|   | NIA #52NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
 
 ZDDDDDDDDDDDDDDDDDD? IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM; ZDDDDDDDDDDDDDDDDDD?
 3   Founded By:    3 :  Network Information Access   : 3   Founded By:    3
 3 Guardian Of Time 3D:            12SEP90            :D3 Guardian Of Time 3
 3   Judge Dredd    3 :        Guardian Of Time       : 3   Judge Dredd    3
 @DDDDDDDDBDDDDDDDDDY :            File 52            : @DDDDDDDDDBDDDDDDDDY
 3           HMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM<           3
 3                IMMMMMMMMMMMMMMMMMMMMMMM;              3
 @DDDDDDDDDDDDDDDD6System Security Part 02GDDDDDDDDDDDDDDY
 : Security For The User :
 HMMMMMMMMMMMMMMMMMMMMMMM<
 
 Introduction:
 
 Welcome to Nia's System Security Series Part 02, in this particulare file I will
 be attempting to describe to you Security as it relates to the user and from the
 vantage point of the system operator.
 
 $_Dialups
 
 User Security begins when you FIRST logon to a system.  You are asked for
 your username and a password. Some systems can have more than ONE password.
 
 There are actually Seven different types of Logins:
 
 1) LOCAL
 2) DIALUP
 3) REMOTE
 4) NETWORK
 5) BATCH
 6) DETACHED
 7) SUBPROCESS
 
 Logins are either INTERACTIVE or NONINTERACTIVE.  Interactive logins is a
 login made in a series of steps in which the user provides information.
 Noninteractive logins is a login that the system will perform all the
 functions needed, without any user interaction.
 
 Different types of interactive and noninteractive logins follows:
 
 LOCAL         interactive
 DIALUP        interactive
 REMOTE        interactive
 NETWORK       noninteractive
 BATCH         noninteractive
 DETAHED       depends
 SUBPROCESS    noninteractive
 
 Local login is performed by users from a terminal connected directly to the
 central processor or to a terminal server that communicates directly with the
 central processor.
 
 Dialup Logins are when you log in to a terminal that uses a modem, to make
 your connection to the system.
 
 Remote Logins are when you log in to a node over the network, you request
 that node by entering the DCL command SET HOST.  This login is known as a
 remote login. The node you reach immediately asks you for a user name and
 password.
 
 Network Logins are performed for you when you access files stored in a
 directory on another node or when you initiate some other type of network
 task on a remote node.  When you wish to copy files or messages, you would
 specify the desired node and an optional access control string, where the
 access control string includes your user name and password for the remote
 node.  An example is below:
 
 $DIRECTORY PARIS"CRAND password"::WORK2:[PUBLIC]*.*;*
 
 The above example, user CRAND has an account on remote node PARIS and enters
 the following command to get a directory listing of all the files in the
 [PUBLIC] directory on disk WORK2:
 
 Proxy Logins are very good for security, reason is this, when using Proxy
 Logins, you never enter a password, the system automatically does this for
 you.  Your password is never echoed back to you, and passwords are never
 exchanged between systems.  And finally proxy logins keep all password files
 away from where budding young hackers might be looking, like the root or in
 command files.
 
 Batch Logins are quite usefull for doing things on a VMS system. For
 instance, you could have a program that would activate the payroll program
 after 7:00pm ( and assumeing that you have modified the payroll program ),
 you could set the time to whatever you want, OR suppose you have set up a
 time bomb:
 
 SUBMIT/AFTER=19:00 PAYROLL.COM
 
 When the time comes to be, your user account is logged and a record is
 kepted.  So if modifying programs make sure that you erase all logs and
 such.
 
 Logging in is an important part of the system, for if you can not log in,
 then you can not complete jobs, perform tasks, and such other things.  All
 ports and terminals should be monitored frequently and any problems to be
 noted.  Never assume that something is ok, check all problems, questions and
 refer to the manuals and DEC personal for assistance.
 
