Spafford On Security Myths and Passwords 356
An anonymous reader writes "In a recent blog post, Eugene Spafford examines password security along with related issues and myths. In particular, he discusses how policies that may not necessarily make much sense anymore end up being labeled 'best practices,' and then propagated based on their reputation as such."
Password changing (Score:2, Insightful)
You have a more secure system if it's harder to use a password when un-authorized. Especially if the user is an Admin account.
Re:Password changing (Score:5, Insightful)
Re:Password changing (Score:2, Informative)
No 94FE5spd is NOT my password for
Re:Password changing (Score:3, Interesting)
A sentence would be an even better password, because it's easier to remember, has spaces, capitals, and punctuation.
Re:Password changing (Score:2)
Re:Password changing (Score:4, Funny)
Re:Password changing (Score:4, Informative)
that's not entirely true. L0Phtcrack leveraged a brain dead authentication mechanism where in Windows NT using NTLM password. NTLM can be from 1 to 14 characters in length. What happens is the password is spit into two 7 character passwords and using an unsalted hash, concatenated and stored. If the password was under 7 characters a constant was use for the upper 7 characters, so by simply parsing the string you could tell if the password was more or less than 8 characters (which had great performance improvements).
I probably missed some steps in here, but that is essentially it.
Re:Password changing (Score:5, Informative)
Re:Password changing (Score:3, Interesting)
I still don't see why this is a problem. To me if a person is able to get to where the password is written down that means they can have physical access to the machine (unless the computer is somehow locked inside a desk or something, which isn't very practical). With physical access it would be trivial to hook up a key-logger (I believe one of the OSTG sights, thinkgeek maybe, carries them). Or if
Re:Password changing (Score:2)
Then there is another aspect in server environments: Password recovery always requires a reboot or at least a service disruption, so this is very likely to be noticed by people. Entering a password you just found on a stick
Re:Password changing (Score:4, Interesting)
If you're in a place where security is sufficiently tight to have mechanisms to prevent this (ie: Security Guards) then they're likely to be sufficient to cover the little password notes in the top drawer as well as the machine itself.
Re:Password changing (Score:5, Insightful)
Re:Password changing (Score:4, Informative)
And yet, the same could be said for the installation of a USB keylogger if given physical access to the machine. The greater danger with writing the password down, I find, isn't so much unauthorized access as improperly authenticated access. You're not in danger of industrial espionage so much as someone logging in using a coworkers account to do something illegal/immoral. And if that's the case, well, it's the problem of the user who wrote down the password, not the sysadmin.
Re:Password changing (Score:3, Interesting)
the solution is simple! cover your desk in a sea of Post-It notes containing various usernames and passwords, make some of the usernames be accounts with no real password listed on the desk, and check those accounts regularly for attempted logins. it's like personal steganography. if it's too har
Re:Password changing (Score:2, Funny)
Scenario 1:
Worker: What were you doing going through the drawers in my desk for while I was away?
Cracker: Sorry. I was looking for a stapler.
Scenario 2:
Worker: What w
Re:Password changing (Score:2)
Re:Password changing (Score:2)
I remember only one password, let's call it master password. Then I use the following algorithm to derive all passwords I need from it:
$ echo -n "$USER:$DOMAIN:$ITERATION:$MASTERPASS" | openssl ripemd160 -binary | openssl base64 |
USER and DOMAIN are just reminders of where I logged in with which username. ITERATION is a
Re:Password changing (Score:2)
Preview, preview, preview. Anyway, there sould be a final pipe element that reads "< remove all non-alphanumeric characters and truncate the result to 16 chars >"
Re:Password changing (Score:3, Interesting)
Re:Password changing (Score:5, Insightful)
Over time, even a hard password will be memorized by your average user. This password does not somehow become more insecure over time, because, as the article points out, the largest vulnerabilities are not due to the cracking of passwords, but rather human error, ignorance, and/or incompetance. These should decrease with time. The user should become better educated and better able to remember the password, thus less likely to give it out. Only the chance of human error increases slightly (typing password in login box and such). Of the three, this presents the least risk by far of those three, and generally the user is aware of this occurrance and with proper education will know to immediately change their password.
