亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? password

?? unix v7是最后一個廣泛發布的研究型UNIX版本
??
?? 第 1 頁 / 共 2 頁
字號:
found..PPAnother profitable approach for the bad guy is to use the wordlist from a dictionary or to use a list of names.For example, a large commercial dictionary contains typicallly about250,000 words; these words can be checked in about five minutes.Again, a noticeable fraction of any collection of passwordswill be found.Improvements and extensions will be (and have been) found bya determined bad guy.Some ``good'' things to try are:.IP -The dictionary with the words spelled backwards..IP -A list of first names (best obtained from some mailing list).Last names, street names, and city names also work well..IP -The above with initial upper-case letters..IP -All valid license plate numbers in your state.(This takes about five hours in New Jersey.).IP -Room numbers, social security numbers, telephone numbers, andthe like..PPThe authors have conducted experiments to try to determinetypical users' habits in the choice of passwords when noconstraint is put on their choice.The results were disappointing, except to the bad guy.In a collection of 3,289 passwordsgathered from many users over a long period of time;.IP15 were a single ASCII character;.IP72 were strings of two ASCII characters;.IP464 were strings of three ASCII characters;.IP477 were string of four alphamerics;.IP706 were five letters, all upper-case or all lower-case;.IP605 were six letters, all lower-case..LPAn additional 492 passwords appeared in various availabledictionaries, name lists, and the like.A total of 2,831, or 86% of this sample of passwords fell into one ofthese classes..PPThere was, of course, considerable overlap between thedictionary results and the character string searches.The dictionary search alone, which required only fiveminutes to run, produced about one third of the passwords..PPUsers could be urged (or forced) to use either longer passwordsor passwords chosen from a larger character set, or the systemcould itself choose passwords for the users..SHAN ANECDOTE.PPAn entertaining and instructive example isthe attempt made at one installation to force users to use less predictablepasswords.The users did not choose their own passwords; the system suppliedthem.The supplied passwords were eight characters long and were taken from the character set consisting oflower-case letters and digits.They were generated by a pseudo-random number generatorwith only $2 sup 15$ starting values.The time required to search (again on a PDP-11/70) throughall character strings of length 8 from a 36-characteralphabet is 112 years..PPUnfortunately, only $2 sup 15$ of them need be looked at,because that is the number of possible outputs of the randomnumber generator.The bad guy did, in fact, generate and test each of these stringsand found every one of the system-generated passwords usinga total of only about one minute of machine time..SHIMPROVEMENTS TO THE FIRST APPROACH.NHSlower Encryption.PPObviously, the first algorithm used was far too fast.The announcement of the DES encryption algorithm [2]by the National Bureau of Standardswas timely and fortunate.The DES is, by design, hard to invert, but equally valuableis the fact that it is extremely slow when implemented insoftware.The DES was implemented and used in the following way:The first eight characters of the user's password areused as a key for the DES; then the algorithmis used to encrypt a constant.Although this constant is zero at the moment, it is easilyaccessible and can be made installation-dependent.Then the DES algorithm is iterated 25 times and theresulting 64 bits are repacked to become a string of11 printable characters..NHLess Predictable Passwords.PPThe password entry program was modified so as to urgethe user to use more obscure passwords.If the user enters an alphabetic password (all upper-case orall lower-case) shorter than six characters, or apassword from a larger character set shorter than fivecharacters, then the program asks him to enter alonger password.This further reduces the efficacy of key