MARSELLE%gmr.com@RELAY.CS.NET (03/06/87)
I'm taking an informal poll which concerns the types of user lo- gin names people use on their Unix systems. First, let me pro- vide some background. I work on a Sun system which consists of 2 diskless clients (Sun-3/160's) and a file server (Sun-3/180). In addition, we have numerous VAXen and MicroVAXen, all running VMS. We also have a large IBM MVS system, a VM/CMS system, and a CRAY. Until recently, userids on the Suns consisted of users' last names. Our IBM systems use userids which are unique 6-character alphanumeric codes obtained by taking a user's Social Security Number base 36 (or something like that). As far as the user is concerned, it's a random userid (e.g. QZX1RS). In the interest of security. the powers that be have decided to use this type of userid on the Sun system. Naturally, the Sun users balked. I've tried to reason with the system administrators, but to no avail. I pointed out that enforcing stricter password usage measures would be a better solution (e.g. password aging, computer- generated passwords, minimum length passwords, etc). I notice that nearly every contributor to unix-wizards has a userid which consists of either the user's last name, first name, initials, or some combination of these. Surely you guys are concerned with security?! (the response I got was that csnet users are all university types (and I guess I was supposed to assume that university types aren't security-conscious)). Can anyone come to my defense? Thanks for your time. _________________________________________________ |Jim Marselle | Phone: (313) 986-1413 | |GM Research Labs | csnet: marselle@gmr.com | |30500 Mound Road | | |Warren, MI 48090 | | -------------------------------------------------
bzs@bu-cs.bu.EDU (Barry Shein) (03/07/87)
What are the arguments that non-mnemonic userid's were more secure? I've never heard that. Is it because it gives a system hacker something easier to remember to bash passwords at? User id names are almost always readily available from the (print out) trash cans, but perhaps it gives a somewhat easier target to guess at from the outside (of course, they're only gonna bash at 'root' anyhow...) I always thought the motivation for large systems to use those automatically generated userids was simply to make their life easier. On a large system it's hard to come up with a unique name and collisions are likely so you can go back and forth with a user for a while ("whaddya want?" "bob" "nope, bob's taken" "uh, bobm" "no, bobm is taken" etc.) This could clog a bureaucracy. Are you sure you're not dealing with some sort of cargo cult? Does anyone remember why they started that automatic userid business? We solved that on the student systems by writing a little program which runs dedicated at a terminal and lets you fill out a "form", among the questions is "what user name do you want?", it then checks if it's unique immediately and, if it is, reserves it immediately otherwise asks again. The entries are batched together and checked over later for inclusion in the passwd file (both the "batch" file and passwd file are checked for exclusivity.) No big deal, grep goes a long way here (and a lock.) You could argue back that if they insist on consistent naming then once someone has one userid they have it for all systems (and could try the same password, not that wild a guess if they have the password.) It's dumb, but what the heck, it throws it back in their court. -Barry Shein, Boston University
kurt@hi.UUCP (03/07/87)
Securing the average UNIX is next to possible (unless you pull the power cable :-). Such measures as making login names more cryptic doesn't really increase security but just makes it harder for the users to communicate (what's joe login name again?) and thus decreases the useability of the system. -- 9ACFH6 -- Kurt Zeilenga Internet: zeilenga@hc.dspo.gov (505) 277-1611 UUCP: hc!zeilenga All opinions are my own.... my boss can air his own.
djfiander@watnot.UUCP (03/08/87)
This is not exactly a Unix userid convention, but it does say something about security and userids: A _long, long_ time ago I worked for a certain large computer company (nudge, nudge) in a research facility that they operate in Toronto. They were so security conscious that I had to use a mag-strip card to get from my office to the cafeteria, however my userid, and those of everybody elses on the system, was my last name and my initials (up to a limit of eight characters, of course). I don't see how having cryptic userids does anything but make it difficult to communicate through the obvious medium of electronic mail. -- "I don't want to achieve immortality through my work. I want to achieve immortality through not dying" - Woody Allen UUCP : {allegra,ihnp4,decvax,utzoo,clyde}!watmath!watnot!djfiander CSNET : djfiander%watnot@waterloo.CSNET
henry@garp.mit.edu (Henry Mensch) (03/09/87)
djfiander@watnot.UUCP (David Fiander) wrote: ->I don't see how having cryptic userids does anything but make it difficult ->to communicate through the obvious medium of electronic mail. Well, sometimes it helps the people who run the place (often these people are called "bean-counters") keep track of what's going on without expending much effort. Some time ago, when I worked in the Midwest, I was assigned a login name of "ag5". This had nothing to do with security--instead, it seems that these ridiculous login names (yes, they were all three-character login names) mapped to account names on an archaic system on which the bean-counting (and lots of other miscellaneous batch processing) was performed. These login names were automatically generated, although it seems that (now) if you kiss the appropriate bottoms there you can get your initials as a login name. Nevertheless, I think you're right. Cryptic login names make things difficult for the user, and if a cracker wants in, (s)he'll get in whether the login names are obvious or not. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Henry Mensch <henry@garp.mit.edu> {ames,cca,rochester,mit-eddie}!garp!henry
zellich@ALMSA-1.arpa (03/09/87)
Actually, if your installation has a need for the extra login security, then assigning "cryptic" userids is a fairly good idea - the userid and password should \both/ be protected (although you can't really hide the userid from other legitimate users of the system without moving to some kind of a "secure" variant of Unix). No sweat on e-mail - you just set up useful aliases for each user the same way we do now; nothing says a user's login id and mail id have to be the same (and there can be multiple aliases for mail, so nobody has to remember if I'm "richz" or "rzellich" or "zellich" or "amxalfpi" (an office symbol here)).
davids@iscuva.UUCP (03/09/87)
Here where I work we brought in 5 MicroVAX II's running Ultrix and an 11/785 running VMS about a year ago. Other portions of our company were using login names (on our IBM mainframes) of the user's first initial, last initial, followed by the employee number (ds08393). The person who was organizing the installation of our new systems decided that if others used that method then we would use the same method (against both the VMS and Ultrix administrators wishes). This lasted about 3 months before we were allowed to changed to a more user friendly method. Durring those 3 months it was VERY difficult to communicate with other users. We were always looking up names off of printed cross-references or guessing and getting them wrong. We currently use first name, last initial (davids). In the case of duplicates (3 out of 130 users!) we simply added a second letter from the last name to the second user. Communication be INSTANTLY easier for all users. Even those who opposed the change agreed afterwards that it was much better than before. The place for security is not in the user names, it should be in enforcing good password practices (long passwords, password aging, etc.). -- David Schmidt UUCP: ihnp4!tektronix!reed!iscuva!davids ISC Systems Corp. Phone: (509)927-5479 Box TAF-C8 Spokane, WA 99220
mike@BRL.ARPA (Mike Muuss) (03/10/87)
BRL UNIX Release #3 and beyond have a variety of improvements to the security mechanisms of UNIX, especially in LOGIN, where stricter logging/disconnect policies are implemented, and in PASSWD, where user-selected passwords must clear dictionary lookups, local dictionary lookups, and a local administrator "hotlist" which includes passwords like the ever-popular "susan". There is no additional security obtained by having gibberish user names. Not counting the "who" and "ls" commands available to other local users, the first time each user posts mail and/or netnews, their username is "out of the bag". Big deal. For a really cogent discussion of computer security, may I refer you to Army Regulation 380-380 (available from the Government Printing Orifice) -- it's one of the few well written Government security regulations. Observe how it spends most of it's time discussing physical security, and personnel screening. To your IBM folks, just bellow "Egads, it's User Hostile" and beat a hasty retreat. Best, -Mike Muuss Postal: Mike Muuss Leader, Advanced Computer Systems Team Systems Engineering and Concepts Analysis Division U.S. Army Ballistic Research Laboratory Attn: SLCBR-SECAD (Muuss) APG, MD 21005-5066
karl@cbstr1.att.com (Karl Kleinpaste) (03/10/87)
Posting-Front-End: GNU Emacs 18.37.1 of Wed Feb 25 1987 on cbstr1 (usg-unix-v)
zellich@ALMSA-1.arpa writes:
No sweat on e-mail - you just set up useful aliases for each user
the same way we do now; nothing says a user's login id and mail id
have to be the same...
