From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <7a71a76889be64fd5e79917ef8faafdc@plan9.bell-labs.com> From: presotto@plan9.bell-labs.com To: 9fans@cse.psu.edu Subject: Re: [9fans] possible way to have the secstore on the cpu server MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Date: Sat, 15 Jun 2002 11:32:40 -0400 Topicbox-Message-UUID: ae3002ba-eaca-11e9-9e20-41e7f4b1d025 What I was, and still am worried about, is accidentally letting the secstore files be read. The only thing that protects against a dictionary attack now is the service cutting you off for 5 minutes or so after a small number of failed attempts. Accidents are too easy in an environment that has varied and changing services like a cpu server. It's quite likely that some typo will make the secstore files readable to a bad guy for some window. Anyone that can read them can mount a dictionary attack, all you need guess is the user's password. What's in the secstore files is a uses' crown jewels, so to speak.