If someone has the encrypted key data, they can feed that data anywhere they 
wish. In that case, they can feed it into processing systems that do not 
enforce rate-limiting.  Thus, there is no way to do what Dave Paxton suggests 
in any case.

-Kyle H

On September 5, 2014 12:51:04 PM PST, flgirl799901 <flgirl799...@gmail.com> 
wrote:
>I most certainly did NOT hack into anything. I thank you so much for
>your response, but deplore your rudeness
>
>
>Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone
>
>
>-------- Original message --------
>From: dave paxton <dpax...@me.com> 
>Date:09/05/2014  3:33 PM  (GMT-05:00) 
>To: openssl-users@openssl.org 
>Cc:  
>Subject: Re: Certificate pass phrase brute force... 
>
>That is easy.  Just restrict the number of different passwords per day.
>Any account.  Thus the old school brute force idea passes out the
>window.  Most of what you are looking at it a signing issue.  Basically
>one person does a transaction and the the other person     verifies it.
>They do the DSA and thus they are the same person as they should be. 
>That is the idea anyway.  As far as accounts go that hold those keys
>then you have the few problems.  Did the client get hacked or you?  Who
>can hack the account like our recent icloud picture issue.  All of this
>is lazy programming.  It is really a matter of how certain you are of
>the client and how you want to make sure they are who they are.  No
>biggie.  Dave.
>
>
>On 9/5/2014 1:03 PM, flgirl799901 wrote:
>How do I unsubscribe from all of this?
>
>
>Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone
>
>
>-------- Original message --------
>From: Gregory Sloop <gr...@sloop.net> 
>Date:09/05/2014 1:36 PM (GMT-05:00) 
>To: openssl-users@openssl.org 
>Cc: 
>Subject: Certificate pass phrase brute force... 
>
>General question: 
>
>I've done a number of searches and can't find a lot about the subject.
>[I've searched the list archives too...at least as best I could.]
>
>In several cases, the most obvious being OpenVPN, I use client
>certificates generated by openssl, with a pass-phrase [password]. This
>means that if I ever have someone misplace the certificate, it can't be
>used without the password. [And I have little control about what users
>do with such things - they download and install software they
>shouldn't; They have unknown users use their machines; They get their
>machines/phones/tablets stolen etc.]
>
>However, if someone loses control of the certificate, I need to
>consider the safety of the certificate. [And I have to assume I'll
>never know they lost control of it either.] Assume users are practicing
>reasonable security and it's unlikely an attacker will obtain the
>pass-phrase when they obtain the certificate. [A         hard/bad thing
>to assume, I realize.]
>
>So, I've seen reports of Elcomsoft's tool to attempt ~6K passwords a
>second against a certificate file. Let's assume two orders of magnitude
>better performance for a fairly determined attacker, and we're at 600K
>passwords per second. Three gets us 6M a second.
>
>But even at 6M a sec, a non dictionary guessable pass-phrase of 10
>characters will require ~380 years to break - which isn't too        
>bad, IMO.  [Assume a 52 character set. This obviously gets complicated
>since the pass-phase probably isn't completely         random etc...but
>lets assume a theoretical 52 character random         set.]
>
>But since I can't find any reputable source for this kind of        
>data, I'm questioning the assumptions above.
>
>Can anyone give me some pointers at a reputable attempt at quantifying
>this? [The brute-force-ability and the speed at which it might be
>accomplished.]
>Does anyone have a policy about loss of certificates and        
>regeneration/revocation along with the underlying reasoning they're
>willing to share?
>
>Or, perhaps I completely misunderstand what's going on, and I'd be glad
>to be corrected. [Gently is always nice.]
>
>TIA
>-Greg
>
>
>
>
>
>-- 
>Dave Paxton
>dpax...@me.com
>208 570 9755
>skype: dpaxton

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

Reply via email to