 $_Passwords
 
 There are several types of passwords on a VMS system.  Most users need to
 provide a USER PASSWORD when they log in.  Some users also need to provide a
 system password to gain access to a particular terminal before logging in
 with their user password.  Users on systems w/ high security requirements
 need to provide PRIMARY PASSWORDS and SECONDARY PASSWORDS.
 
 When you assign a password VMS operating system applies a ONE-WAY ENCRYPTION
 ALGORITHM to all passwords as it stores them.  Encryption refers to a method
 of encoding in an effort to conceal it.  ONE-WAY ALGORITHMS DO NOT USE A
 KEY.  Thus, if a user obtains the encryption algorithm and the encoded
 password, that user COULD DEDUCE the actual password only by trying all
 possible input values.
 
 So in english it IS possible to create the format of password encryption as the
 VMS system.  Remember this, if you use an Enlish Dictionary format to create
 your password, you will then be able to get the password.  It may take some
 time, but it is possible.  Problem is this, most system managers are either
 trying to get users to use NON-ENGLISH words or use the /GENERATE password
 format which ill generate your password automatically.
 
 System passwords control access to particular terminals and are required at
 the discretion of the security manager.  They are necessary to control
 access to terminals that might be targets for unauthorized use, such as
 dialups and public terminal lines.
 
 Often when an account is set up your first name is used, and from there it
 is up to YOU to change your password, unless your password has the privilege
 of LOCKPWD, which means that you can NOT change your password.
 
 Common passwords are as follows:
 
 Your name
 Name of a family member or loved one
 Name of a pet
 Favorite Automobile
 Name of hometown
 Name of a boat (or YOUR boat)
 Any name associated with work.  Such as company, projects, or groups
 And any other item that bears a strong personal association to you
 
 The above list is the most common that people use.  The problem with a
 person creating a password is that, your mind works in a matter where you
 think you pulled out a word, that to you, is random, but to somone else, it
 suits you just perfectly.  So when creating accounts, you should use the
 /GENERATE command, and that would just about eliminate any chance of a
 password that reminds someone about you.
 
 When creating passwords, you must do the following:
 
 $SET PASSWORD
 Old password:
 New password:
 Verification:
 
 If you do not complete the correct sequence, it will not take, also i fyou
 are under the amount of minimum length for your password the system will
 automatically tell you.
 
 If you want the system to automatically generate passwords, just do the
 following:
 
 $SET PASSWORD/GENERATE=8
 old password:
 
 apsjawpha     aps-jaw-pha
 oorsoult      oor-soult
 guamixexab    gu-a-mix-ex-ab
 impsapoc      imps-a-poc
 ukchafgoy     uk-chaf-goy
 
 Choose a password from this list or press RETURN to get a new list
 New password:
 Verification:
 $
 
 The above, shows only five passwords to choose from, and the system will
 give you the syllable version of the same word to the right.  Most people
 will take the syllable version, 'cause its easier ( meaning if you picked
 oor-soult, your password would be OORSOULT not OOR-SOULT ).
 
 If your password las the flag PWDLIFETIME=30, your password would then
 expire in 30 days from the current date issued.  You will be notified when
 your password is due with the following message:
 
 WARNING -- Your password expires on Thursday 30-SEP-1990 15:00
 
 If your account is set with the /GENERATE=xx, then you will then be
 automatically shown your list of five words to pick from.  If you do not
 have the /GENERATE=xx then you will be prompted for your New Password only.
 
 Make a note, if you are EVER asked to change your pw, do it.  For if you
 loose access to the system, you must get the system manager to restore your
 pw privileges to you.
 
 You are encouraged to add digits to your passwords, for that will increase
 the combinations of letters.  For example:
 
 Six Character password using letters equals out to 300 Million Combinations
 Six Character password using BOTH Letters/Numbers equals out to 2 Billion!
 
 You can have Secondary passwords as well as primary passwords, so if you run
 into one, it will look like this:
 
 NIA .. VMS Version 5.0
 
 Username: Guardian of Time
 Password: xxxxxxxx
 Password: xxxxxxxxxx
 
 If you wish to add to your account a secondary password, do the following
 
 $SET PASSWORD/GENERATE=8/SECONDARY
 
 That will generate a password of eight character length, and it will be the
 secondary password.
 
