Re: [Discuss] KeePassX

2013-10-07 Thread Richard Pieri
Edward Ned Harvey (blu) wrote: But guess what. That's why puttygen and truecrypt don't rely on the kernel prng for key generation. They require you to generate your own entropy via mouse control. Which is no guarantee of any sort at all. Fact is, even people with the mathematical chops to

Re: [Discuss] KeePassX

2013-10-06 Thread Edward Ned Harvey (blu)
From: Kent Borg [mailto:kentb...@borg.org] Sent: Wednesday, August 14, 2013 10:25 AM But you don't mean AES-128 can be broken today with 2^64 operations, do you? That sounds wrong--or theoretical. I found my book (Cryptography Engineering) and looked it up. The answer is: Most modern

Re: [Discuss] KeePassX

2013-08-19 Thread Derek Atkins
Richard Pieri richard.pi...@gmail.com writes: Jerry Feldman wrote: I't has been a while, but if I recall, Derek was on a team that cracked an RSA key. I don't remember the details,but I still remember Derek's talk. RSA issued a number of factoring challenges for a range of RSA key sizes

Re: [Discuss] KeePassX

2013-08-17 Thread Richard Pieri
Jerry Feldman wrote: I't has been a while, but if I recall, Derek was on a team that cracked an RSA key. I don't remember the details,but I still remember Derek's talk. RSA issued a number of factoring challenges for a range of RSA key sizes from 100 to 2048 bits:

Re: [Discuss] KeePassX

2013-08-16 Thread Kent Borg
On 08/15/2013 06:35 PM, Edward Ned Harvey (blu) wrote: [...] That's why I only *use* cryptography and don't *create* it. I read a book and took a class on how to *use* cryptography. I am utterly unqualified to create ciphers and hashes. You make such a valuable point. No one should think

Re: [Discuss] KeePassX

2013-08-16 Thread Derek Atkins
Richard Pieri richard.pi...@gmail.com writes: Richard Pieri wrote: Your 4096-bit asymmetric key is either RSA or DH, both of which are VERY slow algorithms, too slow for general use. I correct myself: RSA or DSA. Not DH. Actually you were correct the first time. When you create a DSA key

Re: [Discuss] KeePassX

2013-08-16 Thread Edward Ned Harvey (blu)
From: Kent Borg [mailto:kentb...@borg.org] Sent: Friday, August 16, 2013 8:56 AM Over the years I have spent a lot of time paying attention to cryptography and feel like I have reached the most basic level of competence Read Cryptography Engineering (surprisingly a quick read) and take the

Re: [Discuss] KeePassX

2013-08-16 Thread Richard Pieri
Kent, Critique and review of ciphers is not that simple. Compare RSA to RC4, both developed in part or in total by Ron Rivest. On paper, RSA is a weak algorithm while RC4 is a strong one. In practice, however, RC4 was found to be weak through experimentation while RSA has withstood attack.

Re: [Discuss] KeePassX

2013-08-16 Thread Kent Borg
On 08/16/2013 11:14 AM, Edward Ned Harvey (blu) wrote: Read Cryptography Engineering (surprisingly a quick read) I am at work right now, but I think I already have a copy at home. Looking at preview pages from Google Books everything looks terribly familiar. (But terribly familiar doesn't

Re: [Discuss] KeePassX

2013-08-16 Thread Kent Borg
On 08/16/2013 11:36 AM, Richard Pieri wrote: You need to know how to attack ciphers if you want to critique them. That's why you need a formidable enough reputation, and even possibly an AES-style competition, to get enough public crypto talent beating on your algorithm. And even that

Re: [Discuss] KeePassX

2013-08-16 Thread Edward Ned Harvey (blu)
From: Kent Borg [mailto:kentb...@borg.org] Sent: Friday, August 16, 2013 11:47 AM On 08/16/2013 11:14 AM, Edward Ned Harvey (blu) wrote: Read Cryptography Engineering (surprisingly a quick read) I am at work right now, but I think I already have a copy at home. Looking at preview pages

Re: [Discuss] KeePassX

2013-08-15 Thread Edward Ned Harvey (blu)
From: Kent Borg [mailto:kentb...@borg.org] Sent: Wednesday, August 14, 2013 10:25 AM But you don't mean AES-128 can be broken today with 2^64 operations, do you? That sounds wrong--or theoretical. That is what I'm saying, but it was at least a year or two ago I read that, and I can't seem

