| New Messages
We ask that letters with code listings be submitted
in 
an ASCII text file on an MS-DOS formatted disk or via
email. Our net 
address is:
saletter@rdpub.com ("...!uunet! rdpub!saletter"). 
To: saletter@rdpub.comSubject: Password taboos
 I have two comments on password protection.
 
First, it's easy to tell people what not to do with
passwords; helping 
them come up with good passwords is not much more difficult,
but articles 
on password security (including Chris Hare's article
on _How UNIX 
Password Controls Work_) seldom touch on this topic.
 
Instead, we are told, "don't pick any real word
or other 
easily remembered combination of printable characters,"
yet we 
are to pick something we can easily remember so we don't
have to write 
it down! 
There are a few simple tricks to aid with password generation
that 
meet both the above goals. Naturally, they work best
with passwords 
that are obscure to begin with, but they will help with
even simple 
passwords. 
Mixing alphabetics and non-alphabetics in some fashion
which makes 
sense to you usually provides enough security. Systems
which allow 
all printable (or even nonprintable) characters lend
themselves best 
to this, but even using numbers will help quite a bit. 
The simplest case is to tack a number on at the beginning
or end of 
a word. This is marginally more secure than the word
itself. Better 
yet is to use a number or other non-alphabetic character
in a mnemonic 
fashion. Consider the following table of substitutions
(use your imagination!) 
 
| This | Can replace |  
| 0 | O, Q, U |  
| 1 | l, I, J |  
| 2 | Z |  
| 3 | E |  
| 4 | q |  
| 5 | S |  
| 6 | b |  
| 8 | B |  
| 9 | g |  
These are only what I consider the most obvious ones.
But these (if 
used judiciously) increase the password "alphabet."
Passwords 
like 5har0n, k0mquat, or 5en1l3 are tougher to crack
than their regular 
spellings (sharon, kumquat, senile). 
Creative spellings and mnemonics help, also. Coworkers
and I have 
successfully (in cracker-filled environments) used the
following: 
3lobyte (trilobite), sharf1sh (sharon likes fish), timbukE
(reverse 
substitution of 3 in the name of the group timbuk3). 
Similarly, made-up words can work well. Simply pick
some syllables 
you like, or some sounds, and make a word. Use an obscure
word from 
another language, perhaps spelled phonetically. Mix
in the alternate 
characters as you like, and "voila!" (literally,
"you 
will look like a fool if you say this aloud"). 
I have used a bogus word from the net which caught my
eye, with substitutions 
as suggested above, for quite a while. Despite life
amongst some very 
good pranksters, it has worked well. I interchange it
occasionally 
with a few other similar passwords. About the only way
these can be 
cracked is by testing every (or random) passwords -
and nothing is 
protection against that. 
Second, I'm tired of hearing how dangerous password
cracking programs 
are. People who want to crack your passwords *are* going
to have them! 
You had better have programs as good as theirs to catch
sloppy users. 
Really secure sites use password programs such as SecureWare
provides 
in their trusted system - which won't even allow a user
to set a password 
to something easily cracked. Without such a tool, however,
you should 
be prepared to run the COPS (or some other) cracker
on a regular basis. 
My experience is that even with educated users, COPS
will uncover 
that 10% to 20% of your users will have unsafe passwords
until confronted 
-- and that's without testing against the system dictionary!
Encouraging system administrators to avoid password
crackers is like 
suggesting the police go out to face drug dealers without
guns. 
Miles O'NealPencom Software
 Austin, TX
 
The substitution trick is neat, and easy to teach. Thanks
for sending it.  
As for password crackers, I agree, the bright and diligent
intruders will have them. All the same, I don't have
to make things 
easy for the dumber would-be intruders by publishing
the code here. 
--rlw 
To: saletter@rdpub.comSubject: comment...
 
I got my first issue of Sys Admin, and it looks nice.
I'll miss the 
root dragon however. 
I especially enjoyed G. Clark Brown's article. 
But there is one thing missing. It's simple to fix,
though. 
Where's the ftp address for the code from the articles??? 
David Lesherscl.cwru.edu!wb8fox@uunet.uu.net
 
In the U.S. you can access the code using uunet as a
bridge.  
Host: ftp.uu.net 
Location: /published/sysadmin/1992 
We've been told that other sites are routinely archiving
this directory, but we don't have any addresses. 
In the U.K. you can find the code at 
Host: src.doc.ic.ac.uk 
Location: /published/sysadmin/1992 
I hope this helps. And thanks to David J. Young for
the 
addresses and ftp information. --rlw 
To: saletter@rdpub.comSubject: Subscription
 
