on Mon, Dec 08, 2003 at 11:13:07PM +0000, Colin Watson ([EMAIL PROTECTED]) wrote:
> On Wed, Dec 03, 2003 at 06:08:54PM -0700, Monique Y. Herman wrote:
> > After reading a few more responses, I realize that of course a debian
> > developer's machine could get compromised.  I guess I just thought they
> > were infallible *grin*
> > 
> > Now, the real question is, what exploit was used to get onto that dev's
> > machine in the first place?
> 
> My understanding is that the developer's account on the machine in
> question had been disused for some time, and that the machine wasn't
> very well-maintained. It could have been any one of a dozen local root
> exploits that have been known for some time. I think they investigated,
> but the results weren't particularly earth-shaking.

Any indication of whether or not this was a local system or a remote
system?

I understand that password reuse was part of the problem -- the
developer's password(s) on the initially compromised box matched
password(s) used on other systems.


I strongly recommend the use of password generation tools such as pwgen,
gpw, or the PalmOS Cryptinfo program, and use of an encrypted archive
for password storage -- again, Cryptinfo, which can be used both on
handheld or via JPilot -- or an encrypted textfile for which Joey Hess
posted a cool vim hack some time back.

I've tested output of pwgen for uniqueness (a measure of strength of the
passwords generated).

One such test:

    pwgen 8 100000 | sort | uniq -c | wc -l

...which generates 1 million passwords, and checks to see how many are
unique.  I typically see 98.7% using pronounceable passwords, far better
when using fully random ones or longer keys.  The pronounceable
passwords are relatively memorable.


Peace.

-- 
Karsten M. Self <[EMAIL PROTECTED]>        http://kmself.home.netcom.com/
 What Part of "Gestalt" don't you understand?
    "What's so unpleasant about being drunk?"
    "You ask a glass of water."
    -- HHGTG

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to