Index Home About Blog
Newsgroups: comp.risks
X-issue: 5.24
Date: Wed, 5 Aug 87 13:31:36 EDT
From: mnetor!utzoo!henry@uunet.UU.NET
To: RISKS@csl.sri.com
Subject: Re: Security-induced RISK

Those not in the Unix community may not be aware of the excellent security
paper that was published in the Bell Labs Technical Journal a few years ago.
Some parts of it are Unix-specific, but much of it is fairly generic.  The
most interesting parts are discussions of how supposed enhancements in
security actually make things *worse*; the paper is clearly the result of
practical experience, not just theoretical navel-contemplation.  For example,
the problem of logs of incorrect login/password combinations being a source
of useful information is worse than it seems:  even just logs of login names
alone can be informative, because people do accidentally type passwords in
response to the login-name prompt now and then.  For another example, aging
schemes that try to enforce frequent password changes have bad side effects:
"...the most incredibly silly passwords tend to be found on systems equipped
with password aging...".

The paper is "UNIX Operating System Security", by F.T. Grampp and R.H. Morris,
AT&T Bell Laboratories Technical Journal, Vol. 63, No. 8, Oct. 1984, pages
1649-1672.  Any good engineering library will probably have the B.L.T.J.
(formerly the Bell System T.J.), since it is/was one of the top technical
journals of the communications industry.  This particular issue, the second
special issue on Unix, can also be ordered from AT&T, although I don't have
ordering details handy.

Henry Spencer @ U of Toronto Zoology {allegra,ihnp4,decvax,pyramid}!utzoo!henry

    [While you are in that issue, you might just keep on reading.  The paper
    following Grampp and Morris' is also worth looking at:  "File Security
    and the UNIX Crypt Command", J.A. Reeds and P.J. Weinberger, pages
    1673-83: "crypt" was not very secure.  PGN]


Index Home About Blog