Re: [Discuss] KeePassX

2013-08-14 Thread Jerry Feldman
Agreed. But, breaking the session key only works for a single message or a single session. If they want to target a specific individual, breaking the RSA/DSA keys will give them access to all encrypted messages. (within the context is that a sent message is encrypted by the recipient's public

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/14/2013 06:34 AM, Jerry Feldman wrote: Agreed. But, breaking the session key only works for a single message or a single session. If they want to target a specific individual, breaking the RSA/DSA keys will give them access to all encrypted messages. (within the context is that a sent

Re: [Discuss] KeePassX

2013-08-14 Thread Edward Ned Harvey (blu)
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of Daniel Barrett In the absence of the 4096-bit private half of my key, how hard is it to decrypt the session key by brute force and thereby decrypt file Foo? Do the time arguments

Re: [Discuss] KeePassX

2013-08-14 Thread Gregory Boyce
That depends on the cipher in use and if it supports perfect forward secrecy or not. http://en.wikipedia.org/wiki/Perfect_forward_secrecy On 08/14/2013 06:34 AM, Jerry Feldman wrote: Agreed. But, breaking the session key only works for a single message or a single session. If they want to

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/13/2013 05:04 PM, Jerry Feldman wrote: The real issue is determining who and what to monitor. That is the key. For years the idea is that the NSA is selective and decides what traffic to analyze, what messages to try to decrypt, what targets to actively attack (with such things as a

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/13/2013 04:47 PM, Jerry Feldman wrote: Let's take the situation: NSA is watching you. They can intercept your email, crack your RSA or DSA key, and then they can discover the session keys. They are not interested in everybody's random encrypted emails, so if they focus on individuals

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/13/2013 04:30 PM, Daniel Barrett wrote: In the absence of the 4096-bit private half of my key, how hard is it to decrypt the session key by brute force and thereby decrypt file Foo? Do the time arguments from this KeePass discussion apply? There are three approaches they can take, sorted

Re: [Discuss] KeePassX

2013-08-14 Thread Richard Pieri
Jerry Feldman wrote: recipient's public key), so to make this bidierctional they need to break 2 keys, so the job gets more difficult. Breaking the session key The public key is more easily recovered from, say, a public key server. This requires no effort at all. It may be easier -- and it

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/14/2013 09:38 AM, Edward Ned Harvey (blu) wrote: From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of Kent Borg Bruteforcing 128-bits is impossible. Bruteforcing 256-bits is 128-bits times as impossible. Careful here. Someday,

Re: [Discuss] KeePassX

2013-08-14 Thread Jerry Feldman
On 08/14/2013 07:36 AM, Kent Borg wrote: On 08/14/2013 06:34 AM, Jerry Feldman wrote: Agreed. But, breaking the session key only works for a single message or a single session. If they want to target a specific individual, breaking the RSA/DSA keys will give them access to all encrypted

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/14/2013 10:03 AM, Richard Pieri wrote: Certificate + handshake = session key = decrypted session in real time. Any user, any session, any time, any reason. No cryptanalysis needed. No brute force needed. Yes, if the communications uses a broken (lack of) key exchange. Stupidly, SSL

Re: [Discuss] KeePassX

2013-08-14 Thread Richard Pieri
Kent Borg wrote: I didn't realize that SSL was so stupid. Rather important technology was left out of SSL, even though it was already two years old at that point. Grrr. It wasn't left out. It was intentionally excluded. Back in the day, Netscape was under ITAR munitions restrictions. They

Re: [Discuss] KeePassX

2013-08-14 Thread Kent Borg
On 08/14/2013 12:45 PM, Richard Pieri wrote: Do you finally get what I've been on about? You have good points. But I still return to my harping that anything that bends the cost curve up for the NSA ruins their idea of snooping on everything. For example, the third of SSL traffic with good

Re: [Discuss] KeePassX

2013-08-14 Thread Richard Pieri
Kent Borg wrote: Everything is just too big to afford if not at really low bulk rates. Even for the NSA. It's the other way around. The more that is encrypted, the more known text the NSA has available for side-channel attacks. The more that is encrypted, the more chances of a hash collision

Re: [Discuss] KeePassX

2013-08-14 Thread Jerry Feldman
It may not be easier, but it would be more effective when monitoring specific people. On 08/14/2013 10:03 AM, Richard Pieri wrote: Jerry Feldman wrote: recipient's public key), so to make this bidierctional they need to break 2 keys, so the job gets more difficult. Breaking the session key

Re: [Discuss] KeePassX

2013-08-14 Thread Richard Pieri
Jerry Feldman wrote: It may not be easier, but it would be more effective when monitoring specific people. Yes, well, we all know how well the USA PATRIOT Act and Protect America Act have curtailed warrantless surveillance of the general population. The most effective use of large-scale

Re: [Discuss] KeePassX

2013-08-13 Thread Kent Borg
On 07/24/2013 10:32 AM, Kent Borg wrote: I don't know current estimations, but I would use the following guidelines for an encryption key: 32-bits of entropy: stops a naive individual with a day-job 80-bits of entropy: stops a small organization 100-bits of entropy:

Re: [Discuss] KeePassX

2013-08-13 Thread Jack Coats
Guess that is why I like the idea of 4096 bit keys. Paranoid? Only slightly. Overkill? Who knows what is coming next. Would I like it to be better than that? Yes. Do I use is ALL THE TIME? No, not QUITE that paranoid. Now where did I leave my tin foil hat? ... Jack

Re: [Discuss] KeePassX

2013-08-13 Thread Jack Coats
The NSA has computing facilities measured in acres. That we pay for. Thank you. ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss

Re: [Discuss] KeePassX

2013-08-13 Thread Kent Borg
On 08/13/2013 10:43 AM, Jack Coats wrote: Guess that is why I like the idea of 4096 bit keys. At 4096 I think you are talking about RSA or similar asymmetrical keys. Symmetrical keys are far smaller for similar strength. The strength of symmetrical keys are also far easier to estimate, and

Re: [Discuss] KeePassX

2013-08-13 Thread Daniel Barrett
128-bits of entropy:stops the NSA Does this discussion apply to public-key encryption, say, cracking a GPG-encrypted file without the private key? Or just to symmetric encryption where you just have to guess a password? Just wondering how safe a file is when encrypted with a 4096-bit

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
Kent Borg wrote: I feel like you want me to draw a conclusion. Are you saying 80-bits is not pretty dang good? Or are you saying Snowden's trillion a second was wrong? Or something else? I described a home-brew, trillion per second brute force engine that can fit in half a rack of

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
Daniel Barrett wrote: Just wondering how safe a file is when encrypted with a 4096-bit GPG key. GPG doesn't work that way. Your 4096-bit asymmetric key is either RSA or DH, both of which are VERY slow algorithms, too slow for general use. When you encrypt a message, the encryption engine

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
Richard Pieri wrote: Your 4096-bit asymmetric key is either RSA or DH, both of which are VERY slow algorithms, too slow for general use. I correct myself: RSA or DSA. Not DH. -- Rich P. ___ Discuss mailing list Discuss@blu.org

Re: [Discuss] KeePassX

2013-08-13 Thread Kent Borg
On 08/13/2013 01:29 PM, Richard Pieri wrote: If I did my math right, a facility like that can brute-force any 80-bit key in about 32 hours. I'll accept your math, and it makes my point. You describe a facility that can only brute-force a couple hundred 80-bit keys a year. Which means

Re: [Discuss] KeePassX

2013-08-13 Thread John Abreau
Richard Pieri writes: If I did my math right, a facility like that can brute-force any 80-bit key in about 32 hours. If they want to intercept and decrypt *all* traffic, that means decrypting more than one key. I have no idea how much daily encrypted traffic passes through the Internet on an

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
Kent Borg wrote: I'll accept your math, and it makes my point. You describe a facility that can only brute-force a couple hundred 80-bit keys a year. Which means brute-forcing 80-bit keys is not something routine and cheap for the NSA, not when they think they need a plaintext copy of

Re: [Discuss] KeePassX

2013-08-13 Thread Daniel Barrett
On August 13, 2013, Richard Pieri wrote: GPG doesn't work that way[...] When you encrypt a message, the encryption engine generates a random session key. This session key is used to encrypt the message using a symmetric cipher (GnuPG uses CAST-128 by default). The session key is then encrypted

Re: [Discuss] KeePassX

2013-08-13 Thread John Abreau
But - and this is important -- once a given recipient's key is cracked it remains cracked forever. Nope, sorry, each individual message has its own unique session key. Cracking the session key on one particular message tells you nothing about the session key on subsequent messages. On Tue,

Re: [Discuss] KeePassX

2013-08-13 Thread John Abreau
If you're talking about the NSA breaking into each and every person's home and copying their pgp keys off their desktop machine, that's an entirely separate question from intercepting encrypted email traffic as it passes across the Internet. On Tue, Aug 13, 2013 at 4:33 PM, John Abreau

Re: [Discuss] KeePassX

2013-08-13 Thread Jerry Feldman
Let's take the situation: NSA is watching you. They can intercept your email, crack your RSA or DSA key, and then they can discover the session keys. They are not interested in everybody's random encrypted emails, so if they focus on individuals who interest them, the problem becomes smaller.

