[comp.unix.wizards] password protection

Kemp@dockmaster.arpa (01/01/89)

> From: Barry Shein <bzs@encore.com> in V6#064
> . . . [some specifications for non-trivial passwords] . . .
>
> Something has to be tacit, every time someone says that eight chars
> from a 64 or 100 char set should be sufficient someone else jumps up
> and says "not if they're all lower-case!", assume when we say "from
> 100 chars" we mean we'll make it hard to search less, not "from 100
> chars or any number less down to one".

    I can't quite parse that last sentence, but I assume you are saying
"educate users to use mixed-case, digits, and punctuation in their
8 (or 7) character passwords".  That's a useful idea, but it's not
sufficient.  Your math is *bogus*.  Entropy has been discussed here a
few times, but I will beat on it again.

    The maximum amount of information a standard unix password may
contain is 56 bits (8 symbols, each from a set of 128 characters).
BUT, that is only true if for each symbol, every character from the
set is *equally* likely.  If you are going to base your math on a
100 character set (or more precisely the 94 graphic ASCII characters),
you are going to have to have users pick passwords like &Q8nz)~B and
aaaabbbb.  The first one isn't going to be used because humans can't
remember it, and no one will pick the second one because it "isn't
random enough".  As soon as you start adding a priori knowledge about
how passwords are constructed, you reduce the amount of information
they can contain.  If you set an army of undergraduates to generating
zillions of passwords based on your rules (mixed case and punctuation,
no dictionary words, etc), I would be extremely surprised if you came
out with as much as 40 bits of information per password.

The only way I know of to get reasonably high work factor passwords
out of humans is to hash 'pass phrases' down to 56 bits, as has been
suggested several times, most recently by "David L. Jobusch"
 <jobusch@atanasoff.cs.iastate.edu> in v6#064.

> And let's let the conversation about more exotic methods (password
> aging, shadow password files, anything beyond influencing a reasonable
> choice of a good password in the first place which some of us claim is
> sufficient) proceed from there instead of going round and round in
> circles.

Again, you miss the point.  As a security issue, password aging is
virtually orthogonal to password selection.  This has also been explained
several times here or in RISKS.  Passwords may be obtained illicitly in
many ways besides cryptanalytic attack, such as listening to your comm
line or your ethernet, looking over your shoulder, searching your desk
for scraps of paper, running a password grabber, bribing a system
administrator, searching your dumpster for punched cards :-), analysing
the reflections of an invisible laser beam aimed at your keyboard :-) :-),
etc.  The point is, an unauthorized person has your password and you don't
know (s)he has it.  How long do you want him/her to have it.  If your
answer is "a century", that's fine.  On systems with anything of value
to protect, six months might be a better answer.

  Dave Kemp

bzs@Encore.COM (Barry Shein) (01/02/89)

From: Kemp@dockmaster.arpa
>    I can't quite parse that last sentence, but I assume you are saying
>"educate users to use mixed-case, digits, and punctuation in their
>8 (or 7) character passwords".  That's a useful idea, but it's not
>sufficient.  Your math is *bogus*.  Entropy has been discussed here a
>few times, but I will beat on it again.

What I'm saying is to consider using password changing programs which
enforce some reasonable policy AND educate users why it's being done
and why not to try and subvert it.

My math isn't bogus, c'mon, look at the straws we're grasping for:

>If you set an army of undergraduates to generating
>zillions of passwords based on your rules (mixed case and punctuation,
>no dictionary words, etc), I would be extremely surprised if you came
>out with as much as 40 bits of information per password.

Army of undergrads? Fine, I am GLAD to admit that my suggestion
(mixedcaseword-punct-mixedcaseword) was not optimal (although I don't
think it's an awful example, for a start), but it does not follow that
there exists no reasonable password choice algorithm (or worse, that
THEREFORE we need some of the other things suggested like shadow pw
files.) You're simply trying to force the hacker to search the whole
space or a very large space.

It's quite possible the correct conclusion is that typed in passwords
are fundamentally hopeless, high security areas do use all those other
non-voluntary expensive methods for a reason I assume (voiceprints,
retinal scanners etc), probably because they reached this conclusion a
long time ago. Given that we're probably chasing a will-o-wisp (ie.  a
method to make textual passwds secure.)

>Again, you miss the point.  As a security issue, password aging is
>virtually orthogonal to password selection.  This has also been explained
>several times here or in RISKS.  Passwords may be obtained illicitly in
>many ways besides cryptanalytic attack, such as listening to your comm
>line or your ethernet, looking over your shoulder, searching your desk
>for scraps of paper, running a password grabber, bribing a system
>administrator, searching your dumpster for punched cards :-), analysing
>the reflections of an invisible laser beam aimed at your keyboard :-) :-),
>etc.  The point is, an unauthorized person has your password and you don't
>know (s)he has it.  How long do you want him/her to have it.  If your
>answer is "a century", that's fine.  On systems with anything of value
>to protect, six months might be a better answer.

Agreed! I don't miss the point, I just wonder if you can really sell
folks on a security approach which limits someone having their
password for "only" 6 months (glork.) I suppose it's better than
nothing, but not much. That's the point, it's not a very good approach
(either you change your password VERY often or stand to have your
password known for whatever the password aging cycle is, months?)

I simply think we're all grasping for straws here and many of the
methods being proposed are not really worthwhile other than perhaps as
friendly suggestions (hey you, change your pw every so often!) It's
just a lot of pap.

	-Barry Shein, ||Encore||

ruediger@ramz.UUCP (Ruediger Helsch) (01/03/89)

In article <4553@xenna.Encore.COM> bzs@Encore.COM (Barry Shein) writes:
>
>What I'm saying is to consider using password changing programs which
>enforce some reasonable policy AND educate users why it's being done
>and why not to try and subvert it.
>

Everybody in this discussion speaks over "educating users" and "enforcing
reaonably chosen passwords". Shouldnt we instead support users in chosing
THEIR passwords?
Under this view it may be reasonable to reject too short passwords, but
restricting the password to 8 characters seems stupid. The longer the password
(or sentence) is, the better. And every single bit of it should be used.