True enough. I have been using a modification to smail (first in 2.1;
added to 2.3 yesterday) which does fullname delivery of mail. Mail
from me now says I am Karl.Kleinpaste@cbstr1.att.com, in both the
From: and From_ lines. Works great. Has a nice heuristic for
variations on a fullname, e.g., for a gecos field in /etc/passwd of
"First M. Last (Nickname)," it'll deliver to First.M.Last, F.Last,
Last, Nickname.Last, or N.Last, all equivalent. Now there is
effectively no relationship between my login name and my mail address;
it could change to "zzrwvjs" tomorrow and no one would know by my mail
address.
Now I need to convince the netnews software to use the same mechanism,
so that outbound news doesn't advertise me by login name, either.
PS- How many people are aware that the current development version of
smail is up to version 2.5? I got mail via floyd yesterday, and its
Received: line said "smail 2.5" in it. Rather volatile software...
--
Karl
brian@asci.UUCP (brian) (03/11/87)
Expires: Sender: Followup-To: Distribution: Keywords: Our company does a large amount of consulting & programming on systems from PC's to IBM main frames, with 90% of the work under Unix, which is divided up about 70-30 between DoD and Private enterprises. Every system can be considered to contain sensitive information to somebody somewhere, whether it be government or private. Generally speaking, under Unix using the user's name is the only good method for userids for the many reasons already mentioned (i.e. e-mail), and most large systems do generate their own account names for their own convenience. However, there are times and systems when a cryptic password, and/or userid is necessary. When a name is used for the userid, and the user is allowed to assign their own password, 90% of the time they will use passwords of some familiarity, their child's name (alla Wargames), religious affiliation, names of great ships. For a great many systems this is no problem. But in large corporate structures, the most pervasive security issue facing Administrators today arises using such a passwording and userid scheme. This is the Internal Infiltrator (I.I.). These security violator, under Unix particularly, usually have no interest getting to the master account (root). Rather, the I.I. is usually interested in viewing data he has no business looking at. For example, a manager writes a confidential memo to another manager that a recently transfered employee was suspected of using cocaine on the job, and for the new manager to keep an eye on him. Later the employee is fired for whatever reason, only to produce a copy of the memo. Legally explosive. Other examples include viewing a competitor's accounting files. An unscrupulous colleague damaging your work for his own gain in the work place. These have and continue to happen in the corporate world, and if an I.I. knows something about you, and your method for passwording, he's already cut down the number of password bangs from hundreds of thousands to tens, or maybe even a few thousand. He probably doesn't even care about root's password. The I.I. is the #1 threat to security in the corporate Unix world. For those situations our method of generating a password is to open a dictionary, point to a word, and take the first letter. Then close the dictionary, open again, p-t-a-w, and take the second letter, etc., etc., through the maximum allowable characters. From, there, it is absolutely forbidden to write down the password, instead a mnemonic is developed (i.e. qazxsw is quite all zebras x-ray session writing). This is drilled into the user. We now are back to hundreds of thousands of possibilities. Under Unix, it makes no sense to be cryptic for the userids, for all the I.I. would have to do is print the passwd file, and then bang on the password to get in under the account desired. Using mnemonic userids is the only viable method to assign these. However, on non-Unix machines, without these types of security deficiencies, cryptic userids do become a powerful tool for internal security. Lastly, the best security method of all is put the system in a TEMPEST approved vault, with all the terminals in the vault, and make everybody sign in and out. But then again, anybody that really wants in can always pull out the most trusted tool of any system penetrator. The time honored practice of bribery. A very hard method to defend against. Brian Douglass Applied Systems Consultants, Inc. (ASCI) P.O. Box 13301 Las Vegas NV 89112 (702) 733-6761
