Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-10 Thread Dale
Mark David Dumlao wrote:
> On Mon, Feb 11, 2019 at 1:00 AM Andrew Savchenko  wrote:
>> On Sun, 10 Feb 2019 10:27:32 -0600 Dale wrote:
>>> My password manager does that already.  The password I was trying to
>>> come up with was the master password which I must easily remember, be
>>> secure and be easy to type.  The other passwords I let the password
>>> manager generate and remember as well.  I don't type those so they can
>>> be anything.
>> The line above is approximately the same how I got one of my master
>> passwords. It is not that hard to remember 30-40 random chars.
>> Just try typing them several hundred times. I'm serious.
> That's one of the problems of secure password generation is that human
> memory is used backwards. Things become encoded permanently in our
> memory after the fact that we've repeated them several times, but most
> password generation utilities require you to have perfect memory
> first, THEN use repetition to enforce it.
>
> Both a managed password / algorithmic approach gets this more
> humanely. You need to first have a reliable way to generate the
> pssword, and if you typie it enough times, your brain will commit it
> to memory.
>
>


My biggest thing was to find a way to come up with it.  Most use some
famous quote or song and then each first letter or something with a few
numbers and symbols thrown in.  Thing is, I don't really have any of
those.  So, what I did, I based it on model numbers of some things I
like.  I threw in a few symbols as well just to make it harder. 

I might add, I used three password strength sites to sort of give me a
idea on strength.  I tried different methods to shorten the thing and
make it easier to type as well.  I actually ended up with a slightly
shorter password but one that the meters said would be harder to crack. 
I might add, the difference was large.  The original was something along
the lines of thousands of years.  The end result that was easier to type
and slightly shorter was millions of years.  I was able to put in more
symbols.  Those things help toughen up a password pretty quick.

What I find so interesting about this, everyone seems to have a slightly
or even very different way of doing this.  Even if a person is reading
this list and taking notes, I wish them luck trying to guess our
passwords.  Given the variety of methods used, I don't see how any tool
could be built that would guess any of our passwords in a short time
frame either.  Now if everyone else would put some effort into this
instead of using "passw0rd" or something as silly as that, the internet
would be a much safer place. 

I also ran up on some sites that discussed passwords that people
commonly used and some are just laughable but so bad one should cry. 
Some people are just plain idiots.  I might add, some sites restrict
passwords in ways that keeps a person from generating a really good
password too.  Some need to get with the current threat models instead
of living in the past when security wasn't such a issue. 

Interesting thread.

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-10 Thread Mark David Dumlao
On Mon, Feb 11, 2019 at 1:00 AM Andrew Savchenko  wrote:
>
> On Sun, 10 Feb 2019 10:27:32 -0600 Dale wrote:
> > My password manager does that already.  The password I was trying to
> > come up with was the master password which I must easily remember, be
> > secure and be easy to type.  The other passwords I let the password
> > manager generate and remember as well.  I don't type those so they can
> > be anything.
>
> The line above is approximately the same how I got one of my master
> passwords. It is not that hard to remember 30-40 random chars.
> Just try typing them several hundred times. I'm serious.

That's one of the problems of secure password generation is that human
memory is used backwards. Things become encoded permanently in our
memory after the fact that we've repeated them several times, but most
password generation utilities require you to have perfect memory
first, THEN use repetition to enforce it.

Both a managed password / algorithmic approach gets this more
humanely. You need to first have a reliable way to generate the
pssword, and if you typie it enough times, your brain will commit it
to memory.



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-10 Thread Andrew Savchenko
On Sun, 10 Feb 2019 10:27:32 -0600 Dale wrote:
> Andrew Savchenko wrote:
> > On Sun, 3 Feb 2019 23:47:35 -0600 Dale wrote:
> >> Howdy,
> >>
> >> Some may recall me mentioning using LastPass to manage my passwords. 
> >> Obviously, it can generate very strong passwords that are different for
> >> each site.  It can also remember them as well which makes things more
> >> secure than using just a few passwords for all sites.  One for things
> >> like financial sites, maybe a less secure one for some site you still
> >> want reasonably secure and a even weaker one for sites you don't care
> >> about hacking, and hackers likely won't either.  I know some people who
> >> do this even today.  Heck, ages ago, I was one of them.  Things change
> >> tho.  Some passwords can be hacked in seconds by a desktop computer,
> >> including my own if I had the software and knowledge to do it. 
> >>
> >> The one thing about most all password managers, they have a master
> >> password.  That one password unlocks the rest.  Trick is, having that
> >> one be a good one that is easy to remember, type on a keyboard and be
> >> secure, virtually unhackable but also unforgettable.  I've had what used
> >> to be a strong password for a while.  Thing is, with today's computing
> >> power, it really isn't anymore.  While no one could just guess it, it
> >> could be cracked/hacked I'm sure.  I need to come up with a new one that
> >> meets the requirements I just mentioned.  Strong, easy to remember, easy
> >> to type but won't forget.  I've read that using maiden names, years of
> >> birth or whole dates of birth, actual names, pet's name, words in a
> >> dictionary and a whole list of other things makes it easier, especially
> >> if you post a lot on social media, for hackers to use against you.  I'm
> >> trying to avoid that sort of thing obviously and have a couple ideas but
> >> am curious as to what method others use, without exposing to much detail
> >> since this is public. 
> >>
> >> How do you, especially those who admin systems that are always being
> >> hacked at, generate strong passwords that meet the above?  I've googled
> >> and found some ideas but if I use the same method, well, how many others
> >> are using that same method, if you know what I mean.  ;-)  Just looking
> >> for ideas. 
> > 1) Install app-admin/apg.
> > 2) apg -a1 -m40
> >
> > Best regards,
> > Andrew Savchenko
> 
> 
> My password manager does that already.  The password I was trying to
> come up with was the master password which I must easily remember, be
> secure and be easy to type.  The other passwords I let the password
> manager generate and remember as well.  I don't type those so they can
> be anything. 

