[comp.unix.wizards] WARNING!

john@uunet.uu.net (04/10/91)

John Lupien <lupienj@hpwadac.hp.com> types:
In article <1991Mar27.094325.24599@en.ecn.purdue.edu> kidder@en.ecn.purdue.edu (Mark Stephen Kidder) writes:
>>PS I learned earlier from another that UNIX does not use a DES
>>   encryption method for the password; however, a one-way method
>>   is used making decoding a password impossible.
                                       >^^^^^^^^^^^
>To borrow a phrase from one of those "Airplane" movies, "You use that
>word a lot. I don't think it means what you think it means."
>
>When someone says that something is "impossible", the first thing that
>comes to my mind is "how long has it been impossible, and how long will
>it stay that way?". Certainly I don't know how to decode an encrypted
>UNIX password, but I think it is somewhat foolhardy to assume that nobody
>does. There are some very clever people around, and some of them have some
>very fast and capable hardware. 

It doesn't matter how fast or powerful the hardware is. To steal
a quote (from where I can't remember) "You can't feed sausage
backwards through a meat grinder and come out with a pig at the
other end". Now that this little misconception is cleared up :)
it still doesn't mean that your machine is secure. While there is
no known method of reversing the encrytpion, you can use comparison
or other BFI methods (BFI=Brute Force and Ignorance) to get at
passwords. This topic has been beaten to death in here but it all
comes down to the same thing...

As long as you choose passwords carefully, your password is relatively
safe!

The best passwords are completely random sequences. The next best
(and easiest to remember) is phonetic permutations of foreign words
with random capitalizations. Of course, none of this will protect
you %100. I've found that most computer break-ins are not by super
geniuses that toss super-computer power at machines, but rather
a result of a persistant individual who exploits the ignorance of 
users and poor system administrators. As long as even ONE person can 
log into your machine, it's not completely secure. Common sense and 
awareness are are your only defense. There are a lot easier ways to 
break into a unix box than through the password file. Also, getting 
a copy of your password file requires access to your machine in the first
place. If a competent hacker has access to your box, they probably
won't waste time with your password file. They'll be busy looking 
for other holes in your system to exploit. 

>---
>John R. Lupien
>lupienj@hpwarq.hp.com

Cheers

______Opinions stated are my own. Transcripts available by request______
      ===
    =--====  AT&T Canada Inc.             John Benfield
   =----==== 3650 Victoria Park Ave.      Network Support Analyst (MIS)
   =----==== Suite 800		    
   ==--===== Willowdale, Ontario          attmail   : ~jbenfield
    =======  M2H-3P7			  email     : uunet!attcan!john
      ===    (416) 756-5221               Compu$erve: 72137,722

____Eagles may soar, but weasels don't get sucked into jet engines._____

anamaria@saffron.wpd.sgi.com (Ana Maria De Alvare') (04/11/91)

I agree with John Benfiel that common sense is the weapon against password 
cracking, and that a cracker only needs one misuse, poorly chosen password
to get access to your system.

I want to make it clear that a person can has access to someone machine's
password file throught the internet without having any accounts directly
related to that person.  For example, throught the ftp anonymous service,
I can copy a password file over.  This scenario is considered access to
the remote machine in question.  However, public anonymous access to a 
remote machine, is not being thought as authorizing anonymous browsing,
and copying over files other than the ones explicitly publish with 
the ftp anonymous procedures.  In other words, ftp anonymous access is not
look as individual access rights.  So beware system administrators to
curtail  the amount of access you give away to ftp anonymous services.

-------------------------------------------------------------------------------
Ana Maria De Alvare' 	MTS Secure IRIX            	 Silicon Graphics, Inc.
anamaria@sgi.COM    {decwrl,sun}!sgi!whizzer!saffron!anamaria      415-335-7309

-------------------------------------------------------------------------------

meissner@osf.org (Michael Meissner) (04/11/91)

In article <26520@adm.brl.mil> anamaria@saffron.wpd.sgi.com (Ana Maria
De Alvare') writes:

| I want to make it clear that a person can has access to someone machine's
| password file throught the internet without having any accounts directly
| related to that person.  For example, throught the ftp anonymous service,
| I can copy a password file over.  This scenario is considered access to
| the remote machine in question.  However, public anonymous access to a 
| remote machine, is not being thought as authorizing anonymous browsing,
| and copying over files other than the ones explicitly publish with 
| the ftp anonymous procedures.  In other words, ftp anonymous access is not
| look as individual access rights.  So beware system administrators to
| curtail  the amount of access you give away to ftp anonymous services.

Ummm, unless you wrote your own ftpd, the standard BSD one explicitly
chroot's anonymous FTP requests to the logon directory of the user
'ftp'.  In every system manual, where I've seen how to set up
anonymous FTP, it mentions this, and tells the system manager never to
make the logon directory be '/'.

