Path: utzoo!attcan!uunet!munnari!otc!softway!necisa!boyd
From: boyd@necisa.necisa.oz (Boyd Roberts)
Newsgroups: comp.unix.wizards
Subject: Re: Improving password security
Keywords: password, security, crypt server via RPC
Message-ID: <522@necisa.necisa.oz>
Date: 28 Nov 88 02:34:48 GMT
References: <21670@pbhya.PacBell.COM> <27987@tut.cis.ohio-state.edu> <716@quintus.UUCP> <2220@cuuxb.ATT.COM> <741@quintus.UUCP>
Reply-To: boyd@necisa.necisa.oz (Boyd Roberts)
Organization: NEC Information Systems Australia Pty. Ltd.
Lines: 21

In article <741@quintus.UUCP> ok@quintus.UUCP (Richard A. O'Keefe) writes:
>
>There is no reason why a password server could not be replicated.

So, we'll just re-invent YP, again!?!  No point doing something badly, when
you can get some other mindless jerk to do it _really_ badly.

On another issue, aren't the ``automated password'' camp completely off
the beam?  With that style of password choice there's no point in
cracking the _password_.  Attack would be focused on the password
_generator_ function.  Unless, of course, the generator algorithm is
at least equally difficult to crack.

Enough of this password discussion.


Boyd Roberts			NEC Information Systems Australia

boyd@necisa.necisa.oz

``When the going gets wierd, the weird turn pro...''