home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.ultrix
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!mips!mips!munnari.oz.au!metro!usage!newt.phys.unsw.edu.au!mcba
- From: mcba@newt.phys.unsw.edu.au (Michael C. B. Ashley)
- Subject: Re: SUMMARY (preliminary): There have been 243 unsuccessful login attempts on your account
- Message-ID: <1992Aug25.115733.17501@usage.csd.unsw.OZ.AU>
- Summary: problem solved!!
- Keywords: comp.unix.ultrix
- Sender: news@usage.csd.unsw.OZ.AU
- Nntp-Posting-Host: newt.phys.unsw.edu.au
- Organization: University of New South Wales
- References: <1992Aug25.110645.16618@usage.csd.unsw.OZ.AU>
- Date: Tue, 25 Aug 1992 11:57:33 GMT
- Lines: 31
-
-
- As luck would have it I solved the "unsuccessful login" problem minutes
- after I posted my last article on the subject!
-
- The solution is that the routine "authenticate_user" is the one that
- writes to "fail_count" in /etc/auth. So you don't have to actually
- attempt to login. The message "There have been xxx unsuccessful login
- attempts on your account" should really read "There have been xxx
- unsuccessful attempts to call authenticate_user for your account".
- So, where was this routine being called? Well ... I am using a kerberized
- version of "xdm" (so that the 30 NCD Xterms connected to my DECstation
- 5000/200 can login; it has to be kerberized since I'm running ENHANCED
- security; Xprompter doesn't support a chooser mechanism or any decent
- authorization scheme (e.g., MIT-MAGIC-COOKIE-1)), and it turns out that
- if a user enters a null username (i.e., just presses <CR>) then xdm
- appears to use "root" instead (despite the fact that the code appears
- to use "Nobody" ... I will have to investigate further).
-
- Sorry to have wasted so much bandwidth on this topic, although it does
- point out a slight design problem with ULTRIX: it would be easy for a
- user to write a program to call "authenticate_user" and generate an
- arbitrary number of "unsuccessful login attempts" for an arbitrary user.
- On the plus side, ULTRIX at least tells you that someone appears to be
- trying to guess your password. On the minus side, you can waste a lot of
- time trying to track it down, and since "auditd" does not appear to
- audit calls to "authenticate_user", it is difficult to work out
- who is doing it.
-
- regards to all,
- Michael Ashley mcba@newt.phys.unsw.edu.au
-
-