The line above is approximately the same how I got one of my master
passwords. It is not that hard to remember 30-40 random chars.
Just try typing them several hundred times. I'm serious.

> Goes to show tho, there is yet another tool to come up with passwords. 
> lol 
> 
> Dale
> 
> :-)  :-) 
> 
> 


Best regards,
Andrew Savchenko


pgpfLizNmTD_z.pgp
Description: PGP signature


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-10 Thread Dale
Andrew Savchenko wrote:
> On Sun, 3 Feb 2019 23:47:35 -0600 Dale wrote:
>> Howdy,
>>
>> Some may recall me mentioning using LastPass to manage my passwords. 
>> Obviously, it can generate very strong passwords that are different for
>> each site.  It can also remember them as well which makes things more
>> secure than using just a few passwords for all sites.  One for things
>> like financial sites, maybe a less secure one for some site you still
>> want reasonably secure and a even weaker one for sites you don't care
>> about hacking, and hackers likely won't either.  I know some people who
>> do this even today.  Heck, ages ago, I was one of them.  Things change
>> tho.  Some passwords can be hacked in seconds by a desktop computer,
>> including my own if I had the software and knowledge to do it. 
>>
>> The one thing about most all password managers, they have a master
>> password.  That one password unlocks the rest.  Trick is, having that
>> one be a good one that is easy to remember, type on a keyboard and be
>> secure, virtually unhackable but also unforgettable.  I've had what used
>> to be a strong password for a while.  Thing is, with today's computing
>> power, it really isn't anymore.  While no one could just guess it, it
>> could be cracked/hacked I'm sure.  I need to come up with a new one that
>> meets the requirements I just mentioned.  Strong, easy to remember, easy
>> to type but won't forget.  I've read that using maiden names, years of
>> birth or whole dates of birth, actual names, pet's name, words in a
>> dictionary and a whole list of other things makes it easier, especially
>> if you post a lot on social media, for hackers to use against you.  I'm
>> trying to avoid that sort of thing obviously and have a couple ideas but
>> am curious as to what method others use, without exposing to much detail
>> since this is public. 
>>
>> How do you, especially those who admin systems that are always being
>> hacked at, generate strong passwords that meet the above?  I've googled
>> and found some ideas but if I use the same method, well, how many others
>> are using that same method, if you know what I mean.  ;-)  Just looking
>> for ideas. 
> 1) Install app-admin/apg.
> 2) apg -a1 -m40
>
> Best regards,
> Andrew Savchenko


My password manager does that already.  The password I was trying to
come up with was the master password which I must easily remember, be
secure and be easy to type.  The other passwords I let the password
manager generate and remember as well.  I don't type those so they can
be anything. 

Goes to show tho, there is yet another tool to come up with passwords. 
lol 

Dale

:-)  :-) 




Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-10 Thread Andrew Savchenko
On Sun, 3 Feb 2019 23:47:35 -0600 Dale wrote:
> Howdy,
> 
> Some may recall me mentioning using LastPass to manage my passwords. 
> Obviously, it can generate very strong passwords that are different for
> each site.  It can also remember them as well which makes things more
> secure than using just a few passwords for all sites.  One for things
> like financial sites, maybe a less secure one for some site you still
> want reasonably secure and a even weaker one for sites you don't care
> about hacking, and hackers likely won't either.  I know some people who
> do this even today.  Heck, ages ago, I was one of them.  Things change
> tho.  Some passwords can be hacked in seconds by a desktop computer,
> including my own if I had the software and knowledge to do it. 
> 
> The one thing about most all password managers, they have a master
> password.  That one password unlocks the rest.  Trick is, having that
> one be a good one that is easy to remember, type on a keyboard and be
> secure, virtually unhackable but also unforgettable.  I've had what used
> to be a strong password for a while.  Thing is, with today's computing
> power, it really isn't anymore.  While no one could just guess it, it
> could be cracked/hacked I'm sure.  I need to come up with a new one that
> meets the requirements I just mentioned.  Strong, easy to remember, easy
> to type but won't forget.  I've read that using maiden names, years of
> birth or whole dates of birth, actual names, pet's name, words in a
> dictionary and a whole list of other things makes it easier, especially
> if you post a lot on social media, for hackers to use against you.  I'm
> trying to avoid that sort of thing obviously and have a couple ideas but
> am curious as to what method others use, without exposing to much detail
> since this is public. 
> 
> How do you, especially those who admin systems that are always being
> hacked at, generate strong passwords that meet the above?  I've googled
> and found some ideas but if I use the same method, well, how many others
> are using that same method, if you know what I mean.  ;-)  Just looking
> for ideas. 

