亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? password

?? unix v7是最后一個廣泛發布的研究型UNIX版本
??
?? 第 1 頁 / 共 2 頁
字號:
.\" tbl mm ^ eqn ^ troff -ms.EQdelim $$.EN.RP....TM 78-1271-5 39199 39199-11.ND April 3, 1978.TLPassword Security:A Case History.OKEncryptionComputing.AU "MH 2C-524" 3878Robert Morris.AU "MH 2C-523" 2394Ken Thompson.AI.MH.ABThis paper describes the history of the design of thepassword security scheme on a remotely accessed time-sharingsystem.The present design was the result of counteringobserved attempts to penetrate the system.The result is a compromise between extreme security andease of use..AE.CS 6 0 6 0 0 4.SHINTRODUCTION.PPPassword security on the.UXtime-sharing system [1] is provided by acollection of programswhose elaborate and strange design is the outgrowth ofmany years of experience with earlier versions.To help develop a secure system, we have had a continuingcompetition to devise new ways toattack the security of the system (the bad guy) and, at the same time, todevise new techniques to resist the new attacks (the good guy).This competition has been in the same vein as thecompetition of long standing between manufacturers of armorplate and those of armor-piercing shells.For this reason, the description that follows willtrace the history of the password system rather than simplypresenting the program in its current state.In this way, the reasons for the design will be made clearer,as the design cannot be understood without alsounderstanding the potential attacks..PPAn underlying goal has been to provide password securityat minimal inconvenience to the users of the system.For example, those who want to run a completely opensystem without passwords, or to have passwords only at theoption of the individual users, are able to do so, whilethose who require all of their users to have passwordsgain a high degree of securityagainst penetration of the system by unauthorizedusers..PPThe password system must be able not only to preventany access to the system by unauthorized users(i.e. prevent them from logging in at all),but it must alsoprevent users who are already logged in from doingthings that they are not authorized to do.The so called ``super-user'' password, for example, is especiallycritical because the super-user has all sorts ofpermissions and has essentially unlimited access toall system resources..PPPassword security is of course only one component ofoverall system security, but it is an essential component.Experience has shown that attempts to penetrateremote-access systems have been astonishinglysophisticated..PPRemote-access systems are peculiarly vulnerable topenetration by outsiders as there are threats at theremote terminal, along the communications link, as wellas at the computer itself.Although the security of a password encryption algorithmis an interesting intellectual and mathematical problem,it is only one tiny facet of a very large problem.In practice, physical security of the computer, communicationssecurity of the communications link, and physical controlof the computer itself loom as far more important issues.Perhaps most important of all is control over the actionsof ex-employees, since they are not under any direct controland they may have intimateknowledge about the system, its resources, andmethods of access.Good system security involves realisticevaluation of the risks not only of deliberateattacks but also of casual unauthorized accessand accidental disclosure..SHPROLOGUE.PPThe UNIX system was first implemented with a password file that containedthe actual passwords of all the users, and for that reasonthe password file had tobe heavily protected against being either read or written.Although historically, this had been the technique usedfor remote-access systems,it was completely unsatisfactory for several reasons..PPThe technique is excessively vulnerable to lapses insecurity.Temporary loss of protection can occur whenthe password file is being edited or otherwise modified.There is no way to prevent the making of copies byprivileged users.Experience with several earlier remote-access systemsshowed that such lapses occur with frightening frequency.Perhaps the most memorable such occasion occurredin the early 60's whena system administrator on the CTSS system at MITwas editing thepassword file and another