Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!husc6!ut-sally!bcm!svedberg!rick From: rick@svedberg.bcm.tmc.edu (Richard H. Miller) Newsgroups: comp.unix.wizards Subject: Re: 60-second timeout in Unix login Message-ID: <440@uni2.bcm.tmc.edu> Date: Wed, 25-Nov-87 17:43:03 EST Article-I.D.: uni2.440 Posted: Wed Nov 25 17:43:03 1987 Date-Received: Sun, 29-Nov-87 11:42:56 EST References: <4139@venera.isi.edu> <2167@tut.cis.ohio-state.edu> Sender: usenet@bcm.tmc.edu Lines: 12 Summary: Login Security Another approach to hacker frustration is to pause between prompts for userid and as a user enters an unsuccessful userid/password, double the wait time. Thus as a person attempts to crack you system, it will take longer and longer to have Unix prompt for the userid after a bad guess. This is one of the methods that OS-1100 plans to implement for their B1 security EXEC. Richard H. Miller Email: rick@svedburg.bcm.tmc.edu Head, System Support Voice: (713)799-4511 Baylor College of Medicine US Mail: One Baylor Plaza, 302H Houston, Texas 77030