je comprends pas ce qu'il se passe
Le 5 sept. 2014 22:04, "dave paxton" <dpax...@me.com> a écrit :

>  Perfect.  No rudeness here.  Just ideas.  I do think that relying on a
> password as a base system for the private key will be the Achilles heal of
> any system.  Even if you allow for CAPS you will soon have systems that
> will try to pass these in a few million times a second.  As an
> administrator looking for the best route to take then always allow for all
> of the past mistakes made by others to be taken into account.  Wide open
> systems allow for wide open attacks.
>
>
> On 9/5/2014 1:51 PM, flgirl799901 wrote:
>
> I most certainly did NOT hack into anything. I thank you so much for your
> response, but deplore your rudeness
>
>
>  Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone
>
>
> -------- Original message --------
> From: dave paxton <dpax...@me.com> <dpax...@me.com>
> Date:09/05/2014 3:33 PM (GMT-05:00)
> To: openssl-users@openssl.org
> Cc:
> Subject: Re: Certificate pass phrase brute force...
>
> That is easy.  Just restrict the number of different passwords per day.
> Any account.  Thus the old school brute force idea passes out the window.
> Most of what you are looking at it a signing issue.  Basically one person
> does a transaction and the the other person verifies it.  They do the DSA
> and thus they are the same person as they should be.  That is the idea
> anyway.  As far as accounts go that hold those keys then you have the few
> problems.  Did the client get hacked or you?  Who can hack the account like
> our recent icloud picture issue.  All of this is lazy programming.  It is
> really a matter of how certain you are of the client and how you want to
> make sure they are who they are.  No biggie.  Dave.
>
>
> On 9/5/2014 1:03 PM, flgirl799901 wrote:
>
> How do I unsubscribe from all of this?
>
>
>  Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone
>
>
> -------- Original message --------
> From: Gregory Sloop <gr...@sloop.net> <gr...@sloop.net>
> Date:09/05/2014 1:36 PM (GMT-05:00)
> To: openssl-users@openssl.org
> Cc:
> Subject: Certificate pass phrase brute force...
>
> General question:
>
> I've done a number of searches and can't find a lot about the subject.
> [I've searched the list archives too...at least as best I could.]
>
> In several cases, the most obvious being OpenVPN, I use client
> certificates generated by openssl, with a pass-phrase [password]. This
> means that if I ever have someone misplace the certificate, it can't be
> used without the password. [And I have little control about what users do
> with such things - they download and install software they shouldn't; They
> have unknown users use their machines; They get their
> machines/phones/tablets stolen etc.]
>
> However, if someone loses control of the certificate, I need to consider
> the safety of the certificate. [And I have to assume I'll never know they
> lost control of it either.] Assume users are practicing reasonable security
> and it's unlikely an attacker will obtain the pass-phrase when they obtain
> the certificate. [A hard/bad thing to assume, I realize.]
>
> So, I've seen reports of Elcomsoft's tool to attempt ~6K passwords a
> second against a certificate file. Let's assume two orders of magnitude
> better performance for a fairly determined attacker, and we're at 600K
> passwords per second. Three gets us 6M a second.
>
> But even at 6M a sec, a non dictionary guessable pass-phrase of 10
> characters will require ~380 years to break - which isn't too bad, IMO.
>  [Assume a 52 character set. This obviously gets complicated since the
> pass-phase probably isn't completely random etc...but lets assume a
> theoretical 52 character random set.]
>
> But since I can't find any reputable source for this kind of data, I'm
> questioning the assumptions above.
>
> Can anyone give me some pointers at a reputable attempt at quantifying
> this? [The brute-force-ability and the speed at which it might be
> accomplished.]
> Does anyone have a policy about loss of certificates and
> regeneration/revocation along with the underlying reasoning they're willing
> to share?
>
> Or, perhaps I completely misunderstand what's going on, and I'd be glad to
> be corrected. [Gently is always nice.]
>
> TIA
> -Greg
>
>
>
>
>
> --
> Dave Paxtondpaxton@me.com208 570 9755
> skype: dpaxton
>
>
> --
> Dave Paxtondpaxton@me.com208 570 9755
> skype: dpaxton
>
>

Reply via email to