arnold@apollo.UUCP (03/12/87)
In article <4788@brl-adm.ARPA> MARSELLE%gmr.com@RELAY.CS.NET writes: >Until recently, userids on the Suns consisted of users' last >names. Our IBM systems use userids which are unique 6-character >alphanumeric codes obtained by taking a user's Social Security >Number base 36 (or something like that). As far as the user is >concerned, it's a random userid (e.g. QZX1RS). In the interest >of security. the powers that be have decided to use this type of >userid on the Sun system. How about the following: by using your Soc Sec # as your login id, everyone on the system knows everyone else's Soc Sec #. This is pretty absurd. SSN's are a little too useful for accessing info about people to make them public. I sure wouldn't want my SSN to be widely known -- do you? Suggest using bank account #s instead -- that, at least, is only *one* of the peices of info generally available using the SSN. See how they react to *that* suggestion. This is all in addition to the fact that ugly login names are no deterrent whatsoever. My login name is very publicly known -- every time I post to usenet thousands of people can see it. If I want anyone to send me mail *they* get my login name. *Passwords* are the point of security, and many techniques are already available to deal with that. Ken Arnold uucp address: apollo!<censored for security reasons>
apn@nonvon.UUCP (03/12/87)
I don't think that the basic assumption is valid: scrambled userid's == better security while, It *is* certainly true that scrambled userid's == more confusion Could someone clarify this to me. Why is it , that by having an obscure sequence of characters in your login name, security is compromised/enhanced of the ability to login as that user ? -- UUCP: {sun, seismo, amdahl, lll-crg, 'etc'}!ptsfa!nonvon!apn {* Only those who attempt the absurd ... will achieve the impossible *} {* I think... I think it's in my basement... Let me go upstairs and check. *} {* -escher *}
rbj@icst-cmr.arpa (03/13/87)
? Until recently, userids on the Suns consisted of users' last ? names. Our IBM systems use userids which are unique 6-character ? alphanumeric codes obtained by taking a user's Social Security ? Number base 36 (or something like that). As far as the user is ? concerned, it's a random userid (e.g. QZX1RS). In the interest ? of security. the powers that be have decided to use this type of ? userid on the Sun system. Naturally, the Sun users balked. I've ? tried to reason with the system administrators, but to no avail. ? I pointed out that enforcing stricter password usage measures ? would be a better solution (e.g. password aging, computer- ? generated passwords, minimum length passwords, etc). I notice ? that nearly every contributor to unix-wizards has a userid which ? consists of either the user's last name, first name, initials, or ? some combination of these. Surely you guys are concerned with ? security?! (the response I got was that csnet users are all ? university types (and I guess I was supposed to assume that ? university types aren't security-conscious)). ? ? Can anyone come to my defense? Thanks for your time. Sounds like the EDS bozos. Pretty brain-damaged, eh? All you can do is play their game. As mike@brl suggested, get that report. All you other groovy people commenting on this have missed the point: Merely *knowing* that a given user has an account on a machine provides a clue as to where to look. Anonymity provides some `security'. Tell them it's a violation of your privacy to use your SSN as an input to a function. Just wait till those suckers find out the password file is readable :-) (Root Boy) Jim "Just Say Yes" Cottrell <rbj@icst-cmr.arpa> Why did Paul Simon name his album after Elvis Presley's house? Disclaimer: I speak for myself. NBS doesn't necessarily think likewise of EDS, but just the same, I haven't seen any of them working on any of our contracts either. P.S. Say HI to Myron Ginsberg for me.