Forcing a user to change password frequently is likely to only cause them to alter one character (likely the last) in the password because committing another secure password to memory is difficult. This causes both usability and security to be comprimised in the same fell swoop. The other option is that they will write the password down or otherwise record it, thus defeating its security. If you've got users with photographic memories who instantly memorize a new hard password every month, you must be the luckiest damn admin in the world.
As the article points out, modern computing and cracking techniques expose vulnerabilities much more quickly, so passwords would have to be changed so frequently as to make a changing password policy useless in many environments anyway.
Caveat:
The opposite is true of Administrator passwords or others which are rarely used. These are generally not committed to memory, and likely documented in some fashion (hopefully they are, or when the admin leaves you're screwed). If they're meant to protect a truly important system, a biometric and/or time sensitive method (such as a synchronized continously changing key generator) should be used in addition to the password. Changing these passwords with some frequency is a good idea, as it forces someone to ensure the validity of the current password (the account is not locked or disabled) as well as provide the aforementioned small measure of protection against cracking.
Please, stop forcing password changes on user accounts. Its a stupid idea. It serves no purpose other than to ensure the latest user password is written down at every desk.
Rant complete.
Re:Password changing (Score:3, Insightful)
I have to disagree.
First of all, again: the most common method for password discovery is directly related to the user. If this was the discover
Re:Password changing (Score:3, Insightful)
I think that idea sucks.
What's the advantage? Crackers find it harder to crack things? Why? Because the password will have expired by the time they crack it? Maybe, maybe not. Unless you rotate passwords every month, at this stage, rotation is useless.
Maybe a better solution would be to make passwords the first line of defense, not the last. Simply assume they will eventually be broken, no matter how many times you rotate and plan accordingly.
For
APG (Score:5, Funny)
I have found that using APG [nursat.kz] is a great way to generate passwords. They are easy to remember since you can pronounce them. For example, I just ran the generation and these are the passwords that popped out. I have found that most users can remember these kinds of passwords.
Re:APG (Score:2)
In OpenVMS you can go set password/generate which combines the generation with normal passwd functionality. When I moved to unix I was surprised that you can't do this as standard.
Re:APG (Score:2)
I've been using VMS for 16 years, and never knew that... Now I must hate you forever.
CompuServe had the best password generation policy, which I still follow:
Thus, I am able to use easily remembered words, but there is enough variation in combinations that guessing and dictionary cracking is well-nigh impossible.
Re:APG (Score:4, Informative)
Distribution of this program in Source Code form is allowed, with or without modification, provided that this licence accompanies every copy of the program. Distribution in binary executable form, where applicable, is permitted only in conjunction with complete corresponding Source Code and build instructions.
Statement of Warranty: the copyright holders warrant that this program, when run on a properly-functioning computer, will perform substantially as indicated by the source code. No other warranty is made in respect of the program. If you are in doubt as to what this program does, you should consult a competent programmer.
This licence is in addition to, and is not to be construed as prejudicing, any statutory rights granted to you under the Law of the Land.
Re:APG (Score:2)
Re:APG (Score:2)
After typing a certain random generated password for a few times, its engraved in your memory, no?
I find myself unable to "pronounce" most of my passwords, but I remember them without much thinking. (It's more remembering how to move my hands over my keyboard as to actually remember what I'm actually typing.)
It's the same with my PIN-codes. I just remember a figure and how to draw it in a certain order. Not the numbers themselves..
Re:APG (Score:3, Insightful)
I think you're absolutely right with this. It would be m
MOD PARENT +5 Funny! (Score:3, Funny)
Heck, I forgot my 4 digit alarm code about 6 months ago... and you want me to remember how to "spell" glid-Tev-Pos-EIGHT???
Re:APG (Score:2)
And for the viewing audience, which one if your root password?
Easy for a Star Trek Fan Maybe... (Score:5, Funny)
Diceware (Score:4, Interesting)
There's also rules on top of that where you can find which character to capitalize and where to add symbols and spaces.
Re:Diceware (Score:3, Interesting)
The problem with that is that *some* systems have slightly stricter rules than others, so you can get partway through Password Change Day with a perfectly good word and then run into a machine where it isn't allowed.
Perhaps the nuttiest part of the policy is that you can't go back and
Re:APG (Score:2, Interesting)
Despite what everyone is saying, these passwords are pronounceable, and for the really important passwords that you use frequenctly, you can memorise them fairly easily.
