Kennie Cruz wrote:
List,

Are they any recommended strategy or cook book for hardening a RHEL5 Server
box. I did the usual, limit access to tty's, eliminated unneeded services
and applications and password aging. Your help will be appreciated. Thanks.

password aging?

It's long mystified me why people think this a good idea. If I'm the kind of user who thoughtfully chooses a good password I can remember, and I'm the kind of person who does not disclose it, why force me to change it?

If I'm the kind of person who discloses his password, how does changing it regularly really help?

I can choose a reasonable password with good prospects of remembering it by combining words. How likely are you to guess "bluecucumber?"

If you the administrator allow access to the securely-encrypted value of my password, or you allow unlimited attempts to guess it, then you sir, are an unmitigated twit.

Now if I forget one password in ten (and I reckon that's a good rate of remembering them), and you require me to change the password each month, then the likelihood is that I will forget at least one password in any given year.


Google this:
http://www.google.com/search?num=100&hl=en&c2coff=1&safe=active&client=mozilla&rls=org.mozilla%3Aen-US%3Aunofficial&q=%22best+practice%22+password+Spafford+site%3Aedu&btnG=Search
and be sure to read this wwhich is much quoted elsewhere
http://www.cerias.purdue.edu/weblogs/spaf/general/post-30/



"In summary, forcing periodic password changes given today’s resources is unlikely to significantly reduce the overall threat — unless the password is immediately changed after each use. "
http://h20325.www2.hp.com/blogs/reed/archive/2006/04/23/948.html


http://www.wnj.com/privacy_4-24-2006/
The UK study also found that the more IDs and passwords an employee had to remember, “the more likely the business is to have had unauthorized access” to its data. The study found that on average, users must remember three different user IDs and passwords. “Password overload hurts security, survey finds,” http://news.com.com/Password+overload+hurts+security%2C+survey+finds/2100-7355_3-6064668.html?tag=html.alert

http://blogs.technet.com/steriley/archive/2006/04/30/Security-myths-and-passwords.aspx
Comments

# Dan Halford said on April 30, 2006 6:17 PM:
I have always felt that by requiring regular password changes, site administrators do very little to improve the security of the site. They simply ensure that users pick a succession of equally insecure passwords (xxx1, xxx2, xxx3, etc).

Password frequency is never a substitute for good operational security and user training. It doesn't take much to teach a user the difference between a bad password and a good password, and it's equally simple to convince a user why they should go to the trouble of picking a good one.


As for me, I think that password complexity rules are insane. Here is a password I no longer use: %09bjBWvb How many people can remember such a password? I don't, I just store them all in a file and then keep other out.

I think that if you prevent, say, more than three consecutive failures in a short time (then lock the account for an hour or so[1]), eight in a longer period (and then lock the account until manually unlocked) and keep an eye on accounts with high failure rates, then you don't have much problem with password guessing.

Finger readers, smartcards and so on might be helpful. So is an electronic key to the relevant areas.

[1] and require the user to acknowledge that there have been failures, and inform them when and where they occurred.



--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]
-- Advice
http://webfoot.com/advice/email.top.php
http://www.catb.org/~esr/faqs/smart-questions.html
http://support.microsoft.com/kb/555375

You cannot reply off-list:-)

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to