1) Install app-admin/apg.
2) apg -a1 -m40

Best regards,
Andrew Savchenko


pgp562ZjmGipO.pgp
Description: PGP signature


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Tanstaafl wrote:
> On 2/4/2019, 8:10:57 PM, Dale  wrote:
>> Tanstaafl wrote:
>>> I've been using a little Firefox Addon called Passwordmaker for many,
>>> many years, and despite all of its warts, I've been loathe to give it
>>> up, even though it will never be upgraded to work as a WebExtension.
>>>
>>> 2 things I loved about it -
>>>
>>>  a) it doesn't save the password locally, only info about the
>>> site/account, and
>>>  b) you can use an unlimited number of Master Passwords
>>>
>>> I'm looking at migrating to KeePassXC, and even though I really hate the
>>> idea of saving the actual password - Passwordmaker simply generates the
>>> password on the fly each time based on certain specified criteria (ie,
>>> the site URL, username, password length, etc for each account - one
>>> technique I adopted shortly after assisting in updating the
>>> Passwordmaker website eases my mind about it...
>>>
>>> This is a simple technique I strongly recommend that everyone employ,
>>> especially if you use a Password manager (like LastPass or KeePass)...
>>>
>>> It is uncrackable (well, as long as it isn't the CIA or NSA that wants
>>> to crack it and they are willing to kidnap/torture you to do so).
>>>
>>> You sit down and come up with a ... call it a 'password modification
>>> protocol' ... whereby, you always modify your generated/stored password
>>> in a specific way before pressing enter.
>>>
>>> For example, you delete characters 3, 5 and 7, then add 2 characters to
>>> the beginning and 2 to the end.
>>>
>>> It is very simple, and negates worrying about someone stealing your
>>> password vault.
>> I tried to find it just to see how it works but it isn't listed.
> What... Passwordmaker (the old one I still use and why I keep an old
> Firefox 56 portable version around)?


I'm on the newer version of Firefox so it doesn't show up in my search
since it isn't compatible.  I'm pretty sure that is why it doesn't show
up for me.  If I were on the older version of Firefox, then it would
show up.  I was wanting to look at it tho.  I did find a Pro version
which is likely the same thing but for the newer versions of Firefox. 
Did you see it?  It is here:

https://addons.mozilla.org/en-US/firefox/addon/firefox-passwordmaker-pro/?src=search

I see another version as well but with very few users.  Still, if the
above is just a version for the newer Firefox, you may not have to
switch or can use both somehow.  Some other add-ons I use did similar
things.  Since some required a complete rewrite, they also changed the
name a bit too.  Thing is, some of the new versions of add-ons don't
show up in older versions of Firefox.  If you didn't see this, I hope it
helps.


>> From what you wrote, you may want to at least check into LastPass.
> I did a massive amount of research (including LastPass), and settled on
> KeePassXC for a good reason.

I've read where people use that and like it.  It just depends on what
you are looking for and expect from the tool.  If it meets your needs,
then it is a good fit for you.  I picked LastPass since it did what I
need and then some plus is free.  I also had the privilege of emailing
back and forth with one of the original owners or creators way back
then.  His name is Joe Siegrist.  My bank and credit card sites wouldn't
work at first.  I gave him a link and he made some changes so that the
next version would fill those sites.  I may switch one day, may even
switch to what you are using, but at the moment, LastPass seems to be
doing well. 


>> Still, I'm sure there is a tool that will suite your needs.
> ? Its like you didn't really read my email. I already said, I'm
> migrating to KeePassXC. But my complaint is, nothing works like
> Passwordmaker (again, it doesn't store passwords, can only use one
> Master Password).
>
>> I'm not sure I understand what you mean password modification protocol. 
>> It sounds like you change your master password each time you use it.
> No, I'm talking about the saved (or in Passwordmakers case, generated)
> password, not the Master Password.
>
> Doing this with the Master Password wouldn't make any sense.
>

If I understand you correctly, I think I have seen a site that allows
that sort of thing.  I think.  To be honest, this is why I like tools. 
I tend to let tools do the heavy lifting.  My biggest responsibility is
having a good master password.  That's what started this.  I want a good
one.  ;-)  Most of the sites I use are email or ID plus password.  A
couple have this picture and phrase thing between login and password
tho.  There is also a couple that uses that secret question thing.  Some
of those are plain annoying tho.  lol

Given how things are nowadays, I suspect we will always be in a constant
race to try and stay ahead of hackers and such.  Every time we change to
try and beat them, they will find new tools, faster hardware etc to beat
us.  The biggest thing, our tools or us have to keep up.  I really need
to keep up with the newer stuff 

Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Tanstaafl
On 2/4/2019, 8:10:57 PM, Dale  wrote:
> Tanstaafl wrote:
>> I've been using a little Firefox Addon called Passwordmaker for many,
>> many years, and despite all of its warts, I've been loathe to give it
>> up, even though it will never be upgraded to work as a WebExtension.
>>
>> 2 things I loved about it -
>>
>>  a) it doesn't save the password locally, only info about the
>> site/account, and
>>  b) you can use an unlimited number of Master Passwords
>>
>> I'm looking at migrating to KeePassXC, and even though I really hate the
>> idea of saving the actual password - Passwordmaker simply generates the
>> password on the fly each time based on certain specified criteria (ie,
>> the site URL, username, password length, etc for each account - one
>> technique I adopted shortly after assisting in updating the
>> Passwordmaker website eases my mind about it...
>>
>> This is a simple technique I strongly recommend that everyone employ,
>> especially if you use a Password manager (like LastPass or KeePass)...
>>
>> It is uncrackable (well, as long as it isn't the CIA or NSA that wants
>> to crack it and they are willing to kidnap/torture you to do so).
>>
>> You sit down and come up with a ... call it a 'password modification
>> protocol' ... whereby, you always modify your generated/stored password
>> in a specific way before pressing enter.
>>
>> For example, you delete characters 3, 5 and 7, then add 2 characters to
>> the beginning and 2 to the end.
>>
>> It is very simple, and negates worrying about someone stealing your
>> password vault.

> I tried to find it just to see how it works but it isn't listed.

What... Passwordmaker (the old one I still use and why I keep an old
Firefox 56 portable version around)?

> From what you wrote, you may want to at least check into LastPass.

I did a massive amount of research (including LastPass), and settled on
KeePassXC for a good reason.

> Still, I'm sure there is a tool that will suite your needs.

? Its like you didn't really read my email. I already said, I'm
migrating to KeePassXC. But my complaint is, nothing works like
Passwordmaker (again, it doesn't store passwords, can only use one
Master Password).

> I'm not sure I understand what you mean password modification protocol. 
> It sounds like you change your master password each time you use it.

