Re: OT:Password strength

2014-12-04 Thread Craig Skinner
On 2014-12-03 Wed 15:04 PM |, Ted Unangst wrote:
 
 If you want strong, short passwords that look ridiculous:
 
 dd if=/dev/random bs=1 count=9 | b64encode password
 

$ pkg_info apg
Information for inst:apg-2.2.3p0

Comment:
automated password generator

Description:
APG (Automated Password Generator) is the tool set for random
password generation. It features: a built-in ANSI X9.17 RNG (Random
Number Generator)(CAST/SHA1), two methods for password generation:
FIPS 181 and truly random, configurable lengths and numbers of
passwords. Two components are supported, a network daemon (apgd)
and a command line client (apg). The command line tool does not
require the network daemon.

Maintainer: The OpenBSD ports mailing-list po...@openbsd.org

WWW: http://www.adel.nursat.kz/apg/


Cheers
-- 
3 days of follk music  dancing in the Scottish Highlands:
https://twitter.com/Craig_Skinner/status/525669043756630016



Re: OT:Password strength

2014-12-03 Thread Tor Houghton
On Sun, Nov 30, 2014 at 04:21:50PM -0500, Ted Unangst wrote:
 On Sun, Nov 30, 2014 at 15:37, thornton.rich...@gmail.com wrote:
  Where do you store these passwords? On a napkin?
 
 Wherever you like. A shorter password with all the o's turned into 0's
 is hardly more secure.
 

I'd say on a napkin until you remember it; which doesn't take long if you
use it several times a day.

Tor



Re: OT:Password strength

2014-12-03 Thread Brad Smith

On 11/30/14 15:20, Ted Unangst wrote:

Examples:

treetykaveprethicooputhedu
soonataviceenoopatecoge
gootrozapiceelytrithunula
preezypeendothanundipeesooka


That defeats the purpose of the second example in the OPs question.

--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



Re: OT:Password strength

2014-12-03 Thread Ted Unangst
On Wed, Dec 03, 2014 at 08:27, Brad Smith wrote:
 On 11/30/14 15:20, Ted Unangst wrote:
 Examples:

 treetykaveprethicooputhedu
 soonataviceenoopatecoge
 gootrozapiceelytrithunula
 preezypeendothanundipeesooka
 
 That defeats the purpose of the second example in the OPs question.
 

If you want strong, short passwords that look ridiculous:

dd if=/dev/random bs=1 count=9 | b64encode password



Re: OT:Password strength

2014-12-03 Thread Jason Adams
On 12/03/2014 12:04 PM, Ted Unangst wrote:
 On Wed, Dec 03, 2014 at 08:27, Brad Smith wrote:
 On 11/30/14 15:20, Ted Unangst wrote:
 Examples:

 treetykaveprethicooputhedu
 soonataviceenoopatecoge
 gootrozapiceelytrithunula
 preezypeendothanundipeesooka
 That defeats the purpose of the second example in the OPs question.

 If you want strong, short passwords that look ridiculous:

 dd if=/dev/random bs=1 count=9 | b64encode password


And then try to remember that mess, or type it, especially into
a smartphone. Gaak! 8-O



-- 
Those who do not understand Unix are condemned to reinvent it, poorly.



Re: OT:Password strength

2014-12-03 Thread Alexander Hall
On December 3, 2014 9:10:42 PM CET, Jason Adams adams...@gmail.com wrote:
On 12/03/2014 12:04 PM, Ted Unangst wrote:
 On Wed, Dec 03, 2014 at 08:27, Brad Smith wrote:
 On 11/30/14 15:20, Ted Unangst wrote:
 Examples:

 treetykaveprethicooputhedu
 soonataviceenoopatecoge
 gootrozapiceelytrithunula
 preezypeendothanundipeesooka
 That defeats the purpose of the second example in the OPs question.

 If you want strong, short passwords that look ridiculous:

 dd if=/dev/random bs=1 count=9 | b64encode password


And then try to remember that mess, or type it, especially into
a smartphone. Gaak! 8-O

base64 ain't that bad, but might lack those special symbols which we all know 
makes all the difference between a bad and a good password...



Re: [Bulk] Re: OT:Password strength

2014-12-03 Thread Kevin Chadwick
On Wed, 03 Dec 2014 22:53:22 +0100
Alexander Hall wrote:

  If you want strong, short passwords that look ridiculous:
 
  dd if=/dev/random bs=1 count=9 | b64encode password
   
 
 And then try to remember that mess, or type it, especially into
 a smartphone. Gaak! 8-O  
 
 base64 ain't that bad, but might lack those special symbols which we all know 
 makes all the difference between a bad and a good password...

