UNIX Password Security - Ten Years Later
نویسندگان
چکیده
Passwords in the UNIX operating system are encrypted with the crypt algorithm and kept in the publicly-readable le /etc/passwd. This paper examines the vulnerability of UNIX to attacks on its password system. Over the past 10 years, improvements in hardware and software have increased the crypts/second/dollar ratio by ve orders of magnitude. We reexamine the UNIX password system in light of these advances and point out possible solutions to the problem of easily found passwords. The paper discusses how the authors built some high-speed tools for password cracking and what elements were necessary for their success. These elements are examined to determine if any of them can be removed from the hands of a possible system innltrator, and thus increase the security of the system. We conclude that the single most important step that can be taken to improve password security is to increase password entropy.
منابع مشابه
Brute Force Attack on UNIX Passwords with SIMD Computer
As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in light of new technological advances. In this paper we evaluate the security of the UNIX password scheme. We show that the UNIX password scheme is vulnerable to brute-force attack. Using PixelFlow, a SIMD parallel machine, we are able to “crack” a large fraction of pas...
متن کاملProofs of Security for the Unix Password Hashing Algorithm
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost all of the available strength from the underlying cryptographic primitive and provide good reason for confidence in the Unix construction.
متن کاملSemantics of the password-capability system
The increasing problems of hacking and computer viruses have demonstrated the need for more secure computer systems. Conventional operating systems such as Unix, Linux, and Windows have not proved very satisfactory in dealing with such security problems. The capability paradigm seems to offer scope for more flexible computer system security but suffered from various implementation disadvantages...
متن کاملOn the Security of Some Password Authentication Protocols
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication protocol via username and password should b...
متن کاملImplementing Execution Controls in Unix
Current implementations of UNIX offer security features in the form of discretionary access controls (DACs). DACs are implemented with file access permissions and access control lists (ACLs). Unfortunately, neither of these facilities provide for access control to active processes. In order to provide many users access to a process (and its associated data) the current practice at our site is t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1989