Our relationship has gotten off to a bad start. When
I first saw your 
advertisements for Sys Admin, I was excited about the
new magazine. 
I sent in my subscription request. I waited to see the
first issue 
but all I got were several bills saying I must be enjoying
my first 
issue and asking me to send in money. After getting
several such notices 
I called and asked when the first issue was due to be
sent out. I 
was told it already had been sent and you would send
me another right 
away. I got one. The postmark on the envelope was dated
July 1. A 
day or two latter I got a notice postmarked July 2nd
saying: 
"We've cancelled your subscription to Sys Admin.
Our records indicate 
that we have not yet received a subscription payment
from you." 
You are right, I have not yet sent in a payment. I was
not sure you 
even had a magazine to sell. You might give me a few
days to look 
it over before sending such a negative notice. At this
point in time, 
your subscription service seems very questionable. Will
you be able 
to maintain a magazine? If I send you a subscription
payment, will 
the money just disappear into a bit bucket of your bank
account and 
I never see another magazine? Several of my co-workers
are interested 
in my experience before they request subscriptions.
Will service improve? 
Regards,Dana Price
 danap@hpcvnvs.cv.hp.com
 
Please accept my sincerest apologies. I don't blame
you 
a bit. If I were on the receiving end of this sequence,
I'd be miffed 
too. If it makes any difference, you weren't alone --
we sent the 
same inappropriate sequence of letters to several hundred
other subscribers. 
For what it's worth, though, it was never our intent
to 
introduce you to the magazine in this way, and you needn't
worry about 
our disappearing with your money. We've been publishing
technical 
information since 1981 and have been described by one
of our competing 
publishers as "the most ethical publisher"
in the industry. 
This problem is the result of not properly synchronizing
the mailing of this issue with the generation of the
billing sequence. 
Your magazine arrived, it just arrived very late. During
the last 
few weeks, our printer has been moving to a new plant
(they have a 
couple of city blocks worth of plant to move!). Because
they were 
unable to bring a new press on-line as planned, they
wound up seriously 
behind. One of our magazines was jobbed to a sister
plant in another 
state. SA was just delayed by about two weeks.  
Unfortunately we didn't coordinate well enough between
the 
fulfillment and editorial departments. As a result,
the automated 
letter series went out as originally scheduled. In most
cases this 
wouldn't create a great problem, as only one or two
letters would 
arrive before the magazine. Unfortunately, since the
publication is 
mailed third class, the post office may also insert
an additional 
delay that can vary by as much as two to three weeks
from subscriber 
to subscriber.  
The bottom line: feel free to ignore these letters till
you get a magazine. You WILL receive at least one. --rlw 
To: saletter@rdpub.comSubject: Thanks!
 
What a great publication! The staff here really likes
it. Keep up 
the good work! 
Robert K. HarberKansas City Power & Light Co.
 Kansas City, MO
 
uunet!daver!genco!u6060!rkh  
Thanks for the recognition. We'll do our best to keep
earning 
it. --rlw 
To: saletter@rdpub.comSubject: Source listing for July Sys Admin
 
I just downloaded the source listings for the July issue
from ftp.uu.net. 
Two things come to mind. 
1) Consider publishing the internet address for uunet
archives in 
your magazine. Most universities are able to ftp directly
to uunet, 
but many users may not be aware of it. It's not clear
to me whether 
uunet would be fond of having their addr published,
or whether they 
would prefer that folks use the 900 number, but if uunet
is game, 
its sure a lot easier for those with internet ties. 
2) The first source listing I looked at, King Able's
"rts" 
script, has been corrupted. It looks like lines have
been truncated 
at something like 70 char wide. Actually, the lines
aren't truncated, 
but the remainder is tacked on as a new line. Consider
line 11, in 
the comments section. This one is easy to spot, since
it has no # 
in col 1. But then consider line 72, which reads "<$TMP".
This line is actually supposed to be at the end of the
line above 
it, and of course the script itself fouls out pretty
badly if it's 
not fixed. There are several other examples of the same
problem throughout 
the script. For someone like me (hate typing code, don't
mind debugging 
short scripts too much) this is still better than hand-keying
the 
thing from the start. Others may be less charitable... 
Anyway, if you are able to fix the files on uunet, let
me know and 
I'll get the corrected ones. 
By the way, the magazine is great! Both issues I've
seen have had 
very useful things in them. A density of one-useful-item-per-issue
is higher than most any other magazine I receive; yours
has been a 
good deal higher on each one so far. Keep 'em coming! 
Rich Baldwinskeezix.stanford.edu!rich@uunet.uu.net
 
Thanks for the feedback. See the earlier letter for
the 
ftp information. I apologize for the code -- the new
lines do not 
appear in the magazine and since the files on uunet
are copies of 
the files used in the magazine, there seems to be no
rational explanation. 
We've fixed the uunet files now. Thanks for not flaming
over the inconvenience. 
--rlw 
 
 
 |