search..PPThese improvements make it exceedingly difficult to findany individual password.The user is warned of the risks and if he cooperates,he is very safe indeed.On the other hand, he is not prevented from usinghis spouse's name if he wants to..NHSalted Passwords.PPThe key search technique is stilllikely to turn up a few passwords when it is usedon a large collection of passwords, and it seemed wise to make thistask as difficult as possible.To this end, when a password is first entered, the password programobtains a 12-bit random number (by reading the real-time clock)and appends this to the password typed in by the user.The concatenated string is encrypted and both the12-bit random quantity (called the $salt$) and the 64-bitresult of the encryption are entered into the passwordfile..PPWhen the user later logs in to the system, the 12-bitquantity is extracted from the password file and appendedto the typed password.The encrypted result is required, as before, to be the same as theremaining 64 bits in the password file.This modification does not increase the task of findingany individualpassword,starting from scratch,but now the work of testing a given character stringagainst a large collection of encrypted passwords hasbeen multiplied by 4096 ($2 sup 12$).The reason for this is that there are 4096 encryptedversions of each password and one of them has been picked moreor less at random by the system..PPWith this modification,it is likely that the bad guy can spend days of computertime trying to find a password on a system with hundredsof passwords, and find none at all.More important is the fact that it becomes impracticalto prepare an encrypted dictionary in advance.Such an encrypted dictionary could be used to cracknew passwords in milliseconds when they appear..PPThere is a (not inadvertent) side effect of thismodification.It becomes nearly impossible to find out whether aperson with passwords on two or more systems has usedthe same password on all of them,unless you already know that..NHThe Threat of the DES Chip.PPChips to perform the DES encryption are already commerciallyavailable and they are very fast.The use of such a chip speeds up the process of passwordhunting by three orders of magnitude.To avert this possibility, one of the internal tablesof the DES algorithm(in particular, the so-called E-table)is changed in a way that depends on the 12-bit randomnumber.The E-table is inseparably wired into the DES chip,so that the commercial chip cannot be used.Obviously, the bad guy could have his own chip designed andbuilt, but the cost would be unthinkable..NHA Subtle Point.PPTo login successfully on the UNIX system, it is necessaryafter dialing in to type a valid user name, and then thecorrect password for that user name.It is poor design to write the login command in such a way that ittells an interloper when he has typed in a invalid user name.The response to an invalid name should be identical tothat for a valid name..PPWhen the slow encryption algorithm was first implemented,the encryption was done only if the user name was valid,because otherwise there was no encrypted password tocompare with the supplied password.The result was that the response was delayedby about one-half second if the name was valid, but wasimmediate if invalid.The bad guy could find outwhether a particular user name was valid.The routine was modified to do the encryption in eithercase..SHCONCLUSIONS.PPOn the issue of password security, UNIX is probablybetter than most systems.The use of encrypted passwords appears reasonablysecure in the absence of serious attention of expertsin the field..PPIt is also worth some effort to conceal even the encryptedpasswords.Some UNIX systems have instituted what is called an``external security code'' that must be typed whendialing into the system, but before logging in.If this code is changed periodically, then someonewith an old password will likely be prevented fromusing it..PPWhenever any security procedure is instituted that attemptsto deny access to unauthorized persons, it is wise tokeep a record of both successful and unsuccessful