on Mon, Dec 08, 2003 at 11:13:07PM +0000, Colin Watson ([EMAIL PROTECTED]) wrote: > On Wed, Dec 03, 2003 at 06:08:54PM -0700, Monique Y. Herman wrote: > > After reading a few more responses, I realize that of course a debian > > developer's machine could get compromised. I guess I just thought they > > were infallible *grin* > > > > Now, the real question is, what exploit was used to get onto that dev's > > machine in the first place? > > My understanding is that the developer's account on the machine in > question had been disused for some time, and that the machine wasn't > very well-maintained. It could have been any one of a dozen local root > exploits that have been known for some time. I think they investigated, > but the results weren't particularly earth-shaking.
Any indication of whether or not this was a local system or a remote
system?
I understand that password reuse was part of the problem -- the
developer's password(s) on the initially compromised box matched
password(s) used on other systems.
I strongly recommend the use of password generation tools such as pwgen,
gpw, or the PalmOS Cryptinfo program, and use of an encrypted archive
for password storage -- again, Cryptinfo, which can be used both on
handheld or via JPilot -- or an encrypted textfile for which Joey Hess
posted a cool vim hack some time back.
I've tested output of pwgen for uniqueness (a measure of strength of the
passwords generated).
One such test:
pwgen 8 100000 | sort | uniq -c | wc -l
...which generates 1 million passwords, and checks to see how many are
unique. I typically see 98.7% using pronounceable passwords, far better
when using fully random ones or longer keys. The pronounceable
passwords are relatively memorable.
Peace.
--
Karsten M. Self <[EMAIL PROTECTED]> http://kmself.home.netcom.com/
What Part of "Gestalt" don't you understand?
"What's so unpleasant about being drunk?"
"You ask a glass of water."
-- HHGTG
pgp00000.pgp
Description: PGP signature