I currently use completely random character sequence passwords for my main accounts. I keep them written down until I've learnt them (after a week maybe), then destroy the piece of paper. Since the passwords are st
Password change policy (Score:5, Insightful)
We all know that its stupid. People write it down on post it notes etc. But when the luser gets hacked he is going to be gunning for the sysadmin who needs to be able to prove that he is serious about security so that he can put the onus back where it belongs.
Thats just how politics work in a corporate environment. People will cover their arses first, do the sensible thing second.
Re:Password change policy (Score:3, Funny)
I'm afraid that you have never seen a corporate environment; otherwise you wouldn't mention "doing the sensible thing".
Re:Password change policy (Score:2)
Re:Password change policy (Score:2)
This doesn *not* mean you are necessarily reducing the chance of a breakin. What it does mean is that a break-in is going to be more limited in its impact even i
Re:Password change policy (Score:3, Interesting)
One attack he didn't mention... (Score:5, Funny)
Couldn't agree more on some points (Score:4, Insightful)
Monthly change policies. they are simple stupid. If your password is inherently weak, such as your car number, date of birth etc., it will be easy to crack. If you throw a monthly change policy at such people they will change their passwords to simple things. Other option is to educate them to choose good passwords, but that works with half the people. Best solution, let the users not choose a password. Let the machine generate random passwords. Then the user can choose out of those random combinations. At a place where I used to work, the web login system on internal network was set this way. You would click on a button saying, choose new password. Many options would appear and you choose one. If you dont like any of the options you could keep on generating new ones indefinitely. The change policy was that after 1 year you had to get a new password. Perfectly sane and secure. In those random 6 lettered words, sometimes easy to remember combinations would appear, like y1pl3t. Remeber it as yiplet!
If you dont have the benefit of a machine generator and want to specify something remembrable dont be too obvious. For example you have a poodle named fido(If you do I doubt you would be readinganother trick (Score:2)
Re:Couldn't agree more on some points (Score:4, Insightful)
If a user has to generate a password, it is something they can at least possibly remember. If a machine generates it, there is a nearly 100% chance that anyone sneaking into 3 out of 4 offices will be able to access those people's accounts using the password reminder neatly affixed along the margin of the user's monitor.
Besides, 99% of security compromises aren't through guessed passwords anyway. They are through either social engineering (25% of people will give up a password when they receive a call that says "Hi, I'm Fred from the IT department, and I need to verify your account information"; try it if you don't believe me), buffer overflow attacks (l33t h4xx0Rz), or physical security compromises (while latency is terrible, it is difficult to overestimate the bandwidth of a pickup truck filled with backup tapes).
Seems to me that, generally speaking, admins are worried about entirely the wrong problems, and while this may help cover their a**es against being blamed for intrusion a bit, it does little to improve actual security.
Re:Couldn't agree more on some points (Score:2)
Re:Couldn't agree more on some points (Score:2)
Re:Couldn't agree more on some points (Score:4, Funny)
In other news: 87.3% of all surveys are made up on the spot.
Re:Couldn't agree more on some points (Score:3, Informative)
Yup, impossible, there's apparently this belief that hackers have no "1" and "3" on their keyboard so that every I should be written as 1, and every E as 3.
When, like 90% of the passwords are made that way, guess what, it's not harder to guess.
Absolutely true (Score:5, Insightful)
I asked around, and gradually discovered that most of the people I worked with had ended up (after months of dilligently trying to adhere to this policy properly) had begun writing their passwords down at their desks.
Writing. Their. Passwords. Down.
It's like this well intentioned security policy had short-circuited itself and put the company in a position far worse than it had been before the reforms. None of the people involved were bad, in fact, I worked with a fine bunch of people who really cared about security and individually had great ideas for making the company safer, but when they were all implemented simultaneously: Ka-BLAM.
A security policy cannot be a list of best practices, it has to be a designed holistic plan that takes into consideration the very human nature of the people it is protecting.
Re:Absolutely true (Score:2)
The ITS department where I used to work had a similar policy. One time I had to get a file or something from one of the civil engineering teams. The team leader was out but one of his staff knew the algorithm they had decided on for the password. It was something like initials+year+month.
I write passwords down... (Score:4, Funny)
They're not actually *to* the systems they're next to, but it's funny how long some baby cracker-d00d will just sit there and keep fiddling with them, trying to get them to work.