 It is suggested that with System Accounts, or accounts with full privileges
 that you use a secondary password, and use the /GENERATE=xx Modifier, that
 way, your password would be next to impossible to hack.
 
 Also remember that with two passwords you have about fifteen to thirty
 seconds to enter the password, if not, the system will automatically log you
 off.
 
 Some Password Tips:
 
 Select reasonably long passwords that cannot be easily guessed.  Avoid using
 words in your national language that woule appear in a dictionary.  Consider
 including digits in your passwords.  Alternatively, let the system generate
 passwords for you automatically.
 
 Never write down your password.  You should have it memorized.
 
 Give your password to other users only under special circumstances.  Change
 it immediately after the need for sharing has passed.
 
 Do not include your password in any file, including the body of an
 electronic mail message.
 
 Before you log in to a previously turned ON terminal, invoke the secure
 terminal server feature ( If it is enabled ), with the BREAK key.
 
 Unless you share your password, change it every three to six months.
 DIGITAL worns against sharing passwords ( don't we all? ).  If you share
 your password, change it immediately.
 
 Chage your password immediately if you have any reason to suspect it might
 have been dsicovered.  Report such incidents to your security manager.
 
 Do NOT use the same password for your accounts on multiple systems.  But
 some dummy always will, and they get what they deserve.
 
 $_Account Expiration Times
 
 When your acceount is created, the security manager may decide to specify a
 period of time after which the account will lapse ( for example, if you will
 only need the account for a specific purpose for a limited time).  At
 universities, studen accounts are typically authorized for a single semester
 at a time.  Expired accounts automatically deny logins.
 
 Users receive NO ADVANCE WARNING message prior to the expiration date, so it
 IS important to know in advance what your account duration will be.  The
 account expiration resides in the UAF record, which can be accessed and
 displayed only through the use of the VMS authorize Utility by users with
 the SYSPRV privilege or equivalent -- normally your system or security
 manager.
 
 When your account expires, you receive an authorization failure message at
 your next attempted login.  If you need an extension, follow the procedures
 defined at your site.
 
 $_Break In Detection
 
 VMS is niffty to this regard, the system will automatically ( if enabled ),
 after x Number of Hack Attempts disable that account for a period of time.
 So even IF you got the password, after x number of attempts, the system will
 continue to log you off.
 
 Otherwise the format could look something like this:
 
 Username:NIA
 password:files
 User Authorization Failure
 Username:NIA
 password:text
 User Authorization Failure
 Username:NIA
 password:magazine
 User Authorization Failure
 Username:NIA
 password:textfile          <- Correct Pw, but since it detected 3 Hack Attempts
 User Authorization Failure <- The system will NOT let you on.
 Username:
 
 The time before you could actually log back on, is determined by the
 security manager, and it could be one hour, one minue, two days, three
 weeks, whatever the manager decides.
 
 $_Network Considerations For Security
 
 When switching nodes you have to have an account (unless its public and open
 to whoever ) the following example is loging into another node:
 
 NODE"username password"::disk:[directory]file.typ
 
 The problem with this type of a sequence is that you must type the password
 on the screen, and if anyone happens to be standing by you, they will see
 your password and node and what directory.
 
 Also watch out for placing your string into a command file or any txt or
 message, because if it can be read, it will be.
 
 A proxy login allow users to access files across a network without
 specifying user name or password in an access control string.  This is what
 a proxy login would look like:
 
 $COPY WALNUT::BIONEWS.MEM BIONEWS.MEM
 
 What the above did was contact NODE WALNUT and request BIONEW.MEM and copied
 it back to the orignal system, notice that NO passwords where exchanged
 visably, so you wouldn't have to worry about password stealing.
 
 Also must note that BOTH nodes MUST have a proxy ACCOUNT, if they don't have
 one, then your out cold.
 
