Carnes
>
> ---- Chris Calloway <cbc at unc.edu> wrote: 
>   
>> On Oct 2, 2007, at 12:40 PM, MG wrote:
>>     
>>> Oddly enough, CBC (Canadian news) ran an article on password  
>>> security today:
>>>
>>> http://www.cbc.ca/news/background/tech/passwords.html
>>>       
>> Read what this well known security expert/pundit has to say on the  
>> matter:
>>
>> http://www.schneier.com/blog/archives/2005/06/write_down_your.html
>>
>> You know, just because you write down a password doesn't mean you  
>> have to stick in on a post-it on your workstation. In fact, real  
>> world security means your password *is* written down, sealed in an  
>> envelope, and put in a safe place "in case you get hit by a bus," I  
>> think is the commonly used phrase.
>>
>> So yeah, use strong passwords and write them down.
>>
>> --
>> Sincerely,
>>
>> Chris Calloway
>> http://www.seacoos.org
>> office: 332 Chapman Hall cell: (919) 599-3530
>> mail: Campus Box #3300, UNC-CH, Chapel Hill, NC 27599
>>
>>
>>
>> -- 
>> TriLUG mailing list        : http://www.trilug.org/mailman/listinfo/trilug
>> TriLUG Organizational FAQ  : http://trilug.org/faq/
>> TriLUG Member Services FAQ : http://members.trilug.org/services_faq/
>>     
>
>   




More information about the TriLUG mailing list