Re:I write passwords down... (Score:3, Interesting)
Maybe honeypots will become a standard security thing. The password will always work but it won't get you anywhere useful.
Re:Absolutely true (Score:2, Insightful)
Writing. Their. Passwords. Down.
It's like this well intentioned security policy had short-circuited itself and put the company in a position far worse than it had been before the reforms.
If the people able to see your password are trustworthy, this is not necessarily only a bad thing. Firstly,
Re:Absolutely true (Score:4, Informative)
The part which should horrify you is the At. Their. Desks. part. If the paper with their password is in their wallet, protected as well as their ~$100 in cash, and especially if it doesn't have other login details on it -- well, some places need more security than that but not all. At that point the paper with the password on it becomes a strange kind of hardware token.
Even the At. Their. Desks. part should be kept in perspective. You should close attack paths on general principles of course but remember that anyone standing at the person's desk has physical access. Physical access gives you a lot of other worries though all of them require more motivation than reading somebody's password does.
Re:Absolutely true (Score:2)
Re:Absolutely true (Score:3, Insightful)
Re:Absolutely true (Score:2)
Password: Bugm3n.+
Reminder: http://www.bugmenot.com/ [bugmenot.com]
Re:Absolutely true (Score:2)
Re:Absolutely true (Score:2)
Yeah, it's obvious you're in their primary demographic.
Advice on passwords (Score:4, Insightful)
Passwords are like toothbrushes; change them every three months and don't share them with your friends.
With that said, I'd like to argue the point made by the article about periodic changing of passwords. He gave the (not so) hypothetical situation of a password being typed in a login box where someone might see it. This actually happened in my high school, and then we had the admin password to every computer in the lab. And had that access until the last of us graduated. While periodic password changing won't protect you from a serious hacker, it will save you lots of grief from more petty mischief, especially if the person who has your password is clever enough to not let you know that he has it.
Re:Advice on passwords (Score:5, Insightful)
Even if that's a real concern, the password shouldn't be typed in where someone can watch your fingers. In a lab, it might be of -slight- risk. In a private office, it basically is zero.
Thus, from this we can deduce that the #1 most serious security hole a company can have is the use of cubicle farms. :-)
No, seriously. It is.
Re:Advice on passwords (Score:2, Funny)
Re:Advice on passwords (Score:2)
Anyway, this is why I make it a point to only connect via ssh anymore. Telnet had lots of those issues (and was usually in the clear anyway).
Re:Advice on passwords (Score:2)
Re:Advice on passwords (Score:5, Insightful)
Yeah, but when is the last time you saw ANY software that actually echoed passwords to the screen? Basic security says that this should never occur. Unless you're really good at reading keystrokes, that isn't a real concern.
The problem lies with badly designed operating system/windowing system software that allow windows to grab focus. No window should be allowed to programmatically, without user intervention, pop to the foreground and get focus (whether it's a pop-up ad or any sort of dialogue). Unfortunately, this happens all the time. Especially windows applications love to pop up messages, dialogues, windows, and all allow you to quickly (without noticing) press OK and continue typing your password in plain sight in the application that just hijacked your focus! XP's "prevent applications from stealing focus" doesn't always work, and never works if an application happens to be spawning in the background (like during startup, which might be a good time to enter a password into putty's pagent for example).. *sigh*
Re:Advice on passwords (Score:5, Funny)
Passwords are like toothbrushes. Don't get too enameled with yours, or it'll cause a dentin security and may even expose your root.
Re:Advice on passwords (Score:2)
Passwords are like toothbrushes; change them every three months and don't share them with your friends.
That is great advice! Your mother works with security I take it?
Re:Advice on passwords (Score:2)
Yeah, saw one such incident too. A slideshow presentation about the library catalog system, before a room full of people. At a certain point in the presentation, the library lady decides to do a small demo of the system, and proceeds to log in to her account. Of course, she accidentally types here password (which has admin privileges...) into the login box, where everybody could see it on the h
Merifs of the one password per site policy (Score:5, Interesting)
My Rule of Thumb (Score:5, Insightful)
"You have to balance security with convenience."
Otherwise people will just circumvent your security by changing their password twice (or 10 times), resulting in the same password they started with, or just write their password down.
Re:My Rule of Thumb (Score:2)
Re:My Rule of Thumb (Score:2)
To get in after hours, you need a photo badge passcard and a pin number.
