[net.unix-wizards] Security Problem?

thettyofGeoffreyS.Goodfellow@BRL.ARPA (06/29/83)

A real easy way of "hacking names" on a host is to just connect
up with TELNET and do a SYSTAT or FINGER.  Big Deal.

A gourmet "name hacker" would use the NIC's informative "WHOIS"
Server.  Just give the name of your favorite host preceded with a
star `*' (i.e.  try `*brl' for example) and a nicely formatted
list, replete with full name, initials(nic id), mailbox and phone
number will promptly be displayed.

Happy Hacking.

greep%su-dsn@sri-unix.UUCP (06/29/83)

Other tactics include looking in the Arpanet directory or just trying
common names.  In addition, many Unix sites have a "who" login that
runs the "who" or "finger" program, and most tops-20 sites let you
run "finger" or "systat" without being logged in.  In fact, you can
(at least with some dec-20's) run finger with a null argument and
get a list of every user (not just those logged in).  It is generally
agreed that keeping user names secret is not a reasonable thing to
do -- that's what passwords are for.

EE.GDS%MIT-OZ%mit-mc@sri-unix.UUCP (06/30/83)

From:  Greg Skinner <EE.GDS%MIT-OZ@mit-mc>

There is another way to hack user logins -- just wander around the
Arpanet looking for a user named "smith" or "jones" who has an account
with no password.  I know instances of this happening with Unix
machines -- in fact, when the TCP/IP switchover took place the users
on our internet vaxes were required to give themselves passwords, or a
password was chosen for them different from their name.  Actually, if
the host has a finger server, you could try all logged-in users
looking for a non-password account.

Also, some users stupidly have login and password names the same.
This happens often when accounts are newly created and the user is not
present at the creation time.  The operator makes the username and
password names the same.

As far as I know, non-password accounts are allowed on Unix, and not
on TOPS-20.

--greg
-------

chris@umcp-cs.UUCP (07/01/83)

	From:  Greg Skinner <EE.GDS%MIT-OZ@mit-mc>

	Some  users  stupidly  have  login and password names the same.
	This happens often when accounts are newly created and the user
	is not present at the creation time.

If  any  sites  would  like  to  fix  that,  I  have  a  program called
``newacct'' which is intended  to  be  run  by  the  user  getting  the
account.    It  reads  the  login  name,  full  name,  passwd, etc, and
constructs a mail message (to "mark", but  that's  a  #define)  with  a
nicely  complete  passwd  file entry.  No one ever gets to actually see
the pasword typed; once the password has been  accepted  the  encrypted
one  is  displayed.    It  even  has a verfiy-password procedure (which
currently just checks the length of the password).  It uses my  windows
library,  which  I'm  starting  to  send  to  net.sources    (I    sent
documentation  early  this  morning).  With a small modification to the
password-verifier you'd have a ``secure'' system.  ('A course, ya still
need to change the password-change-program.)

If  you want newacct, send me mail.  If enough people want it I'll post
it to net.sources.

				- Chris
-- 
UUCP:	{seismo,allegra,brl-bmd}!umcp-cs!chris
CSNet:	chris@umcp-cs
ARPA:	chris.umcp-cs@UDel-Relay

FFM%mit-mc@sri-unix.UUCP (07/01/83)

From:  Steve Kudlak <FFM@mit-mc>


There are lots of hacks like this one. The legendary,
excuse the language, <<FUCK SUSAN BOB>>. Guessing female
names is supposedly good on some sites, and some commercial
places whose names will remain unmetioned have WHEELED
accounts that still have the DEFAULT DEC PASSWORD.

steve%ucl-cs@sri-unix.UUCP (07/01/83)

From:      Steve Kille <steve@ucl-cs>

There seems to be a definite argument here for separating login name
and mail address (as happens on some sites I know of).

Steve

MRC@SU-SCORE.ARPA (07/05/83)

From:  Mark Crispin <MRC@SU-SCORE.ARPA>

     One thing you could do would be to not validate mailboxes in the
SMTP server, but that only delays the error message unless you "black
hole" mail to invalid mailboxes.  It's a trade-off between security and
friendliness.
-------

msggroup-request%brl@sri-unix.UUCP (07/05/83)

From:  Einar Stefferud <msggroup-request@brl>

I can see how you connect this question to MsgGroup because of the
involvement of SMTP, or mailing lists.  But, of course there are lots
of other non-mail ways to get login names on most any host.

So, I don't think this is a mail system issue after all, beyond your
accurate initial observations.

So, rather than trying to shut down the ability to extract login names
from mail servers, I think attention should be focused on other
security techniques.

Like, making the penalty higher for failing to login correctly, and
making the user start over at the beginning of the whole process when
an error occurs before completion.  One thing to do is force a delay
following any failure, like an extra 5 or 10 seconds, which slows down
the hacking rate to less than 6 tries per minute.  Then, I think that
too many failures in a row should cause a disconnect, which further
slows down serious password hackers.

Seems to me that it is too easy to put obstacles in the way to let
ourselves get sidetracked into trying to conceal names.  Whither goest
the whole idea of name-servers if we try to close the mail gap?

So, lets just chase this issue back to the other lists, unless a more
genuine mail connection can be conjured up.

Cheers - Stef

JPAYNE@BBNG.ARPA (07/05/83)

	From:  Greg Skinner <EE.GDS%MIT-OZ@mit-mc>

	Some  users  stupidly  have  login and password names the same.
	This happens often when accounts are newly created and the user
	is not present at the creation time.


At LSRHS we have an account called new which runs the program newu.
Newu asks for login name, a password which has to pass the same tests
as the change passwd program, Real name, birthday, Hall, Year of
Graduation, and of course a password for the account.  It then adds a
new entry into the passwd file, and in another file, the inquir file.
The new account can't be used until it is validated with the validate
program.  This is a nice easy way to create accounts with SECURE passwds.

	Jonathan