Path: utzoo!attcan!uunet!munnari!otc!softway!necisa!boyd From: boyd@necisa.necisa.oz (Boyd Roberts) Newsgroups: comp.unix.wizards Subject: Re: Improving password security Keywords: password, security, crypt server via RPC Message-ID: <522@necisa.necisa.oz> Date: 28 Nov 88 02:34:48 GMT References: <21670@pbhya.PacBell.COM> <27987@tut.cis.ohio-state.edu> <716@quintus.UUCP> <2220@cuuxb.ATT.COM> <741@quintus.UUCP> Reply-To: boyd@necisa.necisa.oz (Boyd Roberts) Organization: NEC Information Systems Australia Pty. Ltd. Lines: 21 In article <741@quintus.UUCP> ok@quintus.UUCP (Richard A. O'Keefe) writes: > >There is no reason why a password server could not be replicated. So, we'll just re-invent YP, again!?! No point doing something badly, when you can get some other mindless jerk to do it _really_ badly. On another issue, aren't the ``automated password'' camp completely off the beam? With that style of password choice there's no point in cracking the _password_. Attack would be focused on the password _generator_ function. Unless, of course, the generator algorithm is at least equally difficult to crack. Enough of this password discussion. Boyd Roberts NEC Information Systems Australia boyd@necisa.necisa.oz ``When the going gets wierd, the weird turn pro...''