I also have an individual key to my desk to keep any confidential paper or other physical materials secure plus several different access passwords for different parts of the system (email, login, corporate intranet, other locations), all of which have to be changed periodically.
Without passwords, there would be not
Re:My Rule of Thumb (Score:2)
The technology is available.
The real myth about passwords is that they still make sense. Passwords are dead. Passwords that can hold up to a good cracking program are outside the memory capacity of normal people. (I memorized a 10-word Diceware [diceware.com] passphrase with 129 bits of entropy once, but that only proves I'm abnormal).
Your employer would improve both their security and your convenience by letting you have a hardware login.
Re:My Rule of Thumb (Score:2)
pass PHRASE (Score:4, Insightful)
Just please, NO biometrics.
Re:pass PHRASE (Score:5, Interesting)
> "The quick fox jumps over the lazy brown dog"
Way too long to type.
> D'tart'pp;tfawb?
> Tqfjotlbd
Passphrase-based passwords (take each first leter, caps and semigraphics retained) are a good option.
Thank you! (Score:2)
I have been looking for ways at new password generation for system administration, and that is brilliant. Throw in some l33t speak for number / letter swaps and the suggestion you mentioned is golden.
Re:Thank you! (Score:2)
He's wrong (Score:2)
Re:He's wrong (Score:3, Interesting)
It does buy you a tiny bit, if they are actually trying every combination. Suppose it takes them two months to try every combo and after one month, your password is still unknown. They are now guaranteed to have it within the next month if you do not change it. If you do change it, then there's a 50% probability that yo
Picture Passwords (Score:5, Interesting)
Basically you click a few spots on a random image, and next time you login, you have to pick those same spots again. Forget remembering your password.
Shoulder surfable. (Score:4, Insightful)
Re:Shoulder surfable. (Score:3, Funny)
I used Lotus Notes for a while, and it had a "cool" feature of echoing seemingly-random numbers of heiroglyphics when you typed each character of a password. You never knew if your finger slipped or if you did just type bird-bird-eye-"guy going like this"-bird-ankh-ankh-ankh. Worse then single stars, worse than nothing, really.
Re:Picture Passwords (Score:3, Insightful)
Passwords? (Score:5, Interesting)
But, the problem was that every single hack/intrusion we knew of (either on our machines or lab wide) had nothing to do with password and all to do with users desktops on SSH key management. Everyone wanted symetric keys so they never needed to type a passphrase of password. No one wanted to mess with keeping thier computer updated. So once one computer was violated nearly all in the lab were - even those of us who tried to patch and watch were brought down by what the users demanded. We were really damned when an offsite place (say a university) was weak and a user had symmetric keys installed.
That ended up being a VERY difficult issue to educate on - it's a fairly abstract idea. Very very very few of the people there were unintelligent but few were educated enough in that field to even really understand the issues (no reason why a chemist should understand key management any more than I should know how carbon rings react in some random environment). Password management is pretty obvious, heck many of us even had "secret" clubs in elementary school that did similar stuff. However strong encrypted keys tend to be something different, offering the ease of no password and the security of really strong ones (when done correctly). It take some amount of knowledge to "get it" along with thinking about having the private keys stored in unsafe places.
*shrug* I think that password management (in secure business processes) is becoming much less important. Even hotel reservation systems are mostly moving over to SSH and key management. For logging into your credit card service? SSH key and passphrase is great. For much of business practice, as SSH and similar type things become the standard password management this is MUCH more important. Right now we are horrid in that area of education.
Less articles about password management, if it has not been beat into your head by now you are a lost cause. Lets spend some time on key management and other security issues that are becoming MUCH more useful.
I've (unfortunately) forced this on users before (Score:3, Insightful)
I've mandated rotating passwords before. My thought was that I knew my users shared passwords over time (oh, I need to use your computer for a few minutes, but your screen is locked) so by forcing a change I was hoping that if a person left the company they wouldn't retain access to anyone's accounts. However, the better solution in that case would have been termination for people who shared passwords and/or forcing all users (only about 15-20 in the company) to change passwords everytime someone left.
And of course, there are times in larger companies where I simply got told by those higher up that passwords would be rotated.
Re:I've (unfortunately) forced this on users befor (Score:4, Insightful)
Seriously, what's more important to the company: people logging in as another employeee, or actually having employees with morale!
