Thor, et al Your statement:
"You have to "crack" the hash in singularity..." Is only partially true. I've noticed that LC5 is capable of quickly cracking the first "half" of an LM password consisting of two 7 digit words concantenated, provided that the first word is in its dictionary. Of course, the LM password is not as secure, so all the better to go for passphrases. Cheers James James D. Stallard, MIoD Infrastructure Technical Architect Web: www.leafgrove.com LinkedIn: www.linkedin.com/in/jamesdstallard -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Thor (Hammer of God) Sent: 16 August 2007 22:07 To: Ansgar -59cobalt- Wiechers; [email protected] Subject: RE: Password complexity - improvement Ah.... NOW I see what you mean... As in, if you required all 4 complexity requirements, and you knew the first three characters were Aa1, then you'd know for a fact that the last character had to be a "special" character... Only problem with that is that a BF attack does not give us one character at a time. You have to "crack" the hash in singularity... meaning that your BF attempt would not be able to discern that the first 3 were Aa1 in order to only try special characters for the 4th. Nor do you know how long the password is, so you'd have to try all possible characters for each column. Which means, the more keyspace == more combinations again. This is particularly true when you consider that requiring ALL complexity requirements does not preempt one from using more than one as in Aa11aA$$$%%%Aa11. So, even knowing the complexity rules are in place don't really help you. Interesting thread, though. t > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Ansgar -59cobalt- > Wiechers > Sent: Thursday, August 16, 2007 11:08 AM > To: [email protected] > Subject: Re: Password complexity - improvement > > Bruce, > > On 2007-08-16 Bruce K. Marshall wrote: > > Requiring users to create a password of uppercase, lowercase, > numbers, > > and symbols encourages stronger passwords, not weaker ones. The loss > > of possible password choices is negligible and has no negative > impacts > > other than on the usability of the passwords themselves. I'll be > > happy to share the math backing this up if you really want to argue > > the point. > > I do not agree that the loss of possible passwords is necessarily > negligible. I'd like to see the math to back up this assumption. And in > any case the decrease of the total amount of possible passwords does by > definition mean you have a negative impact on security. The impact may > indeed be negligible, but you still need to be aware of the fact to > make the distinction. > > Besides, even complexity requirements can't replace user education. A > password like "[EMAIL PROTECTED]" would be compliant to the policy in question and > still susceptible to dictionary attacks. > > Regards > Ansgar Wiechers > -- > "The Mac OS X kernel should never panic because, when it does, it > seriously inconveniences the user." > --http://developer.apple.com/technotes/tn2004/tn2118.html