--
Michael Meissner	email: meissner@osf.org		phone: 617-621-8861
Open Software Foundation, 11 Cambridge Center, Cambridge, MA, 02142

Considering the flames and intolerance, shouldn't USENET be spelled ABUSENET?

magnus%thep.lu.se@Urd.lth.se (Magnus Olsson) (04/11/91)

In article <MEISSNER.91Apr10175314@curley.osf.org> meissner@osf.org (Michael Meissner) writes:
>In article <26520@adm.brl.mil> anamaria@saffron.wpd.sgi.com (Ana Maria
>De Alvare') writes:
>
>| I want to make it clear that a person can has access to someone machine's
>| password file throught the internet without having any accounts directly
>| related to that person.  For example, throught the ftp anonymous service,
>| I can copy a password file over.  
>Ummm, unless you wrote your own ftpd, the standard BSD one explicitly
>chroot's anonymous FTP requests to the logon directory of the user
>'ftp'.  In every system manual, where I've seen how to set up
>anonymous FTP, it mentions this, and tells the system manager never to
>make the logon directory be '/'.

Of course, you still need an /etc/passwd file (relative to FTP's "new"
root), but fortunately, the password information isn't needed.
Here's what you get if you onnect with anonymous ftp to our machines
and do a "get /etc/passwd":

root:*:0:1:System PRIVILEGED Account:/:/usr/new/csh
ftp:*:295:15:Anonymous ftp:/usr/users/ftp:/usr/new/csh

All the ordinary users have been edited out, and there's no 
password information left. All the presumptive cracker gets to
know is that there are accounts called root and ftp, and he
probably knew that already...

Magnus Olsson                   | \e+      /_
Dept. of Theoretical Physics    |  \  Z   / q
University of Lund, Sweden      |   >----<           
Internet: magnus@thep.lu.se     |  /      \===== g
Bitnet: THEPMO@SELDC52          | /e-      \q

mouse@thunder.mcrcim.mcgill.edu (der Mouse) (04/14/91)

In article <26512@adm.brl.mil>, attcan!vpk1!john@uunet.uu.net writes:
> John Lupien <lupienj@hpwadac.hp.com> types:
> In article <1991Mar27.094325.24599@en.ecn.purdue.edu> kidder@en.ecn.purdue.edu (Mark Stephen Kidder) writes:
[Are those attribution lines really right?  They look odd. -Mouse]
>>> PS I learned earlier from another that UNIX does not use a DES
>>>    encryption method for the password; however, a one-way method is
>>>    used making decoding a password impossible.
>>                                     ^^^^^^^^^^^
>> To borrow a phrase from [some movie], "You use that word a lot. I
>> don't think it means what you think it means."
> It doesn't matter how fast or powerful the hardware is.  [...]  While
> there is no known method of reversing the encrytpion, you can use
> comparison or other BFI methods ([...]) to get at passwords.

What's the difference?  Any method that takes the hashed password as
input and produces the original form as output (or, arguably, any
string which would be accepted for (eg) logins) counts as "decoding the
password" or "reversing the encry[pt]ion".  Whether this is done by
some clever method only the no-such-agencies currently know, by table
lookup in a monster table, by exhaustive search through the space of
possibilities, or some other method, is completely irrelevant.

The common password encryption scheme is not DES, not quite; it is DES
with the E-box diddled slightly by the salt value (supposedly to defeat
attempts to use DES hardware for exhaustive search).  It is a
reasonably good approximation to a one-way function.  Nevertheless, to
mangle the language sightly, it is not impossible and is steadily
becoming less so.  There are only 2^56 input values.  I have code that
does approximately a thousand trials a second on general-purpose
hardware.  Let's suppose with a little hardware work we could push this
to a million per second (a bit in advance of current hardware, but
probably not that much).

This still sounds fairly secure, as it works out to about two thousand
years to cover the entire space.  But now we spend a little money and
buy/build a thousand of those hardware assist units.  Now we're down to
two years.

And the vast majority of the space of possibilities corresponds to
passwords like V 3 ^A 9 W ' ; x that no sane person would pick because
they're so impossible to remember.

No, it's time to start thinking about it.  Now.  Not in five years,
when anyone with access to one of the latest FrobozzCo 64K-processor
2684TRX PLA machines can exhaust the space in a month, and find your
password and mine much sooner than that.  Or when storage densities
have improved to the point where one person can carry that monster
lookup table I mentioned in a pocket.  (64 bits times 2^56 passwords
times 2^12 salts is 2^71 bytes.  That looks ridiculous.  Today.)

					der Mouse

			old: mcgill-vision!mouse
			new: mouse@larry.mcrcim.mcgill.edu

root@NEXTSERVER.CS.STTHOMAS.EDU (Max Tardiveau) (04/15/91)

mouse@larry.mcrcim.mcgill.edu writes (about password security) :

> No, it's time to start thinking about it.  Now.  Not in five years,
> when anyone with access to one of the latest FrobozzCo64K-processor
> 2684TRX PLA machines can exhaust the space in a month,and find your
> password and mine much sooner than that.  Or when storage densities
> have improved to the point where one person can carry that monster
> lookup table I mentioned in a pocket. (64 bits times 2^56 passwords
> times 2^12 salts is 2^71 bytes.  That looks ridiculous.  Today.)
> 

> der Mouse
> 

> old: mcgill-vision!mouse
> new: mouse@larry.mcrcim.mcgill.edu
> 


Well, I couldn't resist. Let's see. 2^71 is...
2,361,183,241,434,822,606,848, or (thanks to number(1)) :
two sextillion three hundred sixty one quintillion one hundred eighty  
three quadrillion two hundred forty one trillion four hundred thirty  
four billion eight hundred twenty two million six hundred six  
thousand eight hundred forty eight.