Who cares if people use the same password. I've worked in a hospital where everyone shares passwords, and in a lab where everyone's password was the same. (Won't say where, but it happens everywhere)
There's nothing worse than a stupid nerdy geek telling people off for following some geekhole paranoid rule that has only minimal risk in real life. Like the telltale at school who takes all the rules literally, without trying to understand their purpose and the spirit behind them.
Re:I've (unfortunately) forced this on users befor (Score:3, Insightful)
It's an issue of trust, not to mention security (why bother with multiple user accounts at all if
Password "best practices" are counter-productive. (Score:3, Informative)
Re:Password "best practices" are counter-productiv (Score:2)
One, the requirement that passwords be exactly 8 characters long. An minimum length specification is fine, but it shouldn't be the same as the maximum.
Further, changing every month is too often. You end up with people having to write them down because they don't have time to get used to any one. I'm all for changing passwords reguarly, but that's waaaaay too often. On average, I think the ideal number of times that you should change a password is
We knew this already. They don't. Won't change. (Score:2)
Security is one of those things that complete ignoramuses believe they understand without benefit of thought or experience. ~Just make it too hard~. Experience says there is simply no reaching these people. I can actually find some sympathy for them: the least whiff of an implication that their existing security pol
Requirements... (Score:5, Funny)
"Your surname name is too short. Surname must be at least 4 characters long."
Passwords + Physical securoty + SE (Score:2, Interesting)
Three unsuccessful attempts and you're locked out (Score:4, Insightful)
In reality, with passwords being case sensitive and people having to remember dozens of passwords for different systems at work and personal web sites, three attempts will end up locking out numerous legitimate users.
Caps lock is on... one failed attempt. You turn off caps lock and enter the password for a different system... another bad attempt. You think your bad attempt was due to a typo, so you re-enter the same password... you're locked out.
With so many people getting locked out, either they become lax with the password-reset procedures, allowing an intruder to take advantage of that. Or they stay strict, which results in numerous users losing hours of productive time.
Give 10 or 20 attempts, dammit.
Re:Three unsuccessful attempts and you're locked o (Score:3, Interesting)
Screw that. Give 500. Give a number so rediculously high that your help desk should practically never have to deal with another "locked account" again, but so stunningly low that a brute-force attack will never succeed. It turns out that these two boundaries are still pretty far apart from one another.
Passwords Suck (Score:3, Funny)
-Esme
Encrypted key exchange (Score:3, Informative)
Unfortunately, these algorithms are all patented.
As far as I can tell, the SRP system infringes on the EKE patent. The fact that Stanford got a patent for SRP means nothing - a patent grant says nothing about infringement of other patents. AT&T probably won't sue anyone using it in an open source project but they will not issue a statement that SRP does not infringe the Bellovin patent, either. Result: commercial users shy away from SRP.
The only widely deployed remote password authentication mechanism which is safe even with weak passwords is "plaintext over SSL" but it relies on PKI which has its own set of problems.
Kerberos tickets are pretty secure because they use machine-generated random keys instead of user-provided passwords. But this whole tower is built on a weak foundation because the initial authentication to the TGT does use the weak user password. If just this part was replaced by EKE all Kerberos services would benefit from increased security.
Microsoft domains use Kerberos. Is there any chance Microsoft would bite the bullet and pay the EKE or SPEKE patent license fees?
Context of article: new Purdue password policy (Score:3, Insightful)
This policy seems to be generally seen as idiotic by students, faculty, and staff. The IT people who talk about it seem to be made to "toe the line," and make up excuses about how this policy went through all the review/administrative processes. Nobody has an explanation for how this policy will be made practical for all the alumni and external accounts which might be accessed only a few times a year.
Many people see this policy as a copout response to the multiple security breaches in the past several years. On multiple occasions the whole university (30K+ studenets, plus faculty/staff) received orders to change passwords immediately because some database was compromised. Rumor had it that one database was storing passwords in plaintext because of incompatibility between hashing mechanisms used by different systems. Rather than take responsibility for and fix their security breaches, they are simply forcing this policy on everyone.
I suspect the author wrote this article largely as a condemnation of this policy.
Here's the link to the Purdue password policy: http://www.itap.purdue.edu/security/procedures/pa
Re:Auto change? (Score:2, Interesting)
Re:Dupe (Score:3, Funny)