亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? password

?? unix v7是最后一個廣泛發布的研究型UNIX版本
??
?? 第 1 頁 / 共 2 頁
字號:
.\" tbl mm ^ eqn ^ troff -ms.EQdelim $$.EN.RP....TM 78-1271-5 39199 39199-11.ND April 3, 1978.TLPassword Security:A Case History.OKEncryptionComputing.AU "MH 2C-524" 3878Robert Morris.AU "MH 2C-523" 2394Ken Thompson.AI.MH.ABThis paper describes the history of the design of thepassword security scheme on a remotely accessed time-sharingsystem.The present design was the result of counteringobserved attempts to penetrate the system.The result is a compromise between extreme security andease of use..AE.CS 6 0 6 0 0 4.SHINTRODUCTION.PPPassword security on the.UXtime-sharing system [1] is provided by acollection of programswhose elaborate and strange design is the outgrowth ofmany years of experience with earlier versions.To help develop a secure system, we have had a continuingcompetition to devise new ways toattack the security of the system (the bad guy) and, at the same time, todevise new techniques to resist the new attacks (the good guy).This competition has been in the same vein as thecompetition of long standing between manufacturers of armorplate and those of armor-piercing shells.For this reason, the description that follows willtrace the history of the password system rather than simplypresenting the program in its current state.In this way, the reasons for the design will be made clearer,as the design cannot be understood without alsounderstanding the potential attacks..PPAn underlying goal has been to provide password securityat minimal inconvenience to the users of the system.For example, those who want to run a completely opensystem without passwords, or to have passwords only at theoption of the individual users, are able to do so, whilethose who require all of their users to have passwordsgain a high degree of securityagainst penetration of the system by unauthorizedusers..PPThe password system must be able not only to preventany access to the system by unauthorized users(i.e. prevent them from logging in at all),but it must alsoprevent users who are already logged in from doingthings that they are not authorized to do.The so called ``super-user'' password, for example, is especiallycritical because the super-user has all sorts ofpermissions and has essentially unlimited access toall system resources..PPPassword security is of course only one component ofoverall system security, but it is an essential component.Experience has shown that attempts to penetrateremote-access systems have been astonishinglysophisticated..PPRemote-access systems are peculiarly vulnerable topenetration by outsiders as there are threats at theremote terminal, along the communications link, as wellas at the computer itself.Although the security of a password encryption algorithmis an interesting intellectual and mathematical problem,it is only one tiny facet of a very large problem.In practice, physical security of the computer, communicationssecurity of the communications link, and physical controlof the computer itself loom as far more important issues.Perhaps most important of all is control over the actionsof ex-employees, since they are not under any direct controland they may have intimateknowledge about the system, its resources, andmethods of access.Good system security involves realisticevaluation of the risks not only of deliberateattacks but also of casual unauthorized accessand accidental disclosure..SHPROLOGUE.PPThe UNIX system was first implemented with a password file that containedthe actual passwords of all the users, and for that reasonthe password file had tobe heavily protected against being either read or written.Although historically, this had been the technique usedfor remote-access systems,it was completely unsatisfactory for several reasons..PPThe technique is excessively vulnerable to lapses insecurity.Temporary loss of protection can occur whenthe password file is being edited or otherwise modified.There is no way to prevent the making of copies byprivileged users.Experience with several earlier remote-access systemsshowed that such lapses occur with frightening frequency.Perhaps the most memorable such occasion occurredin the early 60's whena system administrator on the CTSS system at MITwas editing thepassword file