A big hard disk is 1 billion bytes. A huge carousel is one trillion  
bytes. This is nine orders of magnitude larger. We'll get there, but  
not tomorrow, nor the day after.

In other words : Don't panic.

---------------------------------------------------------------
Max Tardiveau
Department of Computer Science
University of St.Thomas
St.Paul, MN  55105
Internet : m9tardiv@cs.stthomas.edu
---------------------------------------------------------------
"Ban the bomb.  Save the world for conventional warfare."

hubcap@hubcap.clemson.edu (System Janitor) (04/15/91)

 *  
 *  Ummm, unless you wrote your own ftpd, the standard BSD one explicitly
 *  chroot's anonymous FTP requests to the logon directory of the user
 *  'ftp'.  In every system manual, where I've seen how to set up
 *  anonymous FTP, it mentions this, and tells the system manager never to
 *  make the logon directory be '/'.

But the man page for ftpd (usually) also says something like:

          ~ftp/etc) Make this directory owned by the superuser and unwrit-
                    able by anyone.  The files passwd(5) and group(5) must
                    be present for the ls command to work properly.

... and they never warn you to delete the encrypted password field 
from ~/ftp/etc/passwd. Lots of people have their *real* password files
available via anonymous ftp, and the manual more or less *tells* them to 
do it!

-Mike

rickert@mp.cs.niu.edu (Neil Rickert) (04/15/91)

In article <1991Apr15.140747.29793@hubcap.clemson.edu> hubcap@hubcap.clemson.edu (System Janitor) writes:
>
>But the man page for ftpd (usually) also says something like:
>
>          ~ftp/etc) Make this directory owned by the superuser and unwrit-
>                    able by anyone.  The files passwd(5) and group(5) must
>                    be present for the ls command to work properly.

  I don't know about others, but I never interpreted this as implying that
~ftp/etc/passwd should have the same contents as /etc/passwd.  I replaced
all passwords with '*', and deleted most users from the copy we use.

-- 
=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
  Neil W. Rickert, Computer Science               <rickert@cs.niu.edu>
  Northern Illinois Univ.
  DeKalb, IL 60115                                   +1-815-753-6940

croft@csusac.csus.edu (Steve Croft) (04/20/91)

Leong and Tham presented a paper at winter Usenix where they claimed a
hardware based encyrpter could determine a lower case password in 15
days.  On the basis of this, they claimed that UNIX password encryption
is insecure.

They claim the board would cost about $2000 to build and consist of about
100 ECL chips.

The paper is in the proceedings; sorry if this has been mentioned earlier.

Steve Croft
stevec@water.ca.gov

mjo@irie.ais.org (Mike O'Connor) (04/20/91)

In article <1991Apr20.150213.23439@csusac.csus.edu> croft@csusac.csus.edu (Steve Croft) writes:
:Leong and Tham presented a paper at winter Usenix where they claimed a
:hardware based encyrpter could determine a lower case password in 15
:days.  On the basis of this, they claimed that UNIX password encryption
:is insecure.

How would the passwords be recognized as such?  Visual inspection?  I
can't imagine my password as being anything but gibberish, even if
decrypted. 


====
Mike O'Connor (mjo@ais.org)

gwyn@smoke.brl.mil (Doug Gwyn) (04/21/91)

In article <1991Apr20.163540.23924@engin.umich.edu> Mike O'Connor <mjo@ais.org> writes:
>How would the passwords be recognized as such?  Visual inspection?

A UNIX password is "recognized" when it is found to encrypt to the
known ciphertext.  Note that for purposes of account cracking, any
plaintext having this property will serve as a password just as
good as the one you originally chose (in case there are multiple
plaintexts that encrypt to the same ciphertext).

cs132041@cs.brown.edu (Jeremy Gaffney) (04/22/91)

In article <1991Apr20.163540.23924@engin.umich.edu>, mjo@irie.ais.org (Mike O'Connor) writes:
|> In article <1991Apr20.150213.23439@csusac.csus.edu> croft@csusac.csus.edu (Steve Croft) writes:
|> :Leong and Tham presented a paper at winter Usenix where they claimed a
|> :hardware based encyrpter could determine a lower case password in 15
|> :days.  On the basis of this, they claimed that UNIX password encryption
|> :is insecure.
|> 
|> How would the passwords be recognized as such?  Visual inspection?  I
|> can't imagine my password as being anything but gibberish, even if
|> decrypted. 
|> 

As was mentioned earlier in this thread, all that would be required is any password
which returned the same encryption as the original.  I would be interested in knowing
how they determine the seeding that is used to encrypt the original...I was under
the impression that this was site-specific.

jg (cs132041@cs.brown.edu)

|> 
|> ====
|> Mike O'Connor (mjo@ais.org)