This is what I came up with

#!/bin/sh
n=$1
max=500
rn=$(($RANDOM %max + 1 ))
[[ -n $n ]] || n=12
if [[ $n -lt 8 ]]; then
echo Using 12 as the password length, a length of $n would be too weak
fi
rn2=$rn
let rn2=$rn2+$n-1
p=$( /bin/dd if=/dev/urandom bs=2000 count=1 2/dev/null | tr -cd 
a-zA-Z0-9?.,!\-()@/:_;+%*=$[]{}/\~^#| | cut -c $rn-$rn2 )
echo ${p}



Re: OT:Password strength

2014-12-03 Thread Brad Smith

On 12/03/14 15:04, Ted Unangst wrote:

On Wed, Dec 03, 2014 at 08:27, Brad Smith wrote:

On 11/30/14 15:20, Ted Unangst wrote:

Examples:

treetykaveprethicooputhedu
soonataviceenoopatecoge
gootrozapiceelytrithunula
preezypeendothanundipeesooka


That defeats the purpose of the second example in the OPs question.



If you want strong, short passwords that look ridiculous:

dd if=/dev/random bs=1 count=9 | b64encode password


Still not getting it.

--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



Re: OT:Password strength

2014-12-03 Thread Eric Furman
On Wed, Dec 3, 2014, at 08:27 AM, Brad Smith wrote:
 On 11/30/14 15:20, Ted Unangst wrote:
  Examples:
 
  treetykaveprethicooputhedu
  soonataviceenoopatecoge
  gootrozapiceelytrithunula
  preezypeendothanundipeesooka
 
 That defeats the purpose of the second example in the OPs question.

I think I like Schneier's scheme:
So if you want your password to be hard to guess, you should choose
something that this process will miss. My advice is to take a sentence
and turn it into a password. Something like This little piggy went to
market might become tlpWENT2m. That nine-character password won't be
in anyone's dictionary. Of course, don't use this one, because I've
written about it. Choose your own sentence -- something personal.
https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html

This scheme generates long hard passwords that are fairly easy to
remember.
And if I had read this article first I never would have asked my
original question.
Thanks to all who contributed, but I think we can kill this thread now.



Re: OT:Password strength

2014-12-03 Thread Theo de Raadt
From owner-misc+M145030=deraadt=cvs.openbsd@openbsd.org Wed Dec  3 
20:37:28 2014
Delivered-To: dera...@cvs.openbsd.org
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=fastmail.net; h= 
message-id:x-sasl-enc:from:to:cc:mime-version 
:content-transfer-encoding:content-type:subject:date:in-reply-to :references; 
s=mesmtp; bh=N05hQ0kRdtamdXiI1uPUYYy4D/4=; b=iA54AY 
ZyBQ3QX5T6ydBrioyWSy2EirHi4z0WRKUcPO8g1TG5UXqeODEtuA0N/7HR0Vfqpf 
IxWfA/cECXnW2CRgxfbAuLyM5lC6/aNxeOYMQFWk4lvk2bG5OQ9LlI3YfD8t03aG 
aGpj4kEdGlfRI82Ol9CYUc2K/x6LeqSGdRLZE=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; 
h=message-id:x-sasl-enc:from:to:cc 
:mime-version:content-transfer-encoding:content-type:subject 
:date:in-reply-to:references; s=smtpout; bh=N05hQ0kRdtamdXiI1uPU YYy4D/4=; 
b=EmDvqWm+BO76xbaxG50X0DaOQVnloAlOTlWNz4FVQpekab134n7N 
R2VEC9YywqMmdYI2nLDXYQ3eDh5yj0f+ordWvFaWPidz+GxTJ3EM1ZU30ywQVMPJ 
CSbO/+h4Cw4xQklCxk602nePjo/RtEELvBXDOz1tflZDcDMoy83HG+Y=
X-Sasl-Enc: MhT9Z3YiPDIsQoZKvCLrU99Bm5DjpuN8O7iVQLFa843l 1417664177
From: Eric Furman ericfur...@fastmail.net
To: Brad Smith b...@comstyle.com
Cc: Ted Unangst t...@tedunangst.com, OpenBSD Misc misc@openbsd.org
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-Mailer: MessagingEngine.com Webmail Interface - html
Subject: Re: OT:Password strength
Date: Wed, 03 Dec 2014 22:36:17 -0500
In-Reply-To: 547f0fb8.6070...@comstyle.com
References: 
1417316824.2046833.196840165.39fa2...@webmail.messagingengine.com 
9ea3e8f9bed545a68834d6bd42a0a...@tedunangst.com 
547f0fb8.6070...@comstyle.com
List-Help: mailto:majord...@openbsd.org?body=help
List-ID: misc.openbsd.org
List-Owner: mailto:owner-m...@openbsd.org
List-Post: mailto:misc@openbsd.org
List-Subscribe: mailto:majord...@openbsd.org?body=sub%20misc
List-Unsubscribe: mailto:majord...@openbsd.org?body=unsub%20misc
X-Loop: misc@openbsd.org
Precedence: list
Sender: owner-m...@openbsd.org