Re: [Discuss] KeePassX

2013-08-13 Thread John Abreau
If the individual in question encrypts only high-value messages, and doesn't bother encrypting everything else, like grocery lists, birthday greetings, and all their mundane day-to-day communication, then it's easy for the NSA to target their high-value messages and get good results. On the other

Re: [Discuss] KeePassX

2013-08-13 Thread Jerry Feldman
True, but not unsurmountable. Depends on the recipient. Additionally with public key encryption you are using the recipient's public key to encrypt. The real issue is determining who and what to monitor. On 08/13/2013 04:54 PM, John Abreau wrote: If the individual in question encrypts only

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
John Abreau wrote: Nope, sorry, each individual message has its own unique session key. Cracking the session key on one particular message tells you nothing about the session key on subsequent messages. If I decrypt the message by breaking the session key then yes, I can only decrypt that one

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
John Abreau wrote: On the other hand, if the individual routinely encrypts *everything*, and if the metadata does not clearly identify which messages are of interest, then it becomes much harder. You have a routine. You suddenly start encrypting everything. If I compare your pre-everything

Re: [Discuss] KeePassX

2013-08-13 Thread Edward Ned Harvey (blu)
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of John Abreau On the other hand, if the individual routinely encrypts *everything*, and if the metadata does not clearly identify which messages are of interest, then it becomes

Re: [Discuss] KeePassX

2013-08-13 Thread Richard Pieri
Daniel Barrett wrote: In the absence of the 4096-bit private half of my key, how hard is it to decrypt the session key by brute force and thereby decrypt file Foo? Do the time arguments from this KeePass discussion apply? That depends on the symmetric cipher used. CAST-128 (aka CAST5)

Re: [Discuss] KeePassX

2013-07-31 Thread Tom Metro
Greg Rundlett wrote: A quick search through my KeePassX database and my login for Ubuntu forums was cryptographically strong, and (for me) unique to that website. *Every* login I have is unique. I have a simple tool (KeePassX) to mind them all. And I have Dropbox to share the (encrypted)

Re: [Discuss] KeePassX

2013-07-31 Thread Richard Pieri
Tom Metro wrote: A password safe could use strong encryption to protect the keys used by the one-time authentication algorithm. Ideally, you'd want to have the option to have that info encrypted using a different password than the one protecting your passwords. Try this little thought

Re: [Discuss] KeePassX

2013-07-31 Thread Tom Metro
Richard Pieri wrote: Try this little thought experiment. Take all of the passwords that you use on a daily basis. Put them into KeePass or whatever... Now, for one entire day, every time you need a password you MUST use the the [safe] to retrieve it. But that would be silly. Security is

Re: [Discuss] KeePassX

2013-07-31 Thread Chuck Anderson
On Tue, Jul 23, 2013 at 08:11:44PM -0400, Richard Pieri wrote: Tom Metro wrote: A password safe could use strong encryption to protect the keys used by the one-time authentication algorithm. Ideally, you'd want to have the option to have that info encrypted using a different password than the

Re: [Discuss] KeePassX

2013-07-31 Thread Bill Horne
On 7/23/2013 10:43 PM, Tom Metro wrote: (It seems most hack attempts we hear about lately have been against fairly inconsequential sites, where the hackers must be primarily after validated email addresses, and hoping users have reused passwords on multiple sites.) They are primarily after

Re: [Discuss] KeePassX

2013-07-31 Thread Rich Braun
Chuck Anderson suggested: for low value passwords like web forums, just let the browser remember them. I haven't let a browser remember passwords since the time I noticed that I could retrieve (another person's) passwords by sitting at their browser and invoking Settings - Advanced Settings -