No, I'm talking about the saved (or in Passwordmakers case, generated)
password, not the Master Password.

Doing this with the Master Password wouldn't make any sense.



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Mick wrote:
> On Tuesday, 5 February 2019 10:13:44 GMT Dale wrote:
>
>> After seeing your reply, I realize I just type the command and it
>> prompts me for a password.  I ctrl c to exit.  Well, ain't that
>> something?  You can stop laughing now.  ;-) 
>>
>> It seems to think helloworld and reallysecurepassword is OK.  I have to
>> question just how good this tool is at this point.  
> Quite!
>
> I think the cracklib acceptance parameters are not as strict as they could 
> have been for modern computing, but I don't know how to tweak them.  With 
> johntheripper you have many options to tweak the characters tested, length, 
> etc. when checking a password.
>
> PS.  I wasn't laughing at you, I was laughing at the passwords cracklib 
> thought were OK.

I'm emerging john* or at least it's thinking on it. 

I was talking about you laughing at my comment about the idiot in the
chair who was using the command wrong.  I have to admit, I was laughing
at myself over here.  lol  I might add, I did try to get a man page or
-h to help but it didn't. 

I've got my password down to something I can remember and isn't to bad
to type.  The password strength meter thingys, while not perfect either,
do say it is a strong one.  My looking at it says it is strong too.  I
just can't imagine anyone guessing it.  It's so random and such that I
think it would be very difficult to crack.  Even if one could, it would
take a fairly long time even with some pretty fast puters.  It may not
be NSA proof either but I suspect it would take even them a while. 
Still, I'd like to test this thing really well if I can find a tool that
can really do it properly.  We already know the meter sites aren't
trustworthy.  It seems cracklib isn't quite there either.  Moving on. 

Thanks for the help.  By the time I get around to using this thing, it
may be easy to crack with some laser type puter or something. 

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Mick
On Tuesday, 5 February 2019 10:13:44 GMT Dale wrote:

> After seeing your reply, I realize I just type the command and it
> prompts me for a password.  I ctrl c to exit.  Well, ain't that
> something?  You can stop laughing now.  ;-) 
> 
> It seems to think helloworld and reallysecurepassword is OK.  I have to
> question just how good this tool is at this point.  

Quite!

I think the cracklib acceptance parameters are not as strict as they could 
have been for modern computing, but I don't know how to tweak them.  With 
johntheripper you have many options to tweak the characters tested, length, 
etc. when checking a password.

PS.  I wasn't laughing at you, I was laughing at the passwords cracklib 
thought were OK.
-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Michael Schwartzkopff wrote:
> Am 05.02.19 um 10:55 schrieb Mick:
>> On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:
>>
>>> Sort of picking a random message to reply to here.  Someone sent a reply
>>> off list about checking passwords on my system with tools available.
>>> They also mentioned not trusting strength meters which I can get since
>>> they pass some obvious passwords.  I used three meters and some sort of
>>> common sense as well.  I found cracklib-check after some digging.  I
>>> used that to try to check my password and get this weird response. 
>>>
>>> -su: me-supper-secret-password-here;): event not found
>>>
>>> I'm going to try to emulate my password without actually posting it, for
>>> obvious reasons.  You all are smart enough to understand why.  ROFL  It
>>> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
>>> tell, I use some of those things on the tops of the number keys.  It
>>> seems that confuses cracklib just a bit.  BTW, I was running that as
>>> root just to be sure it wasn't a permissions issue.  I tried a few
>>> different things but it seems the "!" is triggering that at least, maybe
>>> others too.  The command works fine with just normal stuff.
>> Hmm ... I don't get such problem here, when I run cracklib as a plain user:
>>
>> $ cracklib-check
>> password
>> password: it is based on a dictionary word
>> p4ssw0rd
>> p4ssw0rd: it is based on a dictionary word
>> p477w0rd
>> p477w0rd: OK
>> !sdER*ark4567#
>> !sdER*ark4567#: OK
>> helloworld
>> helloworld: OK
>> reallysecurepassword
>> reallysecurepassword: OK
>>
>> LOL!
>>
>> Could it be something to do with your terminal/shell?  I've run the above 
>> with 
>> bash in a urxvt terminal.
>>
>>
>>> That leads
>>> me to this question.  Is there a tool I can use/install that will test a
>>> password, try to crack it if you will, that will work regardless of the
>>> characters used?  In other words, it doesn't mind the things on top of
>>> the number keys. 
>>>
>>> BTW, I've also whittled it down to something a little easier to type
>>> too.  Feel sorry for any poor fool trying to just guess it.  lol  May
>>> have better luck with P vs NP.  ;-)
>>>
>>> Thanks.
>>>
>>> Dale
>>>
>>> :-)  :-) 
>> I've used app-crypt/johntheripper in the distant past, but you'll need a 
>> good 
>> word list for it to be useful.  Some of the wordlists I had found at the 
>> time 
>> were too big to download over dial-up!  :p
>>
> A good password also has to be memorizable. See:
>
> https://xkcd.com/936/
>
>
> Mit freundlichen Grüßen,
>


That's the problem.  I want one really good password that would be
virtually impossible even for someone who knows me to guess.  Doing that
and being able to remember it plus be relatively easy to remember
complicates things a lot.  While at it, I'd like it to be hard to crack
as well.  Even with these password test tools, that is proving to be
hard to know for sure.  I have one that I know would be hard to guess
and I think it would be hard to crack as well but I don't know that last
part for sure, yet anyway. 

Thanks.  It's a work in progress still. 

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Mick wrote:
> On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:
>
>> Sort of picking a random message to reply to here.  Someone sent a reply
>> off list about checking passwords on my system with tools available.
>> They also mentioned not trusting strength meters which I can get since
>> they pass some obvious passwords.  I used three meters and some sort of
>> common sense as well.  I found cracklib-check after some digging.  I
>> used that to try to check my password and get this weird response. 
>>
>> -su: me-supper-secret-password-here;): event not found
>>
>> I'm going to try to emulate my password without actually posting it, for
>> obvious reasons.  You all are smart enough to understand why.  ROFL  It
>> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
>> tell, I use some of those things on the tops of the number keys.  It
>> seems that confuses cracklib just a bit.  BTW, I was running that as
>> root just to be sure it wasn't a permissions issue.  I tried a few
>> different things but it seems the "!" is triggering that at least, maybe
>> others too.  The command works fine with just normal stuff.
> Hmm ... I don't get such problem here, when I run cracklib as a plain user:
>
> $ cracklib-check
> password
> password: it is based on a dictionary word
> p4ssw0rd
> p4ssw0rd: it is based on a dictionary word
> p477w0rd
> p477w0rd: OK
> !sdER*ark4567#
> !sdER*ark4567#: OK
> helloworld
> helloworld: OK
> reallysecurepassword
> reallysecurepassword: OK
>
> LOL!
>
> Could it be something to do with your terminal/shell?  I've run the above 
> with 
> bash in a urxvt terminal.
>
>


He he he he.  It was the idiot in the chair.  The idiot in the chair
thought it was done this way, like I saw on a website that must be
outdated. 

root@fireball / # cracklib-check !sdER*ark4567#
-su: !sdER: event not found
root@fireball / #

After seeing your reply, I realize I just type the command and it
prompts me for a password.  I ctrl c to exit.  Well, ain't that
something?  You can stop laughing now.  ;-) 

It seems to think helloworld and reallysecurepassword is OK.  I have to
question just how good this tool is at this point.  Maybe I need to
install some more stuff here.  Pardon me while I go find some more of
this.  Something has to be missing.  :/

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Michael Schwartzkopff
Am 05.02.19 um 10:55 schrieb Mick:
> On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:
>
>> Sort of picking a random message to reply to here.  Someone sent a reply
>> off list about checking passwords on my system with tools available.
>> They also mentioned not trusting strength meters which I can get since
>> they pass some obvious passwords.  I used three meters and some sort of
>> common sense as well.  I found cracklib-check after some digging.  I
>> used that to try to check my password and get this weird response. 
>>
>> -su: me-supper-secret-password-here;): event not found
>>
>> I'm going to try to emulate my password without actually posting it, for
>> obvious reasons.  You all are smart enough to understand why.  ROFL  It
>> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
>> tell, I use some of those things on the tops of the number keys.  It
>> seems that confuses cracklib just a bit.  BTW, I was running that as
>> root just to be sure it wasn't a permissions issue.  I tried a few
>> different things but it seems the "!" is triggering that at least, maybe
>> others too.  The command works fine with just normal stuff.
> Hmm ... I don't get such problem here, when I run cracklib as a plain user:
>
> $ cracklib-check
> password
> password: it is based on a dictionary word
> p4ssw0rd
> p4ssw0rd: it is based on a dictionary word
> p477w0rd
> p477w0rd: OK
> !sdER*ark4567#
> !sdER*ark4567#: OK
> helloworld
> helloworld: OK
> reallysecurepassword
> reallysecurepassword: OK
>
> LOL!
>
> Could it be something to do with your terminal/shell?  I've run the above 
> with 
> bash in a urxvt terminal.
>
>
>> That leads
>> me to this question.  Is there a tool I can use/install that will test a
>> password, try to crack it if you will, that will work regardless of the
>> characters used?  In other words, it doesn't mind the things on top of
>> the number keys. 
>>
>> BTW, I've also whittled it down to something a little easier to type
>> too.  Feel sorry for any poor fool trying to just guess it.  lol  May
>> have better luck with P vs NP.  ;-)
>>
>> Thanks.
>>
>> Dale
>>
>> :-)  :-) 
> I've used app-crypt/johntheripper in the distant past, but you'll need a good 
> word list for it to be useful.  Some of the wordlists I had found at the time 
> were too big to download over dial-up!  :p
>
A good password also has to be memorizable. See:

https://xkcd.com/936/


Mit freundlichen Grüßen,

-- 

[*] sys4 AG
 
https://sys4.de, +49 (89) 30 90 46 64
Schleißheimer Straße 26/MG,80333 München
 
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer, Wolfgang Stief
Aufsichtsratsvorsitzender: Florian Kirstein




signature.asc
Description: OpenPGP digital signature


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Mick
On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:

> Sort of picking a random message to reply to here.  Someone sent a reply
> off list about checking passwords on my system with tools available.
> They also mentioned not trusting strength meters which I can get since
> they pass some obvious passwords.  I used three meters and some sort of
> common sense as well.  I found cracklib-check after some digging.  I
> used that to try to check my password and get this weird response. 
> 
> -su: me-supper-secret-password-here;): event not found
> 
> I'm going to try to emulate my password without actually posting it, for
> obvious reasons.  You all are smart enough to understand why.  ROFL  It
> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
> tell, I use some of those things on the tops of the number keys.  It
> seems that confuses cracklib just a bit.  BTW, I was running that as
> root just to be sure it wasn't a permissions issue.  I tried a few
> different things but it seems the "!" is triggering that at least, maybe
> others too.  The command works fine with just normal stuff.

Hmm ... I don't get such problem here, when I run cracklib as a plain user:

$ cracklib-check
password
password: it is based on a dictionary word
p4ssw0rd
p4ssw0rd: it is based on a dictionary word
p477w0rd
p477w0rd: OK
!sdER*ark4567#
!sdER*ark4567#: OK
helloworld
helloworld: OK
reallysecurepassword
reallysecurepassword: OK

LOL!

Could it be something to do with your terminal/shell?  I've run the above with 
bash in a urxvt terminal.


