Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!husc6!ut-sally!bcm!svedberg!rick
From: rick@svedberg.bcm.tmc.edu (Richard H. Miller)
Newsgroups: comp.unix.wizards
Subject: Re: 60-second timeout in Unix login
Message-ID: <440@uni2.bcm.tmc.edu>
Date: Wed, 25-Nov-87 17:43:03 EST
Article-I.D.: uni2.440
Posted: Wed Nov 25 17:43:03 1987
Date-Received: Sun, 29-Nov-87 11:42:56 EST
References: <4139@venera.isi.edu> <2167@tut.cis.ohio-state.edu>
Sender: usenet@bcm.tmc.edu
Lines: 12
Summary: Login Security

Another approach to hacker frustration is to pause between prompts for 
userid and as a user enters an unsuccessful userid/password, double the
wait time. Thus as a person attempts to crack you system, it will take 
longer and longer to have Unix prompt for the userid after a bad guess. 
This is one of the methods that OS-1100 plans to implement for their B1
security EXEC.


Richard H. Miller                 Email: rick@svedburg.bcm.tmc.edu
Head, System Support              Voice: (713)799-4511
Baylor College of Medicine        US Mail: One Baylor Plaza, 302H
                                           Houston, Texas 77030