[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[COMP.SECURITY.UNIX] ADVICE ON PASSWORD SECURITY GUIDELINES
Date: Wed, 30 Aug 1995 20:55:24 -0700
To: [email protected]
From: [email protected] (Alan Olsen) (by way of Alan Olsen <[email protected]
Subject: [comp.security.unix] Advice on password security guidelines
I found this on alt.humor.best-of.usenet. It seemed like something that
would be appreciated here. (And it is not that far off topic.)
Enjoy!
-----------------------------------------------------------
In alt.humor.best-of-usenet, Artur Pioro <[email protected]>
wrote:
>From: Paul Ashton <[email protected]>
>Newsgroups: comp.security.unix
>Subject: Advice on password security guidelines
>Hi,
>my boss has asked me for comments and improvements on his new password
>security policy. To me, it seems a bit severe. If anyone can offer any
>additional suggestions please do, here goes...
>For immediate issue:
>Password changing guidelines V2.2b
>Due to new security policies, the following guidelines have
>been issued to assist in choosing new passwords. Please follow
>them closely.
>Passwords must conform to at least 21 of the following attributes.
>1. Minimum length 8 characters
>2. Not in any dictionary.
>3. No word or phrase bearing any connection to the holder.
>4. Containing no characters in the ASCII character set.
>5. No characters typeable on a Sun type 5 keyboard
>6. No subset of one character or more must have appeared on
> Usenet news, /dev/mem, rand(3), or the King James bible (version 0.1alpha)
>7. Must be quantum theoretically secure, i.e. must automatically change
> if observed (to protect against net sniffing).
>8. Binary representation must not contain any of the sequences 00 01 10 11,
> commonly known about in hacker circles.
>9. Be provably different from all other passwords on the internet.
>10. Not be representable in any human language or written script.
>11. Colour passwords must use a minimum 32 bit pallette.
>12. Changed prior to every use.
>13. Resistant to revelation under threat of physical violence.
>14. Contain tissue samples of at least 3 vital organs.
>15. Incontravertible by OJ Simpsons lawyers.
>16. Undecodable by virtue of application of 0 way hash function.
>17. Odourless, silent, invisible, tasteless, weightless, shapeless, lacking
> form and inert.
>18. Contain non-linear random S-boxes (without a backdoor).
>19. Self-escrowable to enable authorities to capture kiddie-porn people
> and baddies but not the goodies ("but we'll only decode it with a
> court order, honest").
>20. Not decryptable by exhaustive application of possible one time pads.
>Due to the severity of the restrictions, if the password is entered
>incorrectly 3 times at login time, you will be asked if you would like to
>pick a new one.
>Please add guidelines to the above and adjust the minimum conformation
>requirement, if applicable.
>--
>Moderators accept or reject articles based solely on the criteria posted
>in the Frequently Asked Questions. Article content is the responsibility
>of the submittor. Submit articles to [email protected]. To write
>to the moderators, send mail to [email protected].
| Spam is the Devil's toothpaste! | [email protected] |
|"It's only half a keyserver. I had to split the | Disclaimer: |
|other half with the government man." - Black Art | Ignore the man |
| -- PGP 2.6.2 key available on request -- | behind the keyboard.|
| http://www.teleport.com/~alano | <fnord> |