> That leads
> me to this question.  Is there a tool I can use/install that will test a
> password, try to crack it if you will, that will work regardless of the
> characters used?  In other words, it doesn't mind the things on top of
> the number keys. 
> 
> BTW, I've also whittled it down to something a little easier to type
> too.  Feel sorry for any poor fool trying to just guess it.  lol  May
> have better luck with P vs NP.  ;-)
> 
> Thanks.
> 
> Dale
> 
> :-)  :-) 

I've used app-crypt/johntheripper in the distant past, but you'll need a good 
word list for it to be useful.  Some of the wordlists I had found at the time 
were too big to download over dial-up!  :p

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Dale
Neil Bothwick wrote:
> On Mon, 04 Feb 2019 11:17:13 +, Mick wrote:
>
>>> https://xkcd.com/936/  
>> Not strictly true ... the crackers would probably use rainbow tables
>> attacks first.  Also, it isn't fair to compare an 11 character passwd
>> against a 25 character passwd.  For the *same* number of characters
>> used in any given passwd, a random lower/upper/numerical/symbol passwd
>> will provide an exponentially higher degree of difficulty in cracking
>> it with brute force, than one which uses only lower case dictionary
>> words.  Anyway, these days many attacks are focused on OS or hardware
>> vulnerabilities which have been baked in by design, rather than brute
>> force attacks.
> I'm not sure xkcd is meant to be taken that seriously...
>
>


Sort of picking a random message to reply to here.  Someone sent a reply
off list about checking passwords on my system with tools available.
They also mentioned not trusting strength meters which I can get since
they pass some obvious passwords.  I used three meters and some sort of
common sense as well.  I found cracklib-check after some digging.  I
used that to try to check my password and get this weird response. 

-su: me-supper-secret-password-here;): event not found

I'm going to try to emulate my password without actually posting it, for
obvious reasons.  You all are smart enough to understand why.  ROFL  It
has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
tell, I use some of those things on the tops of the number keys.  It
seems that confuses cracklib just a bit.  BTW, I was running that as
root just to be sure it wasn't a permissions issue.  I tried a few
different things but it seems the "!" is triggering that at least, maybe
others too.  The command works fine with just normal stuff.  That leads
me to this question.  Is there a tool I can use/install that will test a
password, try to crack it if you will, that will work regardless of the
characters used?  In other words, it doesn't mind the things on top of
the number keys. 

BTW, I've also whittled it down to something a little easier to type
too.  Feel sorry for any poor fool trying to just guess it.  lol  May
have better luck with P vs NP.  ;-)

Thanks.

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Dale
Tanstaafl wrote:
> On 2/4/2019, 12:47:35 AM, Dale  wrote:
>> Thing is, with today's computing power, it really isn't anymore.
>> While no one could just guess it, it could be cracked/hacked I'm
>> sure.  I need to come up with a new one that meets the requirements I
>> just mentioned.  Strong, easy to remember, easy to type but won't
>> forget.  I've read that using maiden names, years of birth or whole
>> dates of birth, actual names, pet's name, words in a dictionary and a
>> whole list of other things makes it easier, especially if you post a
>> lot on social media, for hackers to use against you.  I'm trying to
>> avoid that sort of thing obviously and have a couple ideas but am
>> curious as to what method others use, without exposing to much
>> detail since this is public.
> I've been using a little Firefox Addon called Passwordmaker for many,
> many years, and despite all of its warts, I've been loathe to give it
> up, even though it will never be upgraded to work as a WebExtension.
>
> 2 things I loved about it -
>
>  a) it doesn't save the password locally, only info about the
> site/account, and
>  b) you can use an unlimited number of Master Passwords
>
> I'm looking at migrating to KeePassXC, and even though I really hate the
> idea of saving the actual password - Passwordmaker simply generates the
> password on the fly each time based on certain specified criteria (ie,
> the site URL, username, password length, etc for each account - one
> technique I adopted shortly after assisting in updating the
> Passwordmaker website eases my mind about it...
>
> This is a simple technique I strongly recommend that everyone employ,
> especially if you use a Password manager (like LastPass or KeePass)...
>
> It is uncrackable (well, as long as it isn't the CIA or NSA that wants
> to crack it and they are willing to kidnap/torture you to do so).
>
> You sit down and come up with a ... call it a 'password modification
> protocol' ... whereby, you always modify your generated/stored password
> in a specific way before pressing enter.
>
> For example, you delete characters 3, 5 and 7, then add 2 characters to
> the beginning and 2 to the end.
>
> It is very simple, and negates worrying about someone stealing your
> password vault.
>
>


I tried to find it just to see how it works but it isn't listed.  From
what you wrote, you may want to at least check into LastPass.  Link
below.  It may do what you currently use and some.  I only use the free
version and it does more than I need already.  I think if I get a smart
phone, I'd have to pay a small monthly fee.  Still, I'm sure there is a
tool that will suite your needs.  There are a lot of them out there. 
Typing password in the add-on search box produces a LOT of results. 
Just find a good one and let it work for you. 

https://www.lastpass.com/

I'm not sure I understand what you mean password modification protocol. 
It sounds like you change your master password each time you use it.  If
I did that, I'd never know which one to use because that would confuse
me.  I don't write passwords down, period.  I went to the local nursing
home the other day, to drop off some puzzle books and a bunch of
bananas, and they have a coded entry thing on the door.  I entered the
code a couple times and it didn't work.  One of the nurses that was
coming on shift came up and entered the code.  When she told me the
code, I realized I was using the code they had before the current one. 
I shifted back in time a bit I guess.  I may not have a flux capacitor
but I did it anyway.  lol   I admit, some of the new things they use, I
have no idea how they work since I've never used most of them.  I've
read about a few of them but don't really get how they work.  If I used
them, I'd get it.