system administrator was editingthe daily message that is printed on everyone's terminalon login.Due to a software design error, the temporary editor filesof the two users were interchanged and thus, for a time, the passwordfile was printed on every terminal when it was logged in..PPOnce such a lapse in security has been discovered, everyone'spassword must be changed, usually simultaneously, at a considerableadministrative cost.This is not a great matter, butfar more serious is the high probability of such lapsesgoing unnoticed by the system administrators..PPSecurity against unauthorized disclosure of the passwords was,in the last analysis, impossible with this system because,for example, if thecontents of the file system are put on to magnetic tape forbackup, as they must be, then anyone who has physicalaccess to the tapecan read anything on it with no restriction..PPMany programs must get information of various kindsabout the users of the system, and these programs in generalshould have no special permission to read the password file.The information which should have been in the password file actually wasdistributed (or replicated) into a number of files, all ofwhich had to be updated whenever a user was added to ordropped from the system..SHTHE FIRST SCHEME.PPThe obvious solution is to arrange that the passwords notappear in the system at all, and it is not difficult to decidethat this can be done by encrypting each user's password,putting only the encrypted form in the password file, andthrowing away his original password (the one thathe typed in).When the user later tries to log in to the system, the passwordthat he types is encrypted and compared with the encryptedversion in the password file.If the two match, his login attempt is accepted.Such a scheme was first describedin [3, p.91ff.].It also seemed advisable to devisea system in which neither the password file nor thepassword program itself needed to beprotected against being read by anyone..PPAll that was needed to implement these ideaswas to find a means of encryption that was very difficultto invert, even when the encryption programis available.Most of the standard encryption methods used (in the past)for encryption of messages are rather easy to invert.A convenient and rather good encryption program happenedto exist on the system at the time; it simulated theM-209 cipher machine [4]used by the U.S. Army during World War II.It turned out that the M-209 program was usable, but witha given key, the ciphers produced by this program aretrivial to invert.It is a much more difficult matter to find out the keygiven the cleartext input and the enciphered output of the program.Therefore,the password was used not as the text to be encrypted but as thekey, and a constant was encrypted using this key.The encrypted result was entered into the password file..SHATTACKS ON THE FIRST APPROACH.PPSuppose that the bad guy has availablethe text of the password encryption program andthe complete password file.Suppose also that he has substantial computingcapacity at his disposal..PPOne obvious approach to penetrating the passwordmechanism is to attempt to find a general method of invertingthe encryption algorithm.Very possibly this can be done, but fewsuccessful resultshave come to light, despite substantial efforts extendingover a period of more than five years.The results have not proved to be very usefulin penetrating systems..PPAnother approach to penetration is simply to keep tryingpotentialpasswords until one succeeds; this is a general cryptanalyticapproach called.Ikey search..RHuman beings being what they are, there is a strong tendencyfor people to choose relatively short and simple passwords thatthey can remember.Given free choice, most people will choose their passwordsfrom a restricted character set (e.g. all lower-case letters),and will often choose words or names.This human habit makes the key search job a great deal easier..PPThe critical factor involved in key search is the amount oftime needed to encrypt a potential password and to check the resultagainst an entry in the password file.The running time to encrypt one trial password and checkthe result turned out to be approximately 1.25 milliseconds ona PDP-11/70 when the encryption algorithm was recoded formaximum speed.It is takes essentially no more time to test the encryptedtrial password against all the passwords inan entire password file, or for that matter, againstany collection of encrypted passwords, perhaps collectedfrom many installations..PPIf we want to check all passwords of length.In.Rthat consist entirely of lower-case letters, the numberof such passwords is $26 sup n$.If we suppose that the password consists ofprintable characters only, then the number of possible passwordsis somewhat less than $95 sup n$.(The standard system ``character erase'' and ``line kill''characters are, for example, not primecandidates.)We can immediately estimate the running time of a program thatwill test every password of a given length with all of itscharacters chosen from some set of characters.The following table gives estimates of the running timerequired on a PDP-11/70to test all possible character strings of length $n$chosen from various sets of characters: namely, all lower-caseletters, all lower-case letters plus digits,all alphanumeric characters, all 95 printableASCII characters, and finally all 128 ASCII characters..TSccccccccccccnnnnnn.	26 lower-case	36 lower-case letters	62 alphanumeric	95 printable	all 128 ASCIIn	letters	and digits	characters	characters	characters.sp .51	30 msec.	40 msec.	80 msec.	120 msec.	160 msec.2	800 msec.	2 sec.	5 sec.	11 sec.	20 sec.3	22 sec.	58 sec.	5 min.	17 min.	43 min.4	10 min.	35 min.	5 hrs.	28 hrs.	93 hrs.5	4 hrs.	21 hrs.	318 hrs.6	107 hrs..TE.LPOne has to conclude that it is no great matter for someone withaccess to a PDP-11 to test all lower-case alphabetic strings upto length fiveand, given access to the machine for, say, several weekends, to testall such strings up to six characters in length.By using such a program against a collection of actual encryptedpasswords, a substantial fraction of all the passwords will be

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲另类在线制服丝袜| 欧美精品高清视频| 国产日韩v精品一区二区| 偷拍日韩校园综合在线| 欧美专区日韩专区| 一区二区三区视频在线看| 91在线观看污| 国产精品视频一二| 不卡影院免费观看| 国产精品美日韩| av中文字幕一区| 久久男人中文字幕资源站| 国产在线精品一区二区三区不卡 | 中文字幕av一区二区三区免费看| 蜜臀av性久久久久av蜜臀妖精| 91精品国产综合久久久蜜臀图片| 亚洲午夜精品网| 色又黄又爽网站www久久| 亚洲理论在线观看| 欧美午夜不卡视频| 日本欧美肥老太交大片| 欧美成va人片在线观看| 精品无码三级在线观看视频| 精品国产一区二区在线观看| 国产综合一区二区| 中文一区二区在线观看| 91日韩一区二区三区| 亚洲五码中文字幕| 精品久久免费看| 国产一区 二区| 日韩一区在线免费观看| 在线观看一区二区视频| 爽好多水快深点欧美视频| 日韩精品一区二区三区四区视频| 九色综合狠狠综合久久| 久久久影视传媒| 91电影在线观看| 久久99久久久欧美国产| 国产精品人人做人人爽人人添 | 日韩影院精彩在线| 久久欧美中文字幕| 96av麻豆蜜桃一区二区| 亚洲一二三四区不卡| 日韩一卡二卡三卡四卡| 高清成人免费视频| 性欧美疯狂xxxxbbbb| 精品久久久久久久久久久久包黑料 | 成人精品鲁一区一区二区| 一区二区三区欧美激情| 欧美xxxxxxxx| 91香蕉视频污| 亚洲电影一区二区| 日韩欧美中文一区| 91色在线porny| 亚洲va国产va欧美va观看| 久久久99精品久久| 欧亚一区二区三区| 国产精品一卡二卡| 香蕉影视欧美成人| 久久综合九色综合久久久精品综合| 成人国产在线观看| 精品一区二区在线观看| 亚洲一区在线看| 欧美国产欧美综合| 日韩欧美在线网站| 欧美亚洲愉拍一区二区| 国产成人免费xxxxxxxx| 日韩综合小视频| 亚洲欧洲国产日韩| 亚洲精品一区二区三区蜜桃下载| 在线观看亚洲专区| 精品一区二区三区的国产在线播放| 国产欧美日韩精品a在线观看| 9191国产精品| 欧美综合欧美视频| 99国产精品99久久久久久| 狠狠v欧美v日韩v亚洲ⅴ| 视频一区二区国产| 亚洲高清免费一级二级三级| 中文字幕亚洲在| 久久精品免费在线观看| 欧美卡1卡2卡| 欧美色精品天天在线观看视频| 粗大黑人巨茎大战欧美成人| 国产一区二区精品久久| 免费看黄色91| 日产精品久久久久久久性色| 夜夜嗨av一区二区三区四季av | 99视频在线精品| 国产成人免费视频精品含羞草妖精 | 久久国产日韩欧美精品| 日韩激情中文字幕| 日韩精品久久久久久| 亚洲妇熟xx妇色黄| 亚洲va韩国va欧美va精品 | 成人性生交大片免费看在线播放| 黄色日韩三级电影| 国产综合色精品一区二区三区| 久久99热99| 国产一区二区久久| 国产乱码精品一区二区三区av| 亚洲成人一区二区在线观看| 一区二区三区波多野结衣在线观看| 亚洲视频网在线直播| 亚洲乱码国产乱码精品精可以看| 亚洲欧美激情视频在线观看一区二区三区| 中文字幕欧美国产| 亚洲特级片在线| 亚洲欧美激情在线| 亚洲高清不卡在线| 久久精品国产亚洲5555| 国产一区在线不卡| thepron国产精品| 91啪亚洲精品| 欧美丰满一区二区免费视频| 日韩欧美一二三四区| 日韩一级黄色片| 欧美一级久久久| 精品女同一区二区| 欧美激情中文不卡| 亚洲主播在线观看| 蜜臀a∨国产成人精品| 国产一区二区三区四区五区入口 | 日韩久久一区二区| 午夜精品久久久久久久久| 日韩av午夜在线观看| 蜜桃视频免费观看一区| 成人午夜短视频| 欧美日韩一区三区四区| 亚洲精品在线三区| 亚洲色图制服诱惑 | 欧美videos大乳护士334| 日本一二三不卡| 午夜精品国产更新| 国产91丝袜在线播放| av中文一区二区三区| 8x8x8国产精品| 亚洲欧洲另类国产综合| 日韩中文字幕区一区有砖一区 | 国产成人亚洲综合a∨婷婷| 在线精品视频一区二区| 精品91自产拍在线观看一区| 亚洲卡通动漫在线| 国产伦精品一区二区三区免费| 97se亚洲国产综合自在线| 日韩久久精品一区| 亚洲一二三四久久| 国产精品一二三区| 欧美少妇bbb| 中文一区二区完整视频在线观看| 亚洲大尺度视频在线观看| 成人一道本在线| 日韩一区二区在线观看视频播放| 玉足女爽爽91| av影院午夜一区| 国产精品久久久久一区| 国产成人精品免费视频网站| 久久亚洲精华国产精华液| 毛片av一区二区| 日韩欧美亚洲国产精品字幕久久久| 亚洲一级二级在线| 欧美日韩一级二级| 亚洲第一二三四区| 制服视频三区第一页精品| 丝袜诱惑亚洲看片| 51精品国自产在线| 蓝色福利精品导航| 久久久www成人免费无遮挡大片| 精品一区二区久久| 久久免费美女视频| 懂色一区二区三区免费观看| 国产三级欧美三级日产三级99 | 99r国产精品| 亚洲精品成人悠悠色影视| 色欧美乱欧美15图片| 亚洲国产精品久久久久婷婷884| 欧美亚洲综合久久| 日韩综合在线视频| 久久麻豆一区二区| 99国产精品久久久久久久久久| 亚洲精品菠萝久久久久久久| 在线一区二区三区做爰视频网站| 依依成人综合视频| 91精品欧美久久久久久动漫 | 午夜精品免费在线| 日韩情涩欧美日韩视频| 国产成人综合精品三级| 综合久久久久综合| 欧美三级韩国三级日本一级| 日本成人在线不卡视频| 2020国产成人综合网| 99re这里只有精品首页| 丝袜国产日韩另类美女| 久久亚洲欧美国产精品乐播| eeuss国产一区二区三区| 亚洲午夜久久久久久久久电影院 | 国产精品久久久久国产精品日日| 一本在线高清不卡dvd| 日韩制服丝袜av| 国产精品久久久久四虎|