and another system administrator was editingthe daily message that is printed on everyone's terminalon login.Due to a software design error, the temporary editor filesof the two users were interchanged and thus, for a time, the passwordfile was printed on every terminal when it was logged in..PPOnce such a lapse in security has been discovered, everyone'spassword must be changed, usually simultaneously, at a considerableadministrative cost.This is not a great matter, butfar more serious is the high probability of such lapsesgoing unnoticed by the system administrators..PPSecurity against unauthorized disclosure of the passwords was,in the last analysis, impossible with this system because,for example, if thecontents of the file system are put on to magnetic tape forbackup, as they must be, then anyone who has physicalaccess to the tapecan read anything on it with no restriction..PPMany programs must get information of various kindsabout the users of the system, and these programs in generalshould have no special permission to read the password file.The information which should have been in the password file actually wasdistributed (or replicated) into a number of files, all ofwhich had to be updated whenever a user was added to ordropped from the system..SHTHE FIRST SCHEME.PPThe obvious solution is to arrange that the passwords notappear in the system at all, and it is not difficult to decidethat this can be done by encrypting each user's password,putting only the encrypted form in the password file, andthrowing away his original password (the one thathe typed in).When the user later tries to log in to the system, the passwordthat he types is encrypted and compared with the encryptedversion in the password file.If the two match, his login attempt is accepted.Such a scheme was first describedin [3, p.91ff.].It also seemed advisable to devisea system in which neither the password file nor thepassword program itself needed to beprotected against being read by anyone..PPAll that was needed to implement these ideaswas to find a means of encryption that was very difficultto invert, even when the encryption programis available.Most of the standard encryption methods used (in the past)for encryption of messages are rather easy to invert.A convenient and rather good encryption program happenedto exist on the system at the time; it simulated theM-209 cipher machine [4]used by the U.S. Army during World War II.It turned out that the M-209 program was usable, but witha given key, the ciphers produced by this program aretrivial to invert.It is a much more difficult matter to find out the keygiven the cleartext input and the enciphered output of the program.Therefore,the password was used not as the text to be encrypted but as thekey, and a constant was encrypted using this key.The encrypted result was entered into the password file..SHATTACKS ON THE FIRST APPROACH.PPSuppose that the bad guy has availablethe text of the password encryption program andthe complete password file.Suppose also that he has substantial computingcapacity at his disposal..PPOne obvious approach to penetrating the passwordmechanism is to attempt to find a general method of invertingthe encryption algorithm.Very possibly this can be done, but fewsuccessful resultshave come to light, despite substantial efforts extendingover a period of more than five years.The results have not proved to be very usefulin penetrating systems..PPAnother approach to penetration is simply to keep tryingpotentialpasswords until one succeeds; this is a general cryptanalyticapproach called.Ikey search..RHuman beings being what they are, there is a strong tendencyfor people to choose relatively short and simple passwords thatthey can remember.Given free choice, most people will choose their passwordsfrom a restricted character set (e.g. all lower-case letters),and will often choose words or names.This human habit makes the key search job a great deal easier..PPThe critical factor involved in key search is the amount oftime needed to encrypt a potential password and to check the resultagainst an entry in the password file.The running time to encrypt one trial password and checkthe result turned out to be approximately 1.25 milliseconds ona PDP-11/70 when the encryption algorithm was recoded formaximum speed.It is takes essentially no more time to test the encryptedtrial password against all the passwords inan entire password file, or for that matter, againstany collection of encrypted passwords, perhaps collectedfrom many installations..PPIf we want to check all passwords of length.In.Rthat consist entirely of lower-case letters, the numberof such passwords is $26 sup n$.If we suppose that the password consists ofprintable characters only, then the number of possible passwordsis somewhat less than $95 sup n$.(The standard system ``character erase'' and ``line kill''characters are, for example, not primecandidates.)We can immediately estimate the running time of a program thatwill test every password of a given length with all of itscharacters chosen from some set of characters.The following table gives estimates of the running timerequired on a PDP-11/70to test all possible character strings of length $n$chosen from various sets of characters: namely, all lower-caseletters, all lower-case letters plus digits,all alphanumeric characters, all 95 printableASCII characters, and finally all 128 ASCII characters..TSccccccccccccnnnnnn.	26 lower-case	36 lower-case letters	62 alphanumeric	95 printable	all 128 ASCIIn	letters	and digits	characters	characters	characters.sp .51	30 msec.	40 msec.	80 msec.	120 msec.	160 msec.2	800 msec.	2 sec.	5 sec.	11 sec.	20 sec.3	22 sec.	58 sec.	5 min.	17 min.	43 min.4	10 min.	35 min.	5 hrs.	28 hrs.	93 hrs.5	4 hrs.	21 hrs.	318 hrs.6	107 hrs..TE.LPOne has to conclude that it is no great matter for someone withaccess to a PDP-11 to test all lower-case alphabetic strings upto length fiveand, given access to the machine for, say, several weekends, to testall such strings up to six characters in length.By using such a program against a collection of actual encryptedpasswords, a substantial fraction of all the passwords will be

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美午夜一区二区三区免费大片| 亚洲视频一区在线| 久久er精品视频| 成人欧美一区二区三区黑人麻豆 | 国产精品一级片| 国产精品不卡在线观看| 337p亚洲精品色噜噜噜| 国产精品911| 日本视频一区二区| 一区二区三区四区在线免费观看| 欧美一区二区二区| 成人免费高清视频在线观看| 亚洲综合色在线| 国产日韩欧美a| 精品国产乱码久久久久久夜甘婷婷| 一本色道久久综合亚洲aⅴ蜜桃| 国产精品综合在线视频| 蜜桃一区二区三区四区| 亚洲一区二区精品3399| 亚洲免费观看高清完整版在线观看| 久久久99久久| 国产亚洲一区二区三区在线观看 | 成人一区二区三区| 国产一区二区三区黄视频| 男人的天堂亚洲一区| 自拍偷自拍亚洲精品播放| 国产精品二区一区二区aⅴ污介绍| 26uuu国产在线精品一区二区| 欧美成人三级在线| 久久久无码精品亚洲日韩按摩| 精品粉嫩超白一线天av| 欧美精品一区二区三区四区| 日韩精品综合一本久道在线视频| 欧美一区二区三区四区在线观看| 欧美色男人天堂| 欧美大片一区二区| 日本一区二区三区国色天香 | 欧日韩精品视频| 91极品视觉盛宴| 国产精品萝li| 亚洲国产色一区| 国产尤物一区二区| 色婷婷国产精品综合在线观看| 欧美精品丝袜中出| 欧美—级在线免费片| 亚洲国产aⅴ天堂久久| 国产精品自在在线| 欧美日韩免费高清一区色橹橹 | 91香蕉国产在线观看软件| 欧美亚洲一区三区| 日本一区二区三区电影| 精久久久久久久久久久| 在线免费观看一区| 精品av综合导航| 日韩电影免费在线看| 99国产精品99久久久久久| 久久久不卡影院| 韩国av一区二区三区| 欧美精品xxxxbbbb| 一区二区三区成人在线视频| 国产精品一级片| 日本一区二区三区四区| 粉嫩aⅴ一区二区三区四区 | 国产精品国产三级国产三级人妇 | 日韩电影一区二区三区四区| 在线视频你懂得一区二区三区| 欧美国产97人人爽人人喊| 国产真实乱对白精彩久久| 精品国产乱码久久| 国产成人免费在线观看不卡| 久久亚洲影视婷婷| 国产原创一区二区| 亚洲国产激情av| 91在线高清观看| 亚洲1区2区3区4区| 欧美岛国在线观看| 懂色av噜噜一区二区三区av| 亚洲电影激情视频网站| 精品国产123| 99久久精品国产一区二区三区| 一区二区三区四区蜜桃| 欧美精品视频www在线观看| 乱中年女人伦av一区二区| 久久久久国色av免费看影院| 日本在线观看不卡视频| 久久麻豆一区二区| 91国内精品野花午夜精品| 麻豆精品国产传媒mv男同 | 精品人伦一区二区色婷婷| 国产**成人网毛片九色 | 亚洲一级在线观看| 久久亚区不卡日本| 91国产福利在线| 国产在线视视频有精品| 亚洲国产美国国产综合一区二区| 精品国产伦理网| 欧美福利视频一区| 91福利视频在线| www.欧美色图| 国产二区国产一区在线观看| 青草国产精品久久久久久| 亚洲成人免费视| 亚洲一级片在线观看| 国产精品不卡一区二区三区| 国产日韩欧美电影| 欧美国产激情一区二区三区蜜月| 精品久久99ma| 日韩免费视频一区二区| 91精品在线观看入口| 欧美美女黄视频| 欧美调教femdomvk| 99久久免费国产| 在线免费观看成人短视频| 成人激情免费网站| av中文一区二区三区| 一本大道久久a久久综合| 国产成人久久精品77777最新版本| 蜜桃视频一区二区| 韩国一区二区视频| 豆国产96在线|亚洲| 色就色 综合激情| 欧美探花视频资源| 久久久亚洲精品一区二区三区| 久久精品人人做| 中文字幕综合网| 免费在线视频一区| 99r国产精品| 日韩三级免费观看| 国产精品久久久一本精品 | 久久爱www久久做| 成人avav在线| 欧美精选午夜久久久乱码6080| 欧美成人bangbros| 亚洲综合另类小说| 99久久综合精品| 欧美裸体bbwbbwbbw| 亚洲国产经典视频| 韩国三级中文字幕hd久久精品| 色一区在线观看| 久久久欧美精品sm网站| 麻豆精品久久精品色综合| 欧美在线不卡视频| 亚洲精选在线视频| 高清不卡在线观看av| 精品国产百合女同互慰| 午夜欧美大尺度福利影院在线看| av午夜精品一区二区三区| 久久久精品tv| 风流少妇一区二区| 久久久久亚洲蜜桃| 国产主播一区二区三区| 91精品国产日韩91久久久久久| 亚洲色大成网站www久久九九| 国产91丝袜在线播放| 国产精品视频一二| 欧美三级电影网| 日本91福利区| 欧美肥妇free| 欧美成人r级一区二区三区| 国产精品丝袜久久久久久app| 一本久久a久久精品亚洲| 久草这里只有精品视频| 日韩电影在线观看网站| 亚洲精品国产无天堂网2021| 久久精品视频一区| 欧洲激情一区二区| 国产一区二区福利视频| 亚洲精品国产一区二区精华液| 欧美猛男gaygay网站| 久久99精品久久久久久动态图| 亚洲国产精品黑人久久久| 欧美这里有精品| 久久99国产精品尤物| 中文字幕视频一区二区三区久| 欧美日韩亚洲综合在线 | 亚洲国产欧美在线| 欧美韩国日本一区| 久久久一区二区三区| 日韩免费看的电影| av中文字幕不卡| 欧洲色大大久久| 日本精品一级二级| 91成人网在线| 欧美日韩一区二区三区在线| 成人精品电影在线观看| 韩国精品免费视频| 欧美aaa在线| 奇米色一区二区三区四区| 一区二区三区色| 亚洲自拍偷拍网站| 亚洲国产乱码最新视频| 亚洲你懂的在线视频| 亚洲视频狠狠干| 亚洲伊人伊色伊影伊综合网| 亚洲资源中文字幕| 日日夜夜免费精品| 久久99精品国产.久久久久久| 国产美女视频一区| 成人综合激情网| 欧美群妇大交群的观看方式|