On Wed, Dec 3, 2014, at 08:27 AM, Brad Smith wrote:
 On 11/30/14 15:20, Ted Unangst wrote:
  Examples:
 
  treetykaveprethicooputhedu
  soonataviceenoopatecoge
  gootrozapiceelytrithunula
  preezypeendothanundipeesooka
 
 That defeats the purpose of the second example in the OPs question.

I think I like Schneier's scheme:
So if you want your password to be hard to guess, you should choose
something that this process will miss. My advice is to take a sentence
and turn it into a password. Something like This little piggy went to
market might become tlpWENT2m. That nine-character password won't be
in anyone's dictionary. Of course, don't use this one, because I've
written about it. Choose your own sentence -- something personal.
https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html

This scheme generates long hard passwords that are fairly easy to
remember.
And if I had read this article first I never would have asked my
original question.
Thanks to all who contributed, but I think we can kill this thread now.



Re: OT:Password strength

2014-11-30 Thread Ted Unangst
On Sat, Nov 29, 2014 at 22:07, Eric Furman wrote:
 OFF TOPIC. This has nothing to do with OpenBSD,
 but a lot of guys here know about this stuff.
 I've done some reading, but still not sure.
 OK, at the risk of looking stupid,which of these passwords is better;
 kMH65?3
 or
 mylittlelambjumpedovertenredbarns

I think it's a mistake to reverse a password into entropy. If your
pool of possible passwords is sentences from common nursery rhymes,
for example, they may look awesome but in reality there are only a few
thousand possibilities.

Instead, pick a generating algorithm. It can be random letters, random
symbols, whatever. Random words. Random fake words consisting of
alternating consonants and vowels. You know how big the search space
is for each atom. Divide desired password strength (e.g. 64 bits) by
bits per atom to determine required number of atoms.

For the consonant/vowel example, here's a luajit script that makes
passwords. Even though they are all lower case, they are at least 64
bits hard.

local letters = {
c, k, t, tr, rt, p, pr, d,
v, n, l, nd, z, g, th, s }
local vowels = { a, e, i, o, u, y, oo, ee }

local letterbits = 4
local vowelbits = 3

local wantedbits = 64

local bits = 0

local ffi = require ffi
ffi.cdef[[uint32_t arc4random_uniform(uint32_t);]]
local function rand(max)
return ffi.C.arc4random_uniform(max) + 1
end 

local atoms = { }
while bits  wantedbits do
table.insert(atoms, letters[rand(16)])
table.insert(atoms, vowels[rand(8)])
bits = bits + letterbits + vowelbits
end 
print(table.concat(atoms))

Examples:

treetykaveprethicooputhedu
soonataviceenoopatecoge
gootrozapiceelytrithunula
preezypeendothanundipeesooka



Re: OT:Password strength

2014-11-30 Thread Miod Vallat
 Examples:
 
 treetykaveprethicooputhedu
 soonataviceenoopatecoge
 gootrozapiceelytrithunula
 preezypeendothanundipeesooka

These stand no chance against a finnish attacker!

Miod



Re: OT:Password strength

2014-11-30 Thread thornton . richard
Where do you store these passwords? On a napkin?

  Original Message  
From: Ted Unangst
Sent: Sunday, November 30, 2014 3:21 PM
To: Eric Furman
Cc: OpenBSD Misc
Subject: Re: OT:Password strength

On Sat, Nov 29, 2014 at 22:07, Eric Furman wrote:
 OFF TOPIC. This has nothing to do with OpenBSD,
 but a lot of guys here know about this stuff.
 I've done some reading, but still not sure.
 OK, at the risk of looking stupid,which of these passwords is better;
 kMH65?3
 or
 mylittlelambjumpedovertenredbarns

I think it's a mistake to reverse a password into entropy. If your
pool of possible passwords is sentences from common nursery rhymes,
for example, they may look awesome but in reality there are only a few
thousand possibilities.

Instead, pick a generating algorithm. It can be random letters, random
symbols, whatever. Random words. Random fake words consisting of
alternating consonants and vowels. You know how big the search space
is for each atom. Divide desired password strength (e.g. 64 bits) by
bits per atom to determine required number of atoms.