Re: [Discuss] KeePassX

2013-07-31 Thread Ben Eisenbraun
On Tue, Jul 23, 2013 at 08:05:18PM -0700, Rich Braun wrote: I haven't let a browser remember passwords since the time I noticed that I could retrieve (another person's) passwords by sitting at their browser and invoking Settings - Advanced Settings - Manage Advanced Passwords - (look at each

Re: [Discuss] KeePassX

2013-07-31 Thread Bill Horne
On 7/24/2013 12:05 AM, Ben Eisenbraun wrote: On Tue, Jul 23, 2013 at 11:16:06PM -0400, Bill Horne wrote: Since my password isn't in a dictionary, and doesn't contain any common substitutions that would allow for guessing, I'm not concerned about the breach. Dictionary attacks are kind of...

Re: [Discuss] KeePassX

2013-07-31 Thread Ben Eisenbraun
On Tue, Jul 23, 2013 at 11:16:06PM -0400, Bill Horne wrote: Since my password isn't in a dictionary, and doesn't contain any common substitutions that would allow for guessing, I'm not concerned about the breach. Dictionary attacks are kind of... passe. It's all password lists culled from

Re: [Discuss] KeePassX

2013-07-31 Thread Kent Borg
On 07/23/2013 11:16 PM, Bill Horne wrote: the hashes allow a Dictionary attack, where they just run every word in the dictionary through a hash function, and see what matches. It depends. Unsalted hashes are vulnerable to dictionary attacks with rainbow tables. But the right (non-Microsoft)

Re: [Discuss] KeePassX

2013-07-31 Thread Kent Borg
On 07/23/2013 06:29 PM, Tom Metro wrote: Good idea, if 1. you have an old phone to dedicate to this, and 2. you don't mind carrying around a phone that is otherwise useless. (I suppose you might be able to make emergency calls on it.) I actually bought a new phone from geekbuying.com. Cost

Re: [Discuss] KeePassX

2013-07-31 Thread Kent Borg
On 07/24/2013 09:56 AM, Edward Ned Harvey (blu) wrote: I am a great fan of BioWallet. You sign the screen with your finger. Your name, a random word, whatever. It works best for handwritten words, and doesn't work so well for geometric shapes, drawings, patterns. It performs bioinformatic

Re: [Discuss] KeePassX

2013-07-31 Thread Richard Pieri
Chuck Anderson wrote: Why? Who says you aren't allowed to remember the ones you most I say it. It's my thought experiment and I deliberately chose a restrictive set of rules for it. -- Rich P. ___ Discuss mailing list Discuss@blu.org

Re: [Discuss] KeePassX

2013-07-31 Thread Kent Borg
On 07/24/2013 01:40 PM, Rich Braun wrote: most people have just plain given up trying to follow best-practices The whole term best practices annoys me. It is so much like a school yard taunt: MY practices are better that yours! No they are not! Mine are Best Practices. (Who the hell signs

Re: [Discuss] KeePassX

2013-07-31 Thread Rich Braun
Rich P wrote: You personally can remember your commonly-used passwords. Can you honestly and truthfully say that about every person in the world? No, you can't. The rules of the experiment are there to put you in the position of someone who can't remember their commonly used passwords, never

Re: [Discuss] KeePassX

2013-07-31 Thread Eric Chadbourne
I keep my passwords, all of which are distinct, in a password protected libreoffice doc. Been working just fine. But then again I'm not being chased around the globe like Ed S. I would suggest this to folks who don't have serious security concerns. Heck everybody knows how to use an office doc

Re: [Discuss] KeePassX

2013-07-31 Thread Richard Pieri
Rich Braun wrote: Knowing all this, and knowing that most people have just plain given up trying to follow best-practices, I've been recommending LastPass.com to my non-technical friends: but their service isn't free on mobile phones so I'm looking for a new recommendation. A piece of paper, a

Re: [Discuss] KeePassX

2013-07-31 Thread Bill Horne
On 7/24/2013 4:18 PM, Richard Pieri wrote: Because writing down passwords itself isn't a bad practice. It's writing them down and putting the paper near the things being protected that's a bad practice. I certainly don't leave the key to my front door hanging from the knob outside. It goes

Re: [Discuss] KeePassX

2013-07-31 Thread Richard Pieri
Bill Horne wrote: Schneier once put a picture of a SecureID token on his website: it was on a live-camera feed from an undisclosed location. He said that the funny thing was that, as long as the device's serial number wasn't disclosed, the thing was still secure. Well, yeah. The codes the