What I hate most, when my bank changes something about their login
process and a little research shows it accomplishes nothing.  My credit
card site has this picture and phrase thing.  I found where it was
researched and it does little to actually help because most people don't
pay it any attention.  My biggest cheat, I adblock stuff on the bank
website, like their great big logo thing.  If I do go to a website and
that logo shows up, it didn't match my adblock setting.  At that point,
that gets a little extra attention until I know for sure and for certain
I'm on the correct site.  Also, LastPass will pick up its on the wrong
site to.  It won't fill in the password info if it doesn't match up. 
They've had the same logo on the site for years. 

It's amazing what we have to do with our computers to keep ourselves
safe because of . . . computers.  :/  I guess this is one reason I like
Linux.  It at least tries to be secure. 

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Roger J. H. Welsh
Hi Dale,

On  Sun, Feb 03, 2019 at 11:47:35PM -0600 , Dale wrote:
> How do you, especially those who admin systems that are always being
> hacked at, generate strong passwords that meet the above?

I have a script for generating passwords the way I like (basically diceware on 
bash).

Something like:
FACTOR=$[ 2**(4*8)/$(cat "$WORDLIST"|wc -l) ]
cat "$WORDLIST" | head -n "$[ $(od -vAn -N4 -tu4 < /dev/random ) / $FACTOR ]" | 
tail -1

I use this in conjunction with
https://github.com/dwyl/english-words/blob/master/words.txt

As far as I understand, if you have about 96 bits of entropy you are
golden. 256 bits is unbruteforceable (at least within the realms of
physics apparently).
5 words = 94 bits (which is good enough for me)
14 words = 256 bits (which seems like a lot of typing)

I also have a messy spreadsheet for checking passwords.
https://github.com/rjhwelsh/gpg-tutorial/blob/master/password_checker.ods

I provide no warranty for my working. ;)

--

Roger Welsh
fpr: 2FCB 9E31 EA77 CDEC A3AE  5DD7 D54C C777 553A 180D



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Tanstaafl
On 2/4/2019, 12:47:35 AM, Dale  wrote:
> Thing is, with today's computing power, it really isn't anymore.
> While no one could just guess it, it could be cracked/hacked I'm
> sure.  I need to come up with a new one that meets the requirements I
> just mentioned.  Strong, easy to remember, easy to type but won't
> forget.  I've read that using maiden names, years of birth or whole
> dates of birth, actual names, pet's name, words in a dictionary and a
> whole list of other things makes it easier, especially if you post a
> lot on social media, for hackers to use against you.  I'm trying to
> avoid that sort of thing obviously and have a couple ideas but am
> curious as to what method others use, without exposing to much
> detail since this is public.
I've been using a little Firefox Addon called Passwordmaker for many,
many years, and despite all of its warts, I've been loathe to give it
up, even though it will never be upgraded to work as a WebExtension.

2 things I loved about it -

 a) it doesn't save the password locally, only info about the
site/account, and
 b) you can use an unlimited number of Master Passwords

I'm looking at migrating to KeePassXC, and even though I really hate the
idea of saving the actual password - Passwordmaker simply generates the
password on the fly each time based on certain specified criteria (ie,
the site URL, username, password length, etc for each account - one
technique I adopted shortly after assisting in updating the
Passwordmaker website eases my mind about it...

This is a simple technique I strongly recommend that everyone employ,
especially if you use a Password manager (like LastPass or KeePass)...

It is uncrackable (well, as long as it isn't the CIA or NSA that wants
to crack it and they are willing to kidnap/torture you to do so).

You sit down and come up with a ... call it a 'password modification
protocol' ... whereby, you always modify your generated/stored password
in a specific way before pressing enter.

For example, you delete characters 3, 5 and 7, then add 2 characters to
the beginning and 2 to the end.

It is very simple, and negates worrying about someone stealing your
password vault.



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Lee Clagett
On Sun, 3 Feb 2019 23:47:35 -0600
Dale  wrote:

> Howdy,
> 
[...snip...]
> 
> How do you, especially those who admin systems that are always being
> hacked at, generate strong passwords that meet the above?  I've
> googled and found some ideas but if I use the same method, well, how
> many others are using that same method, if you know what I
> mean.  ;-)  Just looking for ideas. 

Search for diceware. Memorizing 7-10 word passwords is possible and
fairly strong.

Lee





Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Laurence Perkins



On Sun, 2019-02-03 at 23:47 -0600, Dale wrote:
> 
> 
> How do you, especially those who admin systems that are always being
> hacked at, generate strong passwords that meet the above?  I've
> googled
> and found some ideas but if I use the same method, well, how many
> others
> are using that same method, if you know what I mean.  ;-)  Just
> looking
> for ideas. 
> 
> Thanks much.
> 
> Dale
> 
> :-)  :-) 
> 
> P. S.  I haven't had time to deal with the video thing in previous
> thread.  It's on my todo list still.  :-( 
> 

Take 80 to 100 characters of something you already have memorized. 
Poetry, bible verses, RFCs, pages of the phone book, digits of pi out
of the middle, whatever.  Run it through a transposition, substitution,
or combination cipher that you can calculate in your head on-the-fly. 
(Do avoid the substitutions that everyone uses since those will be
tried first.)

Now you only need to remember a pointer to the memorized section, the
length, and the cipher specification.  There are enough possible
combinations that an attacker won't be able to make a meaningful
reduction in entropy by examining your social media.

As an example:  The second paragraph of Hamlet's soliloquy and invert
the case based on whether the corresponding digit of e is odd or even.

LMP




Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Rich Freeman
On Mon, Feb 4, 2019 at 8:21 AM Neil Bothwick  wrote:
>
> On Mon, 04 Feb 2019 11:17:13 +, Mick wrote:
>
> > > https://xkcd.com/936/
> >
> > Not strictly true ... the crackers would probably use rainbow tables
> > attacks first.  Also, it isn't fair to compare an 11 character passwd
> > against a 25 character passwd.  For the *same* number of characters
> > used in any given passwd, a random lower/upper/numerical/symbol passwd
> > will provide an exponentially higher degree of difficulty in cracking
> > it with brute force, than one which uses only lower case dictionary
> > words.  Anyway, these days many attacks are focused on OS or hardware
> > vulnerabilities which have been baked in by design, rather than brute
> > force attacks.
>
> I'm not sure xkcd is meant to be taken that seriously...
>

IMO xkcd has treated the situation more seriously than some of the
replies here...

Obviously words from a dictionary have less entropy per character than
random characters do, but the xkcd cartoon already takes this into
account.

For the same number of bits of ENTROPY a random password provides the
exact same level of security as one based on words.

To obtain that entropy through words requires more characters of
course.  However, the whole point of the cartoon is that our brains
are much better at remembering words than random characters, since we
have a big chunk of grey matter evolved to do exactly that which is
more sophisticated than any computer on the planet so far.

Now, if you have some brain-dead software which only accepts 8
character passwords then you would obviously do better to use random
characters (truly random - not picking the most pleasing-looking
random password out of a list) than to try to cram one or two words in
there.  Likewise, if you're using a password manager and want to
maximize entropy per bit of storage/transmission then random passwords
are better since words provide no utility.

However, if you want to obtain the highest number of bits of entropy
for a password that is memorized, xkcd makes a compelling argument
that you're better off with a longer password composed of words,
because they let you cram more entropy into your brain.  Two bits from
a dictionary might be the same as two bits from 1/3rd of a random
character to a brute force cracking engine, but they aren't the same
to your brain.  Xkcd isn't doing a like-for-like comparison, because
the two categories aren't alike.

-- 
Rich



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Neil Bothwick
On Mon, 04 Feb 2019 11:17:13 +, Mick wrote:

> > https://xkcd.com/936/  
> 
> Not strictly true ... the crackers would probably use rainbow tables
> attacks first.  Also, it isn't fair to compare an 11 character passwd
> against a 25 character passwd.  For the *same* number of characters
> used in any given passwd, a random lower/upper/numerical/symbol passwd
> will provide an exponentially higher degree of difficulty in cracking
> it with brute force, than one which uses only lower case dictionary
> words.  Anyway, these days many attacks are focused on OS or hardware
> vulnerabilities which have been baked in by design, rather than brute
> force attacks.

I'm not sure xkcd is meant to be taken that seriously...


-- 
Neil Bothwick

Help a man when he is in trouble and he will remember you when he is in
trouble again


pgpbzypu3SaUv.pgp
Description: OpenPGP digital signature


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Mick
On Monday, 4 February 2019 10:37:03 GMT Neil Bothwick wrote:
> On Mon, 04 Feb 2019 10:24:27 +, Peter Humphrey wrote:
> > > How do you, especially those who admin systems that are always being
> > > hacked at, generate strong passwords that meet the above?  I've
> > > googled and found some ideas but if I use the same method, well, how
> > > many others are using that same method, if you know what I
> > > mean.  ;-)  Just looking for ideas.
> > 
> > You could use a password generator to keep creating random passwords
> > until it comes up with something you like the look of, then learn it by
> > rote. I did that some time ago - it must be about time I did it again
> > to make another one.
> 
> https://xkcd.com/936/

Not strictly true ... the crackers would probably use rainbow tables attacks 
first.  Also, it isn't fair to compare an 11 character passwd against a 25 
character passwd.  For the *same* number of characters used in any given 
passwd, a random lower/upper/numerical/symbol passwd will provide an 
exponentially higher degree of difficulty in cracking it with brute force, 
than one which uses only lower case dictionary words.  Anyway, these days many 
attacks are focused on OS or hardware vulnerabilities which have been baked in 
by design, rather than brute force attacks.

Any financial company worth their salt are employing 2-factor authentication 
and account lockups to stop brute forcing of users credentials.  So, guarding 
against your own OS compromise is more important than individual website 
credentials.

You will be surprised how many people are still using passwds like:

password
password1
arsenal
manchesterunited2018
fido

on websites which store their credit card details.  O_O

You may want to take a look at app-admin/apg and to mitigate against your 
CPU's lack of randomness use sys-apps/haveged.  Combining multiple outputs of 
apg should arrive at a passwd which is more secure than not.

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Neil Bothwick
On Mon, 04 Feb 2019 10:24:27 +, Peter Humphrey wrote:

> > How do you, especially those who admin systems that are always being
> > hacked at, generate strong passwords that meet the above?  I've
> > googled and found some ideas but if I use the same method, well, how
> > many others are using that same method, if you know what I
> > mean.  ;-)  Just looking for ideas.   
> 
> You could use a password generator to keep creating random passwords
> until it comes up with something you like the look of, then learn it by
> rote. I did that some time ago - it must be about time I did it again
> to make another one.

https://xkcd.com/936/


-- 
Neil Bothwick

There's too much blood in my caffeine system.


pgpzcPbnKrFaM.pgp
Description: OpenPGP digital signature


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-04 Thread Peter Humphrey
On Monday, 4 February 2019 05:47:35 GMT Dale wrote:

> How do you, especially those who admin systems that are always being
> hacked at, generate strong passwords that meet the above?  I've googled
> and found some ideas but if I use the same method, well, how many others
> are using that same method, if you know what I mean.  ;-)  Just looking
> for ideas. 

You could use a password generator to keep creating random passwords until it 
comes up with something you like the look of, then learn it by rote. I did 
that some time ago - it must be about time I did it again to make another one.

-- 
Regards,
Peter.