From: Alan McKinnon <alan.mckinnon@gmail.com>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Re: scripted iptables-restore
Date: Mon, 14 Oct 2013 22:45:10 +0200 [thread overview]
Message-ID: <525C57D6.7020408@gmail.com> (raw)
In-Reply-To: <525C36BC.1060602@libertytrek.org>
On 14/10/2013 20:23, Tanstaafl wrote:
> On 2013-10-13 4:07 PM, Martin Vaeth <vaeth@mathematik.uni-wuerzburg.de>
> wrote:
>> Like passwords, these sequences should better not stay the same for
>> too long...
>
> Forced changing of passwords (and I imagine the same can be said for
> port-knocking sequences, which I've never implemented, but am intrigued
> by, although I tend to avoid security-through-obscurity schemes)
> periodically as a way to 'better security' is one of those myths that
> just never seem to go away.
>
> Enforce strong passwords and a policy that no one is to ever write a
> password down and put it in any publicly accessible place, and educate
> users how not to fall for phishing attacks, is the single most effective
> way to keep things secure.
>
> Then only change a password if/when an account is compromised.
Here here. I fully agree, and I have a use case to back you up. Yes,
it's anecdotal and just my use case, but at least it's factual :-)
Access to my backend network is two-factor - ssh keys and decent
passwords. I generate the passwords in code, they have high randomity
but rememberable and I refuse to implement password expiry. People with
sensitive and powerful accounts have enough head smarts to know when to
tell me quietly they need a reset done, and everyone is happy with this.
they don't mind that I see their passwords once in plaintext, as I can
make the password anything I want anytime I want. The user's security
against me comes via the HR department backed up by employment law.
We have pentesters that exhaustively test stuff every few months. I
insist they have full access to my data, supervised by the very trusted
Risk guy, as I want them to find any weakness as opposed to the bad guys
finding them. In 5 years they have cracked one password once out of many
hundreds. One. It's an isolated case and I know how it happened - I
trusted someone and bent one rule once.
Contrast the scheme used by Windows. It uses every one of these "best
practice" tricks inccluding expiring every 30 days, password length,
complexity, special chars etc. With every audit it gets blown wide open,
usually within a few hours. reason: human being are almost uniformly bad
at selecting and maintaining passwords.
I break all the best practice rules and have never have a systemic
compromise in 5 years despite awesome tools weilded by real pros with
clue throwing the book at it. Hmmm.
The other system that does obey best practice gets ripped to pieces with
trivial ease by the same guys. Hmmmmmmmmmmm.
I can pull this off because a) few people dare go up against me and my
facts :-) and b) it's a controlled environment. Obviously this couldn't
work on a public service like say gmail.
>
> This combined with intelligent rate-limiting (with
> notifications/warnings to admins if/when a users account exceeds them)
> is all you need.
>
> In fact I go one step further... I assign passwords, and do not even
> allow users to change them. I have always done this, and we have people
> in this office that have had the same email password (on the same gentoo
> server) for 12+ years.
>
> I know that I'm probably the exception to this rule, and it is more luck
> than anything else, but we have never had an email account hacked (knock
> on wood).
>
> I'm certainly not saying we are immune, but the claim that passwords
> should be forcibly changed for no reason other than the passage of some
> arbitrary amount of time is just plain dumb.
>
--
Alan McKinnon
alan.mckinnon@gmail.com
next prev parent reply other threads:[~2013-10-14 20:45 UTC|newest]
Thread overview: 41+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-10-03 19:27 [gentoo-user] Where to put advanced routing configuration? Grant Edwards
2013-10-03 20:28 ` Kerin Millar
2013-10-04 16:25 ` [gentoo-user] " Grant Edwards
2013-10-04 21:58 ` [gentoo-user] " Michael Orlitzky
2013-10-04 22:33 ` Dragostin Yanev
2013-10-11 7:18 ` [gentoo-user] " Martin Vaeth
2013-10-13 10:08 ` [gentoo-user] scripted iptables-restore (was: Where to put advanced routing configuration?) Martin Vaeth
2013-10-13 14:14 ` [gentoo-user] scripted iptables-restore Michael Orlitzky
2013-10-13 15:19 ` [gentoo-user] " Martin Vaeth
2013-10-13 16:37 ` Michael Orlitzky
2013-10-13 20:07 ` Martin Vaeth
2013-10-13 21:45 ` William Kenworthy
2013-10-14 12:08 ` Martin Vaeth
2013-10-14 13:27 ` William Kenworthy
2013-10-13 22:02 ` Michael Orlitzky
2013-10-14 11:49 ` Martin Vaeth
2013-10-14 14:26 ` Michael Orlitzky
2013-10-14 18:49 ` Martin Vaeth
2013-10-14 19:17 ` Michael Orlitzky
2013-10-14 20:31 ` Alan McKinnon
2013-10-15 1:06 ` Michael Orlitzky
2013-10-14 18:23 ` Tanstaafl
2013-10-14 18:52 ` Martin Vaeth
2013-10-14 19:40 ` Tanstaafl
2013-10-14 20:45 ` Alan McKinnon [this message]
2013-10-16 23:21 ` Walter Dnes
2013-10-17 6:59 ` Alan McKinnon
2013-10-18 2:30 ` Walter Dnes
2013-10-18 4:44 ` Alan McKinnon
2013-10-18 10:23 ` Tanstaafl
2013-10-18 11:19 ` Alan McKinnon
2013-10-18 14:05 ` Tanstaafl
2013-10-18 14:33 ` Alan McKinnon
2013-10-14 5:54 ` [gentoo-user] " Pandu Poluan
2013-10-14 5:57 ` [gentoo-user] scripted iptables-restore (was: Where to put advanced routing configuration?) Pandu Poluan
2013-10-14 11:52 ` [gentoo-user] " Martin Vaeth
2013-10-13 10:26 ` [gentoo-user] Where to put advanced routing configuration? shawn wilson
2013-10-13 13:53 ` Michael Orlitzky
2013-10-13 13:57 ` [gentoo-user] " Martin Vaeth
2013-10-05 21:01 ` [gentoo-user] " thegeezer
2013-10-06 16:16 ` [gentoo-user] " Grant Edwards
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=525C57D6.7020408@gmail.com \
--to=alan.mckinnon@gmail.com \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox