home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.security.misc:832 alt.security:4018 comp.unix.ultrix:5908
- Path: sparky!uunet!paladin.american.edu!europa.asd.contel.com!darwin.sura.net!mips!swrinde!elroy.jpl.nasa.gov!jato!dave
- From: dave@jato.jpl.nasa.gov (Dave Hayes)
- Newsgroups: comp.security.misc,alt.security,comp.unix.ultrix
- Subject: Re: Problem with npasswd??
- Message-ID: <1992Jul27.201712.15229@jato.jpl.nasa.gov>
- Date: 27 Jul 92 20:17:12 GMT
- References: <PCL.92Jul27140810@black.oxford.ac.uk> <1992Jul27.184324.14697@hubcap.clemson.edu>
- Reply-To: dave@jato.jpl.nasa.gov
- Organization: Jet Propulsion Lab - Pasadena, CA
- Lines: 18
-
- hubcap@hubcap.clemson.edu (System Janitor) writes:
- >The point is, even if you use npasswd, a cracker will still get some of
- >your passwords. So what if they only get 10 instead of 200, they'll still
- >have some userids from which to launch their nefarious plans.
- >So, aren't you fooling yourself to think that npasswd like schemes
- >enhance your system security enough to make them worthwhile?
-
- This is a hard statement to agree with, given that it is only a matter
- of time before someone puts crack-like word scanning in npasswd.
-
- Keep in mind that scanning plaintext matches is far faster than scanning
- crypted ones.
-
- --
- Dave Hayes - Network & Communications Engineering - JPL / NASA - Pasadena CA
- dave@elxr.jpl.nasa.gov dave@jato.jpl.nasa.gov ...usc!elroy!dxh
-
- If it works...use it. If it doesn't, find out why and use THAT.
-