 Also remember that you will need to erase the RECALL command, because if you
 do not do so, another user would be able to view all of your previous
 commands.  That is ONLY if you are still CONNECTED to the system.  Once you
 log off, the RECALL counter is erased automatically.  Remember that RECALL
 can "recall" up to twenty previous commands.  If you want to see all of what the
 RECALL has in store, just type RECALL/ALL and it will list the last twenty
 commands and a mischevious person could aquire your passwords that way.
 
 $_Logging Out Of A System
 
 When you leave your terminal/system unlocked or online, someone else could
 walk on in and pick up where you left off, also if you have SYSPRV then that
 person could actually start creating accounts, and you wouldn't know it.  So
 make sure that when you leave your office, LO/FULL and make sure that you
 note the time/date that you where online, shut your system off and lock the
 door on the way out (unless you can't).
 
 At high-security sites, it is common practice to turn off your video
 terminal every time you log out because the logout message reveals a
 currently active user name.  When users log off after a remote login, the
 name of the node they return to after the remote logout is also revealed.
 When a user has accessed multiple accounts remotely over the network, the
 final sequence of logout commands reveals all the nodes and the user names
 that are accessible to the user on each nod, with the exception of the name
 of the furthest node reached.  To those who can recognize the operating
 system from the prompt or a logout message, this will also reveal the
 operating system, and thus that person could deduct if he has sufficient
 programming skills what your system is, and maybe even depending if you
 where careless with your PW, might even be able to hack back onto the
 system.
 
 When logging out of a Hard Copy terminal, make sure that all printouts are
 ripped off and shredded, burned, trashed or whatever your current site
 specifies.
 
 Print outs should NEVER be thrown away, since people trash, they can get it
 easily back out and have a hard copy of what you where doing, what accounts
 that might have been created and passwords that where set up, YOUR passwords
 are not displayed when you enter one, but if you where modifying user
 accounts it is possible to have it on print.
 
 On dial ups, it is possible to log out and the phone line NOT disconnected,
 that is a special flag that must be added to your account, that flag is the
 PERMANENT/HANGUP.  To activate it, you must do the following:
 
 $SET TERMINAL/PERMANENT/HANGUP
 
 You will have to specify your terminal number or name, or port name, that
 way the system will know how to react.
 
 $_Common Commands:
 
 DIRECTORY ( or DIR )
 LO/HANGUP
 MODIFY username/PWDLIFETIME=29-15:00 (29 days, expires at 3:00pm)
 MODIFY username/GENERATE=8
 PERMANENT/HANGUP
 RECALL/ERASE
 SET PASSWORD
 SET PASSWORD/GENERATE=8
 SET PASSWORD/SECONDARY/GENERATE=10
 
 Note that the MODIFY command must be used in the UAF file (User
 Authorization File ).
 
 Guardian Of Time
 Judge Dredd
 Ignorance, Theres No Excuse.
 For questions or comments write to:
 Internet: elisem@nuchat
 Fidonet: 1:106/69.0
 or
 NIA FeedBack
 P.O. Box 299
 Santa Fe, Tx.  77517-0299
 
 [OTHER WORLD BBS]
 
 
 This text smeared across cyberspace by:
 ________________________________________________________
 ||                Junk Culture Hallucination                |
 |                      xe0nsun ration                       ||
 ||Junk Culture|!|1093-686!|002400|!|24hrs Per Midnight||
 ||                                                       |
 ||                     |!|-Creators-|!|                      ||
 ||                Bg: Pydea Koft                      ||
 ||           Remote Bog: Carcinoenic Nam Crse           |
 ||                                                           |
 ||                 |!-Well-oers-|!|                     ||
 ||           Nuker The Liing Ego Willia F. Tel         ||
 ||              Howitzer Explosion Guy, Armitag            ||
 ||               Otat of te Helioscrotums                ||
 ||                                                     ||
 || "Surrealist Manifesto" 'zine i a Junk Cuture Prodution ||
 ||      Officia Dropsite f "One Eight Two" Magazine       |
 ||                                                      |
 ||           "Whos' there?                               ||
 ||           Ah splendid show in the infinite.            |
 ||                                  -- Aragn            ||
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 
 
 
 |   |