- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
I once ran across a Linux system on which PAM had been configured for extra password security. Well, actually, that was what the previous admin tried to do, but he botched it up in such a way that the PAM stack would always succeed, so the net result was that no matter what password you typed, you were authenticated as the user you claimed to be.
I'm pretty sure it wasn't deliberate, because:
Admin
So actually this thing made me think a bit about why the policy in place here is bad.
Coming up with the reason was actually rather harder than I expected, for the following reason. The concatenation of username+password is your authentication token. You can think of that concatenation as just a password, where part of your password is public knowledge. So if you say "this system is based on your password only", then all you're doing is taking the username+password combination and making something that was public knowledge into private knowledge. How can that make things less secure?
And when you phrase it like that, the primary answer becomes clear: it's that the the users weren't told about it. Thus they couldn't compensate by choosing a better password.
The secondary answer is a much better password becomes important. Under the username+password scheme, if the attacker picks a random string, that string can match only one specific user, which means that if the passwords are properly salted, the attacker can only test the password of 1 user at a time. Under the password-only scheme, the random string can match any user; if there are n users, that means you need an additional log n bits of entropy for the same overall strength.
Further, if users aren't picking passwords randomly, the situation becomes even worse. For m people who aren't good at choosing strong passwords, a birthday paradox-type problem arises: if any two people pick the same password, one of them finds out and break into the other's account. Under the username+password scheme, the username prefix prevents this situation from arising.
Finally it was possible for the submitter to accidentally break into another account, even he wasn't trying to be an attacker, because he didn't know to choose a stronger password.
So the summary is that a password-only system is not inherently less secure, but it requires its users to take that information into account when creating their password. And, of course, the users can't do that if they aren't informed.
Admin
Good to know my Boys2Men password is safe
Admin
“I guess you could call it could call it fake one-factor authentication? Or half-factor authentication?"
I think it looks more like identification without authentication.
Admin
In India, only ethics is work ethic. That's good and bad.
Admin
Allow me to introduce you to powerschool.
Admin
Homu-homu is my waifu.
Admin
Admin
Admin
Admin
Always assuming, that is, that Nagesh's explicit mention of Ali Baba and the forty thieves wasn't enough of a clue for you to infer what he might be talking about in the context of a magic pass phrase that opens a door. Seemed blindingly obvious to me but I guess YMMV.
Admin
FTFY
Admin
So, err, personal identification number number?
Btw, the other advantage of having a separate username/password is that you can tell that someone is trying to log in as a particular user and can enforce rules like locking out after three failed attempts. Can't do that if you've only got a password. If you're using a two part password where the first part is public knowledge and acts as a username, it's functionally equivalent to a username password system, so what's the point? You only have to provide a single login box?
Admin
I'm not sure I buy this argument, with the caveats I discussed in my post above.
Why? If you keep track of the three attempts on a per-user basis, the attacker can just move on to a different user and get a fresh start. If you track failed logins on a, say, per-IP basis, then you could do that on a password-only system as well.
The only reason that the attacker couldn't just move on (that I can think of and that doesn't also apply to the password-only system) is if the attacker is specifically targeting one account (say, 'admin'); but that's something that you can't even do in the first place with password-only.
(I'm not trying to justify password-only here, just acting as a bit of a devil's advocate.)
Admin
And whose sockpupet are you, dear boy?
Admin
Obviously not yours. This one has brains.
Admin
I'm surprised no one has made a reference to the fact that in WarGames all of the government machines (and the school) had only passwords to enter, no usernames.
Admin
Brains get you no where. Let me give example. In India, first class students become doctors and engineers. Second class students become administrators and control first class students. third class student become "Bhai" and "underworld" and controls second class. but the best part is that failures are controlling the entire country.
That state of affairs will not change till ppl with brains like you stop escape to usa and work for country
Admin
Kookaburra is a fine Hindi surname, isn't it? Do you have gum trees in South Asia as well?
Admin
What are gum trees? We have rubber tree in Kerala the most beautiful place in entire world. Rubber tree you make cut, collect juice and then produce rubber. Lot of people in Kerala engage in rubber business.
Admin
you spelled 'first' wrong moron, try harder...
Admin
you spelled 'frist' wrong moron... try harder...
Admin
This type of "authentication" is one of the most widely-used in the world. Chance are you've used it today, or at least within the last few days. It's called a credit card number.
Admin
You spelt moran wrong. Stop trying so hard.
Admin
WTF? Credit card number has rotating lcd display pin behind card. Pin changes every 24 hours. What backwater country are you posting from?
Admin
Where did you work... ? <smirk>
Admin
Don't bother. It's been tested before.
And as for the fingerprint scanners on notebooks, you'll find dozens of the owner's fingerprints all over the device. People who think biometrics solve all of their security problems have seen too many Bond movies.