Educause Security Discussion mailing list archives
Re: Password policy publication
From: "Shalla, Kevin" <kshalla () UIC EDU>
Date: Tue, 28 Oct 2008 11:01:00 -0500
So the systems are not configured to lock an account after a certain number of failed password attempts? Isn't brute force by definition dumb, and it doesn't try just common passwords (and so try billions of passwords)? Or maybe brute-force is smarter now, and first does a dictionary attack, then uses strings containing the username, etc.. But still, isn't it going to try hundreds, if not thousands of passwords? On Tue, October 28, 2008 9:32 am, Roger Safian wrote:
At 09:26 AM 10/28/2008, Shalla, Kevin put fingers to keyboard and wrote:Doesn't this require stealing the password file, so that you can run the brute-force attack? Or are we protecting from sysadmins who already have access to the password file?Not really...I've seen brute force attempts many times in my logs. You just try common passwords, and hope for the best.
Current thread:
- Password policy publication Geoff Nathan (Oct 25)
- <Possible follow-ups>
- Re: Password policy publication Roger Safian (Oct 27)
- Re: Password policy publication Allison Dolan (Oct 27)
- Re: Password policy publication Valdis Kletnieks (Oct 27)
- Re: Password policy publication Shalla, Kevin (Oct 28)
- Re: Password policy publication Adam Nave (Oct 28)
- Re: Password policy publication Roger Safian (Oct 28)
- Re: Password policy publication Shalla, Kevin (Oct 28)
- Re: Password policy publication Valdis Kletnieks (Oct 28)
- Re: Password policy publication Steven Alexander (Oct 28)
- Re: Password policy publication Roger Safian (Oct 28)
- Re: Password policy publication Matthew Gracie (Oct 29)