For the consonant/vowel example, here's a luajit script that makes
passwords. Even though they are all lower case, they are at least 64
bits hard.

local letters = {
c, k, t, tr, rt, p, pr, d,
v, n, l, nd, z, g, th, s }
local vowels = { a, e, i, o, u, y, oo, ee }

local letterbits = 4
local vowelbits = 3

local wantedbits = 64

local bits = 0

local ffi = require ffi
ffi.cdef[[uint32_t arc4random_uniform(uint32_t);]]
local function rand(max)
return ffi.C.arc4random_uniform(max) + 1
end 

local atoms = { }
while bits  wantedbits do
table.insert(atoms, letters[rand(16)])
table.insert(atoms, vowels[rand(8)])
bits = bits + letterbits + vowelbits
end 
print(table.concat(atoms))

Examples:

treetykaveprethicooputhedu
soonataviceenoopatecoge
gootrozapiceelytrithunula
preezypeendothanundipeesooka



Re: OT:Password strength

2014-11-30 Thread Ted Unangst
On Sun, Nov 30, 2014 at 15:37, thornton.rich...@gmail.com wrote:
 Where do you store these passwords? On a napkin?

Wherever you like. A shorter password with all the o's turned into 0's
is hardly more secure.



Re: OT:Password strength

2014-11-30 Thread thornton . richard
I get why network admins and CIO types live and breath security and hardened 
passwords, but the average user has gone mad. I like leading alpha characters 
in combination with an old phone number, with a few non-alpha‎ characters, 
leading and trailing. Thus a password that I can remember, but not something 
easy to guess. Example: I worked at Empire Blue Cross 20 years ago. My phone 
was x3699.   212 476 3699. Thus say, =EmpBC3699 would be fairly good, and I 
could recall it without writing it down.    One could say that 3699 is too 
easy, perhaps, buts its a quick example of a easy analog way to create a 
password which is ok, and easy to remember.

  Original Message  
From: Ted Unangst
Sent: Sunday, November 30, 2014 4:21 PM
To: thornton.rich...@gmail.com
Cc: Eric Furman; OpenBSD Misc
Subject: Re: OT:Password strength

On Sun, Nov 30, 2014 at 15:37, thornton.rich...@gmail.com wrote:
 Where do you store these passwords? On a napkin?

Wherever you like. A shorter password with all the o's turned into 0's
is hardly more secure.



Re: OT:Password strength

2014-11-30 Thread Eric Furman
On Sun, Nov 30, 2014, at 05:02 PM, thornton.rich...@gmail.com wrote:
 I get why network admins and CIO types live and breath security and
 hardened passwords, but the average user has gone mad. I like leading
 alpha characters in combination with an old phone number, with a few
 non-alpha‎ characters, leading and trailing. Thus a password that I can
 remember, but not something easy to guess. Example: I worked at Empire
 Blue Cross 20 years ago. My phone was x3699.   212 476 3699. Thus say,
 =EmpBC3699 would be fairly good, and I could recall it without writing
 it down.    One could say that 3699 is too easy, perhaps, buts its a
 quick example of a easy analog way to create a password which is ok, and
 easy to remember.

But according to this article;
https://www.schneier.com/blog/archives/2007/01/choosing_secure.html

if an attacker did have some of this personal info your password
would be easy to crack.



Re: OT:Password strength

2014-11-30 Thread Eric Furman
On Sun, Nov 30, 2014, at 03:20 PM, Ted Unangst wrote:
 On Sat, Nov 29, 2014 at 22:07, Eric Furman wrote:
  OFF TOPIC. This has nothing to do with OpenBSD,
  but a lot of guys here know about this stuff.
  I've done some reading, but still not sure.
  OK, at the risk of looking stupid,which of these passwords is better;
  kMH65?3
  or
  mylittlelambjumpedovertenredbarns
 
 I think it's a mistake to reverse a password into entropy. If your
 pool of possible passwords is sentences from common nursery rhymes,
 for example, they may look awesome but in reality there are only a few
 thousand possibilities.
 
 Instead, pick a generating algorithm. It can be random letters, random
 symbols, whatever. Random words. Random fake words consisting of
 alternating consonants and vowels. You know how big the search space
 is for each atom. Divide desired password strength (e.g. 64 bits) by
 bits per atom to determine required number of atoms.
 
 For the consonant/vowel example, here's a luajit script that makes
 passwords. Even though they are all lower case, they are at least 64
 bits hard.
 
 local letters = {
 c, k, t, tr, rt, p, pr, d,
 v, n, l, nd, z, g, th, s }
 local vowels = { a, e, i, o, u, y, oo, ee }
 
 local letterbits = 4
 local vowelbits = 3
 
 local wