Re: [gentoo-user] VRFs / Jails / Containers

2019-02-05 Thread Grant Taylor

On 2/5/19 10:55 AM, Rich Freeman wrote:
Yeah, I think you're over-reading into my posts.  I'm mostly reacting 
to your ideas and not trying to be prescriptive.


So we have a feedback loop.  I'm trying to understand why you're saying 
what you're saying.


I'm still looking for possibilities and pros / cons of each.

For example, you talked about running openrc inside the container, and 
then I talked about how you might do that, and then you asked why would 
you want to run openrc inside the container.  Well, since I don't know 
exactly what you're doing I don't know - if it doesn't make sense then 
don't do it...  :)


Seeing as how my container really is the same as the host, at least when 
it comes to file system and files, OpenRC is what is there.  Hence my 
interest in re-using what's already there.


That is /if/ doing such does not have too many cons.

Essentially.  It isn't like it won't work if you do something else - 
it is just a design principle.


ACK

Suppose you want to manually launch a container without using the init.d 
script, just as you might launch a non-forking server process to do some 
console debugging if you were having an issue.  And so on.


I see what you're saying by starting a typical daemon manually vs init 
scripts.


Given that what I'm talking about doing doesn't leave a process running 
(I'm ignoring BIRD for the moment) there's nothing to kill to stop it.


What I'm doing is really a series of commands that stand the service up 
and a command that stops it.


I guess that I could have an independent script for this and then have 
the init script do nothing more than call the script with a start 
parameter.  But I feel like my independent script is functionally 
identical to an init script.


It is just a shell script, so it isn't like it won't work if you do it 
all in the script.


*nod*

Interesting.  I didn't realize that linux even supported creating network 
namespaces without an associated process.  Maybe you don't need one 
after all.


I've been using network namespaces without a process for quite a while. 
They are extremely handy.


I guess since network interfaces can do their netfilter/etc logic 
without any processes actually listening on them it makes sense that 
these namespaces might have their own existence.


;-)


They don't need to.


Which is why I was back to putting the (re)start / stop commands in the 
init script.


IMO they should, but that is like saying that your 5000 line C program 
should actually have 5000 lines and whitespace, and not look like the 
javascript source to gmail.  It is somewhat subjective, as gcc doesn't 
care if the whole thing is one big mass of punctuation...  :)


Yes, there is subjectivity to it.  But there are also Gentoo 
methodologies and guidelines.


Can you actually start openrc in a container using a parameter-driven 
runlevel that isn't a number?


I don't know.  I'll have to try and find out.

I believe you can pass a numeric runlevel to init and it will start 
on that runlevel (though I'm not sure you can start openrc that way 
in non-trivial configs as that might skip the boot runlevel, assuming 
openrc doesn't override this sysvinit behavior).  You can't use the 
kernel command line since containers don't have a separate kernel.


I think I understand what you're saying.  I also doubt that I will need 
a boot runlevel in a container the way that I'm doing them.


I can see needing a net. and maybe a BIRD init script in the 
target runlevel.  But other than that, there's virtually nothing that 
does not already exist from the host's file system / environment.


You can of course change the default runlevel for openrc using config 
files in /etc, but those are shared with the host in your proposed design.


ACK

I /can/ use a mount namespace and have a different /etc.  But I'd rather 
not do that unless there is a need to do so.


Maybe you could hack something together here, but honestly I'm not sure 
what you're getting by not having a separate /etc or at least a bind 
mount for the openrc config.


I currently have no need for a separate /etc.  So why have something 
that I don't currently need?



Again, assuming you need openrc in the container at all.


Seeing as how the container has the same files as the host, that means 
that OpenRC is already in the container.  So if I can make use of it 
without causing problems, then why not?




Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Mark David Dumlao
On Wed, Feb 6, 2019 at 5:18 AM Neil Bothwick  wrote:
>
> On Wed, 6 Feb 2019 04:28:49 +0800, Mark David Dumlao wrote:
>
> > My own solution is actually very simple. I have a "secret algorithm"
> > that incorporates several secrets with a predictable way to generate a
> > site-specific secret. The end result is a 100% predictable way to
> > generate unique passwords for every site that are cryptographically
> > secure from each other (you cannot derive
> > one from the other) which can be generated by any device using the
> > appropriate tools.
>
> The was a tool in portage this did this. I tried it but it did not work
> in the real world because you couldn't set a rule for generated passwords
> that matched the requirements of all sites, for example some require a
> non-alphanumeric character while other sites only allow alphanumerics.
>
> I can remember what the tools was called, although I'm pretty sure it
> was written in Python. I'd be interested to know how you get around the
> conflicting restrictions as this seems a good way to do things.
>

Well the original idea is to reduce dependency on specific tools, such
that the algorithm is the secret, and the passwords are just
byproducts of the secret. You will still need tools to do any hashing,
but those are generic tools you can acquire anywhere.

So for example, the "password123" equivalent secret algorithm might be:
1) global pepper: "password"
3) site-specific pepper: pepper plus number = vowels in domain name
2) site-specific ID: pepper dot domain name dot username
4) hashing algorithm: md5sum + base64, take first 8

Example application: madum...@gmail.com
1) site-specific pepper: pepper3 (3 vowels in domain name: google)
2) site-specific ID: pepper3.google.madumlao
3) site-specific hash: (2) -> md5sum -> base64 -> first8 -> NGI3MTQz
4) combined with global pepper: password.NGI3MTQz
5) hashed with global pepper: (4) -> md5sum -> base64 -> first8 -> MWJjZjg2
password: MWJjZjg2

Example application: madum...@yahoo.com
1) site-specific pepper: pepper3 (3 vowels in domain name: yahoo)
2) site-specific ID: pepper3.yahoo.madumlao
3) site-specific hash: (2) -> md5sum -> base64 -> first8 -> ZDQzZGM5
4) combined with global pepper: password.ZDQzZGM5
5) hashed with global pepper: (4) -> md5sum -> base64 -> first8 -> ZjUwMTI2
password: ZjUwMTI2

The procedure takes up a little more headspace than 1 password, but
definitely less headspace than a dozen cryptographically secure
passwords. You can change the hashing algorithm, peppering rule, ID
rule, number of characters, etc to your tastes. You can add iteration
rules for the nth password change anywhere in the procedure, and add
constraint rules for sites that have certain password limitations (the
caveat is that you have to remember which sites have password changes
and constraints). For me really all that matters is that the building
blocks are widely available and the end result incorporates data loss
that makes it impossible to recover the original secrets.

"Obviously" do not use this algorithm as-is. The algorithm, not the
password, is the secret, so using this algorithm as is is the
equivalent of using any example of a crypto secure password (correct
horse battery stapler) as a password.
-- 
This email is:[ ] actionable   [x] fyi[ ] social
Response needed:  [ ] yes  [x] up to you  [ ] no
Time-sensitive:   [ ] immediate[ ] soon   [x] none



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Tanstaafl wrote:
> On 2/4/2019, 8:10:57 PM, Dale  wrote:
>> Tanstaafl wrote:
>>> I've been using a little Firefox Addon called Passwordmaker for many,
>>> many years, and despite all of its warts, I've been loathe to give it
>>> up, even though it will never be upgraded to work as a WebExtension.
>>>
>>> 2 things I loved about it -
>>>
>>>  a) it doesn't save the password locally, only info about the
>>> site/account, and
>>>  b) you can use an unlimited number of Master Passwords
>>>
>>> I'm looking at migrating to KeePassXC, and even though I really hate the
>>> idea of saving the actual password - Passwordmaker simply generates the
>>> password on the fly each time based on certain specified criteria (ie,
>>> the site URL, username, password length, etc for each account - one
>>> technique I adopted shortly after assisting in updating the
>>> Passwordmaker website eases my mind about it...
>>>
>>> This is a simple technique I strongly recommend that everyone employ,
>>> especially if you use a Password manager (like LastPass or KeePass)...
>>>
>>> It is uncrackable (well, as long as it isn't the CIA or NSA that wants
>>> to crack it and they are willing to kidnap/torture you to do so).
>>>
>>> You sit down and come up with a ... call it a 'password modification
>>> protocol' ... whereby, you always modify your generated/stored password
>>> in a specific way before pressing enter.
>>>
>>> For example, you delete characters 3, 5 and 7, then add 2 characters to
>>> the beginning and 2 to the end.
>>>
>>> It is very simple, and negates worrying about someone stealing your
>>> password vault.
>> I tried to find it just to see how it works but it isn't listed.
> What... Passwordmaker (the old one I still use and why I keep an old
> Firefox 56 portable version around)?


I'm on the newer version of Firefox so it doesn't show up in my search
since it isn't compatible.  I'm pretty sure that is why it doesn't show
up for me.  If I were on the older version of Firefox, then it would
show up.  I was wanting to look at it tho.  I did find a Pro version
which is likely the same thing but for the newer versions of Firefox. 
Did you see it?  It is here:

https://addons.mozilla.org/en-US/firefox/addon/firefox-passwordmaker-pro/?src=search

I see another version as well but with very few users.  Still, if the
above is just a version for the newer Firefox, you may not have to
switch or can use both somehow.  Some other add-ons I use did similar
things.  Since some required a complete rewrite, they also changed the
name a bit too.  Thing is, some of the new versions of add-ons don't
show up in older versions of Firefox.  If you didn't see this, I hope it
helps.


>> From what you wrote, you may want to at least check into LastPass.
> I did a massive amount of research (including LastPass), and settled on
> KeePassXC for a good reason.

I've read where people use that and like it.  It just depends on what
you are looking for and expect from the tool.  If it meets your needs,
then it is a good fit for you.  I picked LastPass since it did what I
need and then some plus is free.  I also had the privilege of emailing
back and forth with one of the original owners or creators way back
then.  His name is Joe Siegrist.  My bank and credit card sites wouldn't
work at first.  I gave him a link and he made some changes so that the
next version would fill those sites.  I may switch one day, may even
switch to what you are using, but at the moment, LastPass seems to be
doing well. 


>> Still, I'm sure there is a tool that will suite your needs.
> ? Its like you didn't really read my email. I already said, I'm
> migrating to KeePassXC. But my complaint is, nothing works like
> Passwordmaker (again, it doesn't store passwords, can only use one
> Master Password).
>
>> I'm not sure I understand what you mean password modification protocol. 
>> It sounds like you change your master password each time you use it.
> No, I'm talking about the saved (or in Passwordmakers case, generated)
> password, not the Master Password.
>
> Doing this with the Master Password wouldn't make any sense.
>

If I understand you correctly, I think I have seen a site that allows
that sort of thing.  I think.  To be honest, this is why I like tools. 
I tend to let tools do the heavy lifting.  My biggest responsibility is
having a good master password.  That's what started this.  I want a good
one.  ;-)  Most of the sites I use are email or ID plus password.  A
couple have this picture and phrase thing between login and password
tho.  There is also a couple that uses that secret question thing.  Some
of those are plain annoying tho.  lol

Given how things are nowadays, I suspect we will always be in a constant
race to try and stay ahead of hackers and such.  Every time we change to
try and beat them, they will find new tools, faster hardware etc to beat
us.  The biggest thing, our tools or us have to keep up.  I really need
to keep up with the newer stuff 

Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Neil Bothwick
On Wed, 6 Feb 2019 04:28:49 +0800, Mark David Dumlao wrote:

> My own solution is actually very simple. I have a "secret algorithm"
> that incorporates several secrets with a predictable way to generate a
> site-specific secret. The end result is a 100% predictable way to
> generate unique passwords for every site that are cryptographically
> secure from each other (you cannot derive
> one from the other) which can be generated by any device using the
> appropriate tools.

The was a tool in portage this did this. I tried it but it did not work
in the real world because you couldn't set a rule for generated passwords
that matched the requirements of all sites, for example some require a
non-alphanumeric character while other sites only allow alphanumerics.

I can remember what the tools was called, although I'm pretty sure it
was written in Python. I'd be interested to know how you get around the
conflicting restrictions as this seems a good way to do things.


-- 
Neil Bothwick

MIPS: Meaningless Indication of Processor Speed


pgpfxOzY7wyil.pgp
Description: OpenPGP digital signature


Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Mark David Dumlao
On Tue, Feb 5, 2019 at 3:39 AM Jack  wrote:
> The problem I have with many of these suggestions is that I have
> multiple devices (two desktops, two laptops, tablet, android phone) I
> use sufficiently often that I either need to be able to remember the
> passwords or have some way of easily accessing them when I'm not
> sitting at my main desktop.  Other than using a password manager (which
> I do not currently have) how to others deal with this?
>
> Jack

Haven't posted here in a long while. I personally do not trust password managers
for (1) the same reason you gave above and (2) typically the way around it is
they store your passwords in the cloud which is all sorts of facepalm from a
security perspective.

My own solution is actually very simple. I have a "secret algorithm" that
incorporates several secrets with a predictable way to generate a site-specific
secret. The end result is a 100% predictable way to generate unique passwords
for every site that are cryptographically secure from each other (you
cannot derive
one from the other) which can be generated by any device using the appropriate
tools. There is also a protocol for password shifting in case any
single password
is revealed.

The long and short of it is that you can combine secure passwords with hashing
techniques, site-specific data, and truncation / peppering in a
predetermined way
that is easy for you to remember but guarantees that the original secret data is
irrecoverable. Then all you need is the hashing program on, say, your phone,
and you will always be able to generate the site-specific password when needed.
In effect the algorithm is your secret, the site-specific password is
just a side
effect of that secret.
-- 
This email is:[ ] actionable   [x] fyi[x] social
Response needed:  [ ] yes  [x] up to you  [ ] no
Time-sensitive:   [ ] immediate[ ] soon   [x] none



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Tanstaafl
On 2/4/2019, 8:10:57 PM, Dale  wrote:
> Tanstaafl wrote:
>> I've been using a little Firefox Addon called Passwordmaker for many,
>> many years, and despite all of its warts, I've been loathe to give it
>> up, even though it will never be upgraded to work as a WebExtension.
>>
>> 2 things I loved about it -
>>
>>  a) it doesn't save the password locally, only info about the
>> site/account, and
>>  b) you can use an unlimited number of Master Passwords
>>
>> I'm looking at migrating to KeePassXC, and even though I really hate the
>> idea of saving the actual password - Passwordmaker simply generates the
>> password on the fly each time based on certain specified criteria (ie,
>> the site URL, username, password length, etc for each account - one
>> technique I adopted shortly after assisting in updating the
>> Passwordmaker website eases my mind about it...
>>
>> This is a simple technique I strongly recommend that everyone employ,
>> especially if you use a Password manager (like LastPass or KeePass)...
>>
>> It is uncrackable (well, as long as it isn't the CIA or NSA that wants
>> to crack it and they are willing to kidnap/torture you to do so).
>>
>> You sit down and come up with a ... call it a 'password modification
>> protocol' ... whereby, you always modify your generated/stored password
>> in a specific way before pressing enter.
>>
>> For example, you delete characters 3, 5 and 7, then add 2 characters to
>> the beginning and 2 to the end.
>>
>> It is very simple, and negates worrying about someone stealing your
>> password vault.

> I tried to find it just to see how it works but it isn't listed.

What... Passwordmaker (the old one I still use and why I keep an old
Firefox 56 portable version around)?

> From what you wrote, you may want to at least check into LastPass.

I did a massive amount of research (including LastPass), and settled on
KeePassXC for a good reason.

> Still, I'm sure there is a tool that will suite your needs.

? Its like you didn't really read my email. I already said, I'm
migrating to KeePassXC. But my complaint is, nothing works like
Passwordmaker (again, it doesn't store passwords, can only use one
Master Password).

> I'm not sure I understand what you mean password modification protocol. 
> It sounds like you change your master password each time you use it.

No, I'm talking about the saved (or in Passwordmakers case, generated)
password, not the Master Password.

Doing this with the Master Password wouldn't make any sense.



Re: [gentoo-user] VRFs / Jails / Containers

2019-02-05 Thread Rich Freeman
On Mon, Feb 4, 2019 at 7:10 PM Grant Taylor
 wrote:
>
> On 02/04/2019 02:58 PM, Rich Freeman wrote:
> > So, I think we're miscommunicating a bit here...
>
> It happens.
>

Yeah, I think you're over-reading into my posts.  I'm mostly reacting
to your ideas and not trying to be prescriptive.

For example, you talked about running openrc inside the container, and
then I talked about how you might do that, and then you asked why
would you want to run openrc inside the container.  Well, since I
don't know exactly what you're doing I don't know - if it doesn't make
sense then don't do it...  :)

> > I'm saying that an init.d script shouldn't try to do anything other
> > than initialize a service, which should be implemented outside the
> > init.d script.
>
> It sounds like you are saying that an init script shouldn't do anything
> other than (re)start/stop a service and that there should be a separate
> script (binary / command) that is the service.

Essentially.  It isn't like it won't work if you do something else -
it is just a design principle.

Suppose you want to manually launch a container without using the
init.d script, just as you might launch a non-forking server process
to do some console debugging if you were having an issue.  And so on.

It is just a shell script, so it isn't like it won't work if you do it
all in the script.

>
> ip netns add myContainer
> ip link add myContainer type veth peer name myHost netns myContainer
> ip link set myContainer up
> ip addr add 192.0.2.1/24 dev myContainer
> ip netns exec myContainer ip link set myHost up
> ip netns exec myContainer ip addr add 192.0.2.2/24 dev myHost
>

Interesting.  I didn't realize that linux even supported creating
network namespaces without an associated process.  Maybe you don't
need one after all.

I guess since network interfaces can do their netfilter/etc logic
without any processes actually listening on them it makes sense that
these namespaces might have their own existence.

> So, I'm not sure why those commands need to or should live inside
> something other than the init script.

They don't need to.

IMO they should, but that is like saying that your 5000 line C program
should actually have 5000 lines and whitespace, and not look like the
javascript source to gmail.  It is somewhat subjective, as gcc doesn't
care if the whole thing is one big mass of punctuation...  :)

> Why can't I have a single /etc/runlevels/myContainer that is never used
> outside of the container and only used inside the container?  Remember
> that the host and container share the same file system.

Can you actually start openrc in a container using a parameter-driven
runlevel that isn't a number?  I believe you can pass a numeric
runlevel to init and it will start on that runlevel (though I'm not
sure you can start openrc that way in non-trivial configs as that
might skip the boot runlevel, assuming openrc doesn't override this
sysvinit behavior).  You can't use the kernel command line since
containers don't have a separate kernel.

You can of course change the default runlevel for openrc using config
files in /etc, but those are shared with the host in your proposed
design.

Maybe you could hack something together here, but honestly I'm not
sure what you're getting by not having a separate /etc or at least a
bind mount for the openrc config.

Again, assuming you need openrc in the container at all.

-- 
Rich



Re: [gentoo-user] VRFs / Jails / Containers

2019-02-05 Thread Michael Orlitzky
On 2/4/19 3:50 PM, Grant Taylor wrote:
> On 02/03/2019 11:23 AM, Michael Orlitzky wrote:
>> Ultimately netifrc is just a shell script that parses another shell 
>> script to construct a third shell script. I don't think doing it with 
>> only two shell scripts is that much less elegant =)
> 
> The elegance, or lack there of, is not in the number of shell scripts. 
> Rather the fact that tc (QoS) parameters are stuffed into a command line 
> verses having things split out and parsed is what I dislike.  Take VLANs 
> for example, there is a netifrc parameter for specifying the VLAN IDs 
> that belong on an interface.  Netifrc will then construct the commands. 
> People don't need to know how to construct the commands themselves to 
> utilize VLANs.  tc (QoS) is not anywhere nearly as nice.
> 

If you're willing to go all-out to do this right, you can implement that
parsing yourself.

You can create a package called netifrc-qos that consists of (only?) two
files: an OpenRC service script, and an associated conf.d file. Inside
the conf.d file you can use whatever variables you like, and then have
the init script parse them and run the resulting commands. Afterwards
you'd create an ebuild for it, install it from an overlay, and then edit
the conf.d file accordingly. It's a lot of work, but that's the most
Gentoo way to do it IMO.

You might also want to check with the OpenRC/netifrc projects to see if
they have anything like this in the works already. Either way they may
be willing to collaborate on a design.



Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Dale
Rich Freeman wrote:
> On Tue, Feb 5, 2019 at 2:34 AM Dale  wrote:
>> Rich Freeman wrote:
>>> On Mon, Feb 4, 2019 at 5:12 PM Dale  wrote:
 Neil Bothwick wrote:
> On Mon, 4 Feb 2019 15:59:02 -0500, Rich Freeman wrote:
>
>>> One reason I use LastPass, it is mobile.  I can go to someone else's
>>> computer, use LastPass to say make use of Paypal, Newegg, Ebay etc,
>>> logoff and it is like I was never there.
>> As much as I like Lastpass I would never do that.  It isn't magic - it
>> is javascript.  If there is a compromise on your computer, then your
>> password database will be compromised.  This is true of other
>> solutions like KeePassX and so on - if something roots your box then
>> it will be compromised.
 I might point out, LastPass encrypts the password before sticking it in
 a file.  It isn't visible or plain text.  Even getting the file would
 still require some tools and cracking to get the password itself.
>>> That assumes you're attacking the password file directly.
>>>
>>> If you're using lastpass on a compromised system then there are many
>>> ways that can be used to bypass the encryptions.  They could sniff
>>> your master password when you key it in, or read it directly from the
>>> browser's memory.  These things are protected from sandboxed code in
>>> your browser, but not from processes running outside the browser
>>> (unless again you're using a non-conventional privilege system like
>>> selinux/android/etc).
>> One could argue the same thing with any password tool out there tho,
>> right?
> Of course.  This is by no means specific to Lastpass.  I wasn't
> reacting to your use of Lastpass (I use it myself).  I was reacting to
> your statement that you can go to someone else's computer and use
> lastpass on that computer and then log off and it is as if you were
> never there.

What I meant was, they couldn't use it without knowing my password. 
Sure, I may leave something, like LastPass installed but disabled, on
their computer but no one can use it without it being logged in.  Once I
logout and close the browser, that pretty much ends the session.  Most
sites I visit are not set to remember me anyway and some don't allow
it.  I also logout before leaving a site especially when I'm on a
computer other than mine.  So, once I logout, they can't login as me
without my password.  We sort of went in different directions. 

If I really wanted to, I could use some bootable media like Knoppix.  I
think it comes with Firefox already installed. I could boot that,
install LastPass, do my thing, reboot into the OS and not have to worry
about anything they have installed at all.  I do keep copies of those
around and try to update every once in a while.  I certainly keep
sysrescue up to date.  I don't think it has a browser tho.  It may but
I'm not sure. 


>> Given I only install things from
>> trusted sources, the odds of that happening are likely very small.
> Not if you go typing your Lastpass master password into computers
> owned by people who aren't as careful as you are...
>
> If you do want the benefits of a password manager on an untrusted
> computer then you might want to look into the hardware/USB-based
> solutions, or alternatives like U2F and so on.
>
> Now, you're still vulnerable to MITM attacks and so on against the
> sites you're actually logging into, but your credentials for other
> sites would not be at risk since they stay on the hardware device,
> which is going to be hardened against USB attacks (well, at least you
> hope it would be).  If you're using conventional passwords then of
> course something could still sniff that password since it has to pass
> through the untrusted computer.  If you're using OTPs or U2F/etc then
> you may still be vulnerable to some cookie-based attacks and MITM and
> so on, but if you log off at the end of your session that at least
> limits their duration.
>
> Personally I would like to switch to a hardware-based solution, but
> they have their own set of downsides:
>
> 1.  Less convenience - you have to physically have the device on you
> (I don't carry my keys around in the hosue/etc), and plug it in when
> you want to use it.
> 2.  Recovery options aren't always great.  Often these devices don't
> really have their own recovery solution, and you're stuck following
> the recovery options on each individual site.  Many of these are
> pretty lousy.
> 3.  Often no support for multiple hardware devices (and keeping them
> in sync).  Again you're stuck with what individual sites allow, and
> many sites don't let you have multiple hardware tokens registered.
> 4.  Lack of convenience features like auto-changing passwords.  Some
> software-based solutions have this.  Though, to be honest, I rarely
> trust these because if something goes wrong I could lose account
> access and this can be difficult or impossible to recover from in many
> situations.
>
> A big advantage (and disadvantage) of the 

Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Rich Freeman
On Tue, Feb 5, 2019 at 2:34 AM Dale  wrote:
>
> Rich Freeman wrote:
> > On Mon, Feb 4, 2019 at 5:12 PM Dale  wrote:
> >> Neil Bothwick wrote:
> >>> On Mon, 4 Feb 2019 15:59:02 -0500, Rich Freeman wrote:
> >>>
> > One reason I use LastPass, it is mobile.  I can go to someone else's
> > computer, use LastPass to say make use of Paypal, Newegg, Ebay etc,
> > logoff and it is like I was never there.
>  As much as I like Lastpass I would never do that.  It isn't magic - it
>  is javascript.  If there is a compromise on your computer, then your
>  password database will be compromised.  This is true of other
>  solutions like KeePassX and so on - if something roots your box then
>  it will be compromised.
> >
> >> I might point out, LastPass encrypts the password before sticking it in
> >> a file.  It isn't visible or plain text.  Even getting the file would
> >> still require some tools and cracking to get the password itself.
> > That assumes you're attacking the password file directly.
> >
> > If you're using lastpass on a compromised system then there are many
> > ways that can be used to bypass the encryptions.  They could sniff
> > your master password when you key it in, or read it directly from the
> > browser's memory.  These things are protected from sandboxed code in
> > your browser, but not from processes running outside the browser
> > (unless again you're using a non-conventional privilege system like
> > selinux/android/etc).
>
> One could argue the same thing with any password tool out there tho,
> right?

Of course.  This is by no means specific to Lastpass.  I wasn't
reacting to your use of Lastpass (I use it myself).  I was reacting to
your statement that you can go to someone else's computer and use
lastpass on that computer and then log off and it is as if you were
never there.

> Given I only install things from
> trusted sources, the odds of that happening are likely very small.

Not if you go typing your Lastpass master password into computers
owned by people who aren't as careful as you are...

If you do want the benefits of a password manager on an untrusted
computer then you might want to look into the hardware/USB-based
solutions, or alternatives like U2F and so on.

Now, you're still vulnerable to MITM attacks and so on against the
sites you're actually logging into, but your credentials for other
sites would not be at risk since they stay on the hardware device,
which is going to be hardened against USB attacks (well, at least you
hope it would be).  If you're using conventional passwords then of
course something could still sniff that password since it has to pass
through the untrusted computer.  If you're using OTPs or U2F/etc then
you may still be vulnerable to some cookie-based attacks and MITM and
so on, but if you log off at the end of your session that at least
limits their duration.

Personally I would like to switch to a hardware-based solution, but
they have their own set of downsides:

1.  Less convenience - you have to physically have the device on you
(I don't carry my keys around in the hosue/etc), and plug it in when
you want to use it.
2.  Recovery options aren't always great.  Often these devices don't
really have their own recovery solution, and you're stuck following
the recovery options on each individual site.  Many of these are
pretty lousy.
3.  Often no support for multiple hardware devices (and keeping them
in sync).  Again you're stuck with what individual sites allow, and
many sites don't let you have multiple hardware tokens registered.
4.  Lack of convenience features like auto-changing passwords.  Some
software-based solutions have this.  Though, to be honest, I rarely
trust these because if something goes wrong I could lose account
access and this can be difficult or impossible to recover from in many
situations.

A big advantage (and disadvantage) of the software-based solutions is
that they're just data files and you can back them up trivially.

Really though a lot of this boils down to the fact that PKI is a hard
problem without a trusted and convenient mediator, and this largely
doesn't exist in the world of free online services.

-- 
Rich



Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Dale
Mick wrote:
> On Tuesday, 5 February 2019 07:55:41 GMT Dale wrote:
>> Mick wrote:
>>> https://en.wikipedia.org/wiki/LastPass#Security_issues
>>>
>> From what I read, no users had their passwords compromised in those.
> I read it differently.  LastPass didn't know if any passwds were compromised 
> (or wouldn't tell you).  As a precaution they asked users to change their 
> master passwd, while they changed their server's salt.  In addition, there 
> were XSS vulnerabilities later on, which is probably to be expected with 
> JavaScript and similar technologies.
>

I recall the email vaguely.  It said there was nothing that showed the
passwords were compromised.  I did change passwords for things like my
bank etc but left the others alone.  Of course, I change those passwords
on a fairly regular basis anyway.  Thing is, when it comes to financial
stuff, I don't leave as much to chance.  I found the email notice.  Here
is a bit of it:


"No encrypted user vault data was taken, however other data, including
email addresses and password reminders, was compromised." 

So, the encrypted stuff such as passwords was not compromised.  They
only got email addys and such which isn't a big deal.


>> As
>> I pointed out earlier, the passwords are already encrypted when they are
>> sent to LastPass.  If I called LastPass, could prove I am who I claim to
>> be and asked them for a password to a site, they couldn't give it to me
>> because it is encrypted when it leaves my machine. 
> I don't know exactly how the LastPass architecture is configured, other than 
> it relies on device based encryption activated with JavaScript, but anomalies 
> they observed in incoming and outgoing traffic on the 2011 incident indicate 
> someone was interfering with their data streams.  Given Diffie-Hellman could 
> be compromised (e.g. as per Logjam) by precomputing some of the most commonly 
> used primes in factoring large integers, it may be someone was undertaking 
> comparative analysis to deduce ciphers and what not.  If the server salt was 
> obtained, then one layer of encryption was compromised.
>
> All this is juxtaposition and my hypothesizing does not mean LastPass is not 
> useful, or not secure.  It just means its design is not as secure as locally 
> run simpler encryption mechanisms, which do not leave your PC and are not 
> stored somewhere else.
>
> The greater surface area a security system exposes, the higher likelihood 
> someone will take a punt at cracking it.  A browser, sandboxed or not, has 
> far 
> too many moving parts and exposed flanks to keep crackers and state actors 
> busy.  I expect with advances in AI this effort will accelerate 
> logarithmically.

This is why I don't use the built in password manager in Firefox. 
Firefox most likely concentrates on the browser since its main job is
being a browser.  A password tool is a little lower on the list I would
think.  However, LastPass and other password tools, it is their main
function to be password tools that are secure but can still work with
the browser as well. 


>
>> As I pointed out to Rich, I don't expect these tools to be 100%.  There
>> is no perfect password tool or a perfect way to manage them either.  No
>> matter what you do, someone can come along and poke a hole in it.  If
>> you use a tool, the tool is hackable.  If you use the same password that
>> is 40 characters long for several dozen sites, then the site can be
>> hacked and they have the password for those other sites as well.  The
>> list could go on for ages but it doesn't really change anything.  We do
>> the best we can and then hope it is enough.  Using tools is in my
>> opinion better than not using a tool at all.  At the least, they will
>> have a hard time breaking into a site directly without my password.  It
>> beats the alternative which is cutting off the computer and unplugging
>> it.  :-( 
> Yes, well said.  A disconnected and switched off PC is probably quite secure, 
> but what use is this to anybody.  LOL!  The effectiveness of PC security is 
> challenged on a daily basis and you eventually have to arrive at a personal 
> trade-off between security and usability.
>

This is what I run into with this new password project.  I want one that
is easy for me to remember, easy to type and such but I also want it to
where some script kiddy can't crack it in like 10 seconds while laughing
his/her fool head off at me.  The decision to use a tool like LastPass,
or any other tool for that matter, also means a trade off.  Anything we
use will expose us to something.  That said, not using one exposes us to
something else, even if it is just bad ways to deal with passwords. 
Using one password on several sites is one thing that jumps to my mind. 
We just have to try to be reasonable about it.  One thing about this,
I'm putting more effort into one password than most do for every
password they have. 

Now to play with the strength meters some more. 

Dale

:-)  :-)



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Mick wrote:
> On Tuesday, 5 February 2019 10:13:44 GMT Dale wrote:
>
>> After seeing your reply, I realize I just type the command and it
>> prompts me for a password.  I ctrl c to exit.  Well, ain't that
>> something?  You can stop laughing now.  ;-) 
>>
>> It seems to think helloworld and reallysecurepassword is OK.  I have to
>> question just how good this tool is at this point.  
> Quite!
>
> I think the cracklib acceptance parameters are not as strict as they could 
> have been for modern computing, but I don't know how to tweak them.  With 
> johntheripper you have many options to tweak the characters tested, length, 
> etc. when checking a password.
>
> PS.  I wasn't laughing at you, I was laughing at the passwords cracklib 
> thought were OK.

I'm emerging john* or at least it's thinking on it. 

I was talking about you laughing at my comment about the idiot in the
chair who was using the command wrong.  I have to admit, I was laughing
at myself over here.  lol  I might add, I did try to get a man page or
-h to help but it didn't. 

I've got my password down to something I can remember and isn't to bad
to type.  The password strength meter thingys, while not perfect either,
do say it is a strong one.  My looking at it says it is strong too.  I
just can't imagine anyone guessing it.  It's so random and such that I
think it would be very difficult to crack.  Even if one could, it would
take a fairly long time even with some pretty fast puters.  It may not
be NSA proof either but I suspect it would take even them a while. 
Still, I'd like to test this thing really well if I can find a tool that
can really do it properly.  We already know the meter sites aren't
trustworthy.  It seems cracklib isn't quite there either.  Moving on. 

Thanks for the help.  By the time I get around to using this thing, it
may be easy to crack with some laser type puter or something. 

Dale

:-)  :-) 



[gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Nikos Chantziaras

On 04/02/2019 22:49, Dale wrote:

Also, if my computer were to
die a sudden death, power supply goes bonkers and burns everything in it
up including hard drives, my passwords are still safe but available.


Firefox stores my login passwords encrypted on a server provided by 
Mozilla. It syncs them between my machines.





Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Mick
On Tuesday, 5 February 2019 07:55:41 GMT Dale wrote:
> Mick wrote:

> > https://en.wikipedia.org/wiki/LastPass#Security_issues
> > 

> From what I read, no users had their passwords compromised in those.

I read it differently.  LastPass didn't know if any passwds were compromised 
(or wouldn't tell you).  As a precaution they asked users to change their 
master passwd, while they changed their server's salt.  In addition, there 
were XSS vulnerabilities later on, which is probably to be expected with 
JavaScript and similar technologies.


> As
> I pointed out earlier, the passwords are already encrypted when they are
> sent to LastPass.  If I called LastPass, could prove I am who I claim to
> be and asked them for a password to a site, they couldn't give it to me
> because it is encrypted when it leaves my machine. 

I don't know exactly how the LastPass architecture is configured, other than 
it relies on device based encryption activated with JavaScript, but anomalies 
they observed in incoming and outgoing traffic on the 2011 incident indicate 
someone was interfering with their data streams.  Given Diffie-Hellman could 
be compromised (e.g. as per Logjam) by precomputing some of the most commonly 
used primes in factoring large integers, it may be someone was undertaking 
comparative analysis to deduce ciphers and what not.  If the server salt was 
obtained, then one layer of encryption was compromised.

All this is juxtaposition and my hypothesizing does not mean LastPass is not 
useful, or not secure.  It just means its design is not as secure as locally 
run simpler encryption mechanisms, which do not leave your PC and are not 
stored somewhere else.

The greater surface area a security system exposes, the higher likelihood 
someone will take a punt at cracking it.  A browser, sandboxed or not, has far 
too many moving parts and exposed flanks to keep crackers and state actors 
busy.  I expect with advances in AI this effort will accelerate 
logarithmically.


> As I pointed out to Rich, I don't expect these tools to be 100%.  There
> is no perfect password tool or a perfect way to manage them either.  No
> matter what you do, someone can come along and poke a hole in it.  If
> you use a tool, the tool is hackable.  If you use the same password that
> is 40 characters long for several dozen sites, then the site can be
> hacked and they have the password for those other sites as well.  The
> list could go on for ages but it doesn't really change anything.  We do
> the best we can and then hope it is enough.  Using tools is in my
> opinion better than not using a tool at all.  At the least, they will
> have a hard time breaking into a site directly without my password.  It
> beats the alternative which is cutting off the computer and unplugging
> it.  :-( 

Yes, well said.  A disconnected and switched off PC is probably quite secure, 
but what use is this to anybody.  LOL!  The effectiveness of PC security is 
challenged on a daily basis and you eventually have to arrive at a personal 
trade-off between security and usability.

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Mick
On Tuesday, 5 February 2019 10:13:44 GMT Dale wrote:

> After seeing your reply, I realize I just type the command and it
> prompts me for a password.  I ctrl c to exit.  Well, ain't that
> something?  You can stop laughing now.  ;-) 
> 
> It seems to think helloworld and reallysecurepassword is OK.  I have to
> question just how good this tool is at this point.  

Quite!

I think the cracklib acceptance parameters are not as strict as they could 
have been for modern computing, but I don't know how to tweak them.  With 
johntheripper you have many options to tweak the characters tested, length, 
etc. when checking a password.

PS.  I wasn't laughing at you, I was laughing at the passwords cracklib 
thought were OK.
-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Michael Schwartzkopff wrote:
> Am 05.02.19 um 10:55 schrieb Mick:
>> On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:
>>
>>> Sort of picking a random message to reply to here.  Someone sent a reply
>>> off list about checking passwords on my system with tools available.
>>> They also mentioned not trusting strength meters which I can get since
>>> they pass some obvious passwords.  I used three meters and some sort of
>>> common sense as well.  I found cracklib-check after some digging.  I
>>> used that to try to check my password and get this weird response. 
>>>
>>> -su: me-supper-secret-password-here;): event not found
>>>
>>> I'm going to try to emulate my password without actually posting it, for
>>> obvious reasons.  You all are smart enough to understand why.  ROFL  It
>>> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
>>> tell, I use some of those things on the tops of the number keys.  It
>>> seems that confuses cracklib just a bit.  BTW, I was running that as
>>> root just to be sure it wasn't a permissions issue.  I tried a few
>>> different things but it seems the "!" is triggering that at least, maybe
>>> others too.  The command works fine with just normal stuff.
>> Hmm ... I don't get such problem here, when I run cracklib as a plain user:
>>
>> $ cracklib-check
>> password
>> password: it is based on a dictionary word
>> p4ssw0rd
>> p4ssw0rd: it is based on a dictionary word
>> p477w0rd
>> p477w0rd: OK
>> !sdER*ark4567#
>> !sdER*ark4567#: OK
>> helloworld
>> helloworld: OK
>> reallysecurepassword
>> reallysecurepassword: OK
>>
>> LOL!
>>
>> Could it be something to do with your terminal/shell?  I've run the above 
>> with 
>> bash in a urxvt terminal.
>>
>>
>>> That leads
>>> me to this question.  Is there a tool I can use/install that will test a
>>> password, try to crack it if you will, that will work regardless of the
>>> characters used?  In other words, it doesn't mind the things on top of
>>> the number keys. 
>>>
>>> BTW, I've also whittled it down to something a little easier to type
>>> too.  Feel sorry for any poor fool trying to just guess it.  lol  May
>>> have better luck with P vs NP.  ;-)
>>>
>>> Thanks.
>>>
>>> Dale
>>>
>>> :-)  :-) 
>> I've used app-crypt/johntheripper in the distant past, but you'll need a 
>> good 
>> word list for it to be useful.  Some of the wordlists I had found at the 
>> time 
>> were too big to download over dial-up!  :p
>>
> A good password also has to be memorizable. See:
>
> https://xkcd.com/936/
>
>
> Mit freundlichen Grüßen,
>


That's the problem.  I want one really good password that would be
virtually impossible even for someone who knows me to guess.  Doing that
and being able to remember it plus be relatively easy to remember
complicates things a lot.  While at it, I'd like it to be hard to crack
as well.  Even with these password test tools, that is proving to be
hard to know for sure.  I have one that I know would be hard to guess
and I think it would be hard to crack as well but I don't know that last
part for sure, yet anyway. 

Thanks.  It's a work in progress still. 

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Dale
Mick wrote:
> On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:
>
>> Sort of picking a random message to reply to here.  Someone sent a reply
>> off list about checking passwords on my system with tools available.
>> They also mentioned not trusting strength meters which I can get since
>> they pass some obvious passwords.  I used three meters and some sort of
>> common sense as well.  I found cracklib-check after some digging.  I
>> used that to try to check my password and get this weird response. 
>>
>> -su: me-supper-secret-password-here;): event not found
>>
>> I'm going to try to emulate my password without actually posting it, for
>> obvious reasons.  You all are smart enough to understand why.  ROFL  It
>> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
>> tell, I use some of those things on the tops of the number keys.  It
>> seems that confuses cracklib just a bit.  BTW, I was running that as
>> root just to be sure it wasn't a permissions issue.  I tried a few
>> different things but it seems the "!" is triggering that at least, maybe
>> others too.  The command works fine with just normal stuff.
> Hmm ... I don't get such problem here, when I run cracklib as a plain user:
>
> $ cracklib-check
> password
> password: it is based on a dictionary word
> p4ssw0rd
> p4ssw0rd: it is based on a dictionary word
> p477w0rd
> p477w0rd: OK
> !sdER*ark4567#
> !sdER*ark4567#: OK
> helloworld
> helloworld: OK
> reallysecurepassword
> reallysecurepassword: OK
>
> LOL!
>
> Could it be something to do with your terminal/shell?  I've run the above 
> with 
> bash in a urxvt terminal.
>
>


He he he he.  It was the idiot in the chair.  The idiot in the chair
thought it was done this way, like I saw on a website that must be
outdated. 

root@fireball / # cracklib-check !sdER*ark4567#
-su: !sdER: event not found
root@fireball / #

After seeing your reply, I realize I just type the command and it
prompts me for a password.  I ctrl c to exit.  Well, ain't that
something?  You can stop laughing now.  ;-) 

It seems to think helloworld and reallysecurepassword is OK.  I have to
question just how good this tool is at this point.  Maybe I need to
install some more stuff here.  Pardon me while I go find some more of
this.  Something has to be missing.  :/

Dale

:-)  :-) 



Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Michael Schwartzkopff
Am 05.02.19 um 10:55 schrieb Mick:
> On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:
>
>> Sort of picking a random message to reply to here.  Someone sent a reply
>> off list about checking passwords on my system with tools available.
>> They also mentioned not trusting strength meters which I can get since
>> they pass some obvious passwords.  I used three meters and some sort of
>> common sense as well.  I found cracklib-check after some digging.  I
>> used that to try to check my password and get this weird response. 
>>
>> -su: me-supper-secret-password-here;): event not found
>>
>> I'm going to try to emulate my password without actually posting it, for
>> obvious reasons.  You all are smart enough to understand why.  ROFL  It
>> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
>> tell, I use some of those things on the tops of the number keys.  It
>> seems that confuses cracklib just a bit.  BTW, I was running that as
>> root just to be sure it wasn't a permissions issue.  I tried a few
>> different things but it seems the "!" is triggering that at least, maybe
>> others too.  The command works fine with just normal stuff.
> Hmm ... I don't get such problem here, when I run cracklib as a plain user:
>
> $ cracklib-check
> password
> password: it is based on a dictionary word
> p4ssw0rd
> p4ssw0rd: it is based on a dictionary word
> p477w0rd
> p477w0rd: OK
> !sdER*ark4567#
> !sdER*ark4567#: OK
> helloworld
> helloworld: OK
> reallysecurepassword
> reallysecurepassword: OK
>
> LOL!
>
> Could it be something to do with your terminal/shell?  I've run the above 
> with 
> bash in a urxvt terminal.
>
>
>> That leads
>> me to this question.  Is there a tool I can use/install that will test a
>> password, try to crack it if you will, that will work regardless of the
>> characters used?  In other words, it doesn't mind the things on top of
>> the number keys. 
>>
>> BTW, I've also whittled it down to something a little easier to type
>> too.  Feel sorry for any poor fool trying to just guess it.  lol  May
>> have better luck with P vs NP.  ;-)
>>
>> Thanks.
>>
>> Dale
>>
>> :-)  :-) 
> I've used app-crypt/johntheripper in the distant past, but you'll need a good 
> word list for it to be useful.  Some of the wordlists I had found at the time 
> were too big to download over dial-up!  :p
>
A good password also has to be memorizable. See:

https://xkcd.com/936/


Mit freundlichen Grüßen,

-- 

[*] sys4 AG
 
https://sys4.de, +49 (89) 30 90 46 64
Schleißheimer Straße 26/MG,80333 München
 
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer, Wolfgang Stief
Aufsichtsratsvorsitzender: Florian Kirstein




signature.asc
Description: OpenPGP digital signature


Re: [gentoo-user] Coming up with a password that is very strong.

2019-02-05 Thread Mick
On Tuesday, 5 February 2019 06:48:53 GMT Dale wrote:

> Sort of picking a random message to reply to here.  Someone sent a reply
> off list about checking passwords on my system with tools available.
> They also mentioned not trusting strength meters which I can get since
> they pass some obvious passwords.  I used three meters and some sort of
> common sense as well.  I found cracklib-check after some digging.  I
> used that to try to check my password and get this weird response. 
> 
> -su: me-supper-secret-password-here;): event not found
> 
> I'm going to try to emulate my password without actually posting it, for
> obvious reasons.  You all are smart enough to understand why.  ROFL  It
> has some of the following 'stuff' in it.  !sdER*ark4567#  As you can
> tell, I use some of those things on the tops of the number keys.  It
> seems that confuses cracklib just a bit.  BTW, I was running that as
> root just to be sure it wasn't a permissions issue.  I tried a few
> different things but it seems the "!" is triggering that at least, maybe
> others too.  The command works fine with just normal stuff.

Hmm ... I don't get such problem here, when I run cracklib as a plain user:

$ cracklib-check
password
password: it is based on a dictionary word
p4ssw0rd
p4ssw0rd: it is based on a dictionary word
p477w0rd
p477w0rd: OK
!sdER*ark4567#
!sdER*ark4567#: OK
helloworld
helloworld: OK
reallysecurepassword
reallysecurepassword: OK

LOL!

Could it be something to do with your terminal/shell?  I've run the above with 
bash in a urxvt terminal.


> That leads
> me to this question.  Is there a tool I can use/install that will test a
> password, try to crack it if you will, that will work regardless of the
> characters used?  In other words, it doesn't mind the things on top of
> the number keys. 
> 
> BTW, I've also whittled it down to something a little easier to type
> too.  Feel sorry for any poor fool trying to just guess it.  lol  May
> have better luck with P vs NP.  ;-)
> 
> Thanks.
> 
> Dale
> 
> :-)  :-) 

I've used app-crypt/johntheripper in the distant past, but you'll need a good 
word list for it to be useful.  Some of the wordlists I had found at the time 
were too big to download over dial-up!  :p

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Mick
On Tuesday, 5 February 2019 08:41:28 GMT Neil Bothwick wrote:
> On Mon, 04 Feb 2019 23:26:52 +, Mick wrote:
> > You could use gpg/openssl to encrypt a number of files, which would
> > contain your different website/application passwds.
> 
> pass does exactly that
> 
> * app-admin/pass
>  Available versions:  1.7.3 ** {X dmenu emacs fish-completion +git
> importers zsh-completion ELIBC="Darwin"} Homepage:
> https://www.passwordstore.org/
>  Description: Stores, retrieves, generates, and synchronizes passwords
> securely

What do you know?!  Someone else thought of it too.  :-)

Thanks Neil, this looks interesting and seems way more advanced than my simple 
one-liner.

-- 
Regards,
Mick

signature.asc
Description: This is a digitally signed message part.


Re: [gentoo-user] Re: Coming up with a password that is very strong.

2019-02-05 Thread Neil Bothwick
On Mon, 04 Feb 2019 23:26:52 +, Mick wrote:

> You could use gpg/openssl to encrypt a number of files, which would
> contain your different website/application passwds.

pass does exactly that

* app-admin/pass
 Available versions:  1.7.3 ** {X dmenu emacs fish-completion +git 
importers zsh-completion ELIBC="Darwin"}
 Homepage: https://www.passwordstore.org/
 Description: Stores, retrieves, generates, and synchronizes passwords 
securely


-- 
Neil Bothwick

"There are some ideas so idiotic that only an intellectual could believe
them" George Orwell


pgp3m_v20rIeD.pgp
Description: OpenPGP digital signature