On Dec 23, 2007 11:00 PM, Ken Schaefer <[EMAIL PROTECTED]> wrote:
>>  Brute force attacks can be effective against even long passwords,
>
> Really? How long do you think it woudl take you to brute force a 15 
> character, complex, password, over FTP?

  It all depends on how you define "long" and "complex".  And I missed
the part where this was over FTP.  But yes, if you have a 20 character
password consisting of an evenly-distributed random selection all
possible characters one can type on a keyboard, and you're connected
via remote Internet link, it will be very hard to brute force in
reasonable time.  Or even unreasonable time.  But if you're on the LAN
and the password is "jsmith02051982" or some other similar password
that's very likely to be in actual use in the real world, then not so
much.

  Yes, one can -- and, indeed, should -- decry weak passwords as a big
practical security problem.  That doesn't mean the situation isn't
realistic.  It also doesn't mean countermeasures against
brute/dictionary attacks should be abandoned.

> Total effort is more than writing a few lines of code (someone has to do the 
> documentation, it needs to work other APIs,
> ISVs would need to be notified, SDKs/documentation would need to be updated, 
> regression tests and threat models
> written and tested etc)

  I think you're being needlessly difficult here, so I'll respond in
kind:   Lack of documentation has never stopped Microsoft before.
Working with other APIs is a no-op; this is a delay in the password
validation routine, not something that communicates with other code.
ISVs can presumably be notified via all the usual press
release/newsletter.  SDK is a no-op (ibid).  Documentation you already
mentioned.  Threat models?  All you need is something that repeatedly
tries the same (incorrect) password.  I can do that in a batch file.

  Regression testing is the one significant and legitimate objection
in your list.  Code/behavior changes can have surprising
repercussions, and for something as commonly needed as password
validation, there are a lot of places it could hit.  Touche.

  But I maintain, compared to all the resources Microsoft puts into
much less productive ends, this would be a justifiable and reasonable
persuit.  But I suppose Microsoft has better things to do, like
writing the next version of Active Windows Desktop Search Live
Ultimate Edition .NET Professional.  Hurmph.

-- Ben

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to