On 26 Mar 1998, James Youngman wrote:

> The trouble with this is that it places a strong relationship between
> successive passwords.  This means that the breaking of one password
> can be fatal; the knowledge of one password allows you to break the

What's even worse, the bad guy has only to obtain your random number seed
and he can launch a nice dictionary attack consisting of only a few
thousand passwords and he can break every password that ever used this
random system.

> passwords of all the following users trivially.  I've seen this done
> to deduce the passwords of an entire year of undergraduates [in fact

It has also been used to deduce all the passwords of a notable government
agency.  Rather than run the risk of their users picking "bad" guessable
passwords, they produced a list of passwords using some means and assigned
every user one of these so-called "good" passwords.  The hackers promptly
obtained the algorithm used to generate the passwords and cracked them
all.

> If you must select random passwords, then please use a
> (cryptographically) stronger source of randomness, for example

You probably will gain more security by shadowing the password file than
you will by insisting on any sort of deterministically selected passwords.


-- 
  PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES!
http://www.redhat.com/RedHat-FAQ /RedHat-Errata /RedHat-Tips /mailing-lists
         To unsubscribe: mail [EMAIL PROTECTED] with 
                       "unsubscribe" as the Subject.

Reply via email to