attemptsto get at the secured resource.Just as an out-of-hours visitor to a computer center normallymust not only identify himself, but a record is usually also kept ofhis entry.Just so, it is a wise precaution to make and keep a recordof all attempts to log into a remote-access time-sharingsystem, and certainly all unsuccessful attempts..PPBad guys fall on a spectrum whose one end is someone withordinary access to a system and whose goal is to findout a particular password (usually that of the super-user)and, at the other end, someone who wishes to collect asmuch password information as possible from as many systemsas possible.Most of the work reported here serves to frustrate the latter type;our experience indicates that the former type of bad guy neverwas very successful..PPWe recognize that a time-sharing system must operate in ahostile environment.We did not attempt to hide the security aspects of the operatingsystem, thereby playing the customary make-believe game inwhich weaknesses of the system are not discussed no matterhow apparent.Rather we advertised the password algorithm and invited attackin the belief that this approach would minimize future trouble.The approach has been successful..SG MH-1271-RM/KT.SHReferences.IP [1]Ritchie, D.M. and Thompson, K.The UNIX Time-Sharing System..IComm. ACM.B17.R(July 1974),pp. 365-375..IP [2].IProposed Federal Information Processing Data Encryption Standard..RFederal Register (40FR12134), March 17, 1975.IP [3]Wilkes, M. V..ITime-Sharing Computer Systems..RAmerican Elsevier,New York, (1968)..IP [4]U. S. Patent Number 2,089,603.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
在线一区二区三区| 国产精品天干天干在线综合| 国产日韩欧美一区二区三区综合| 最新欧美精品一区二区三区| 美日韩一区二区三区| 色噜噜偷拍精品综合在线| 久久久亚洲高清| 日韩精品乱码免费| 欧美三级乱人伦电影| 中文字幕在线不卡| 国产不卡在线视频| 久久亚洲捆绑美女| 美洲天堂一区二卡三卡四卡视频 | 欧美三级三级三级| 一区二区中文视频| 成人精品免费视频| 亚洲精品一区二区三区精华液| 亚洲电影一级片| 色94色欧美sute亚洲线路二| 国产精品福利电影一区二区三区四区| 黑人精品欧美一区二区蜜桃 | 免费在线看成人av| 欧美老肥妇做.爰bbww| 亚洲激情欧美激情| 色婷婷精品大在线视频 | 精品免费一区二区三区| 亚洲国产婷婷综合在线精品| 色av一区二区| 亚洲一区二区精品久久av| 日本乱人伦一区| 亚洲欧美视频一区| 在线观看日韩电影| 午夜精品久久一牛影视| 欧美区视频在线观看| 日韩中文字幕一区二区三区| 91精品国产麻豆| 狠狠色狠狠色综合系列| 久久亚洲二区三区| 国产91精品久久久久久久网曝门| 国产拍揄自揄精品视频麻豆| 成人av电影在线网| 亚洲视频一区在线| 欧美三级日韩在线| 激情文学综合丁香| 国产欧美精品国产国产专区| 91理论电影在线观看| 亚洲风情在线资源站| 日韩一卡二卡三卡国产欧美| 国产精品一区二区在线播放| 中文字幕中文字幕一区| 欧美午夜影院一区| 蜜臀av一级做a爰片久久| 久久久精品免费观看| 成人免费视频免费观看| 亚洲综合免费观看高清完整版| 91精品免费在线观看| 国产成人免费视| 亚洲最新视频在线观看| 精品卡一卡二卡三卡四在线| 国产成人在线影院| 亚洲综合清纯丝袜自拍| 欧美成人一区二区三区| 91在线丨porny丨国产| 偷窥少妇高潮呻吟av久久免费| 精品日韩一区二区三区免费视频| 成人av网站在线观看| 日韩高清不卡一区二区三区| 日本一区二区三区电影| 欧美三级日韩三级| 成人av网站在线| 免费人成在线不卡| 亚洲精品中文在线观看| 精品国产一区二区三区av性色 | 欧美日韩国产不卡| 国产精品一二三在| 天天综合色天天综合| 国产亚洲一区字幕| 91精品国产免费| 在线免费不卡视频| 不卡的av在线播放| 久久国产尿小便嘘嘘尿| 亚洲图片有声小说| 亚洲日本在线a| 久久亚洲影视婷婷| 欧美一区二区三区在线电影| 色综合色狠狠天天综合色| 国产成人亚洲精品青草天美| 日韩激情av在线| 亚洲精品国产第一综合99久久 | 久久精品国产久精国产| 亚洲人精品午夜| 国产亚洲精品aa午夜观看| 5566中文字幕一区二区电影| 欧美在线小视频| 不卡视频一二三四| 丁香婷婷综合五月| 狠狠色综合播放一区二区| 欧美a级一区二区| 亚洲午夜免费电影| 一区二区三区四区中文字幕| ㊣最新国产の精品bt伙计久久| 久久九九久久九九| 亚洲精品一区二区三区四区高清| 欧美一区二区三区性视频| 欧美日韩国产一级二级| 欧美在线啊v一区| 欧美午夜精品免费| 欧美午夜理伦三级在线观看| 一本大道综合伊人精品热热| 99麻豆久久久国产精品免费| 国产成人久久精品77777最新版本| 激情深爱一区二区| 美国欧美日韩国产在线播放| 日本网站在线观看一区二区三区| 日本免费新一区视频| 青草国产精品久久久久久| 日本亚洲最大的色成网站www| 视频精品一区二区| 蜜臀91精品一区二区三区 | 99国产精品99久久久久久| 成人激情av网| 日本韩国欧美在线| 欧美日韩亚洲综合在线 欧美亚洲特黄一级| 色94色欧美sute亚洲线路一ni | 色天天综合色天天久久| 色88888久久久久久影院野外| 在线观看精品一区| 欧美一区二区三区日韩视频| 日韩精品自拍偷拍| 国产网站一区二区三区| 综合精品久久久| 亚洲va国产天堂va久久en| 日韩av网站免费在线| 国内国产精品久久| va亚洲va日韩不卡在线观看| 91尤物视频在线观看| 欧美卡1卡2卡| 久久婷婷国产综合国色天香| 国产精品白丝在线| 天天影视色香欲综合网老头| 激情图区综合网| 一本一道综合狠狠老| 欧美高清一级片在线| 国产午夜一区二区三区| 夜夜嗨av一区二区三区网页| 美国av一区二区| 91麻豆国产自产在线观看| 欧美一区二区三区在线| 国产精品网站导航| 天天影视涩香欲综合网 | 欧美无砖专区一中文字| 日韩精品一区二区三区四区视频| 国产欧美综合在线观看第十页| 亚洲图片欧美色图| 国产成人免费av在线| 欧美三级中文字幕在线观看| 国产日韩欧美激情| 日韩不卡在线观看日韩不卡视频| 成人午夜在线视频| 日韩一区二区精品在线观看| 亚洲免费电影在线| 国产电影一区二区三区| 91精品国产91热久久久做人人 | 国产精品家庭影院| 久久爱www久久做| 欧美亚男人的天堂| 中文字幕一区二区三中文字幕| 美女视频网站久久| 91国产免费看| 中文字幕亚洲区| 国产一区二区三区黄视频 | 欧美一卡二卡在线| 亚洲人亚洲人成电影网站色| 精东粉嫩av免费一区二区三区| 欧美日韩一区国产| 国产精品美女久久久久久久久| 久久99在线观看| 欧美精品777| 亚洲gay无套男同| 色狠狠av一区二区三区| 国产精品国产馆在线真实露脸| 国产成人自拍网| 久久色在线观看| 国内精品免费**视频| 亚洲精品一区二区三区福利| 人妖欧美一区二区| 3d成人h动漫网站入口| 尤物视频一区二区| 在线精品视频免费观看| 一区二区视频免费在线观看| 97精品久久久午夜一区二区三区| 久久精品亚洲精品国产欧美| 国产露脸91国语对白| 精品久久久久久久人人人人传媒 | 一区在线播放视频| av亚洲精华国产精华精| 国产精品久久久久久久久久久免费看 | 国产欧美一区二区在线| 国产伦精品一区二区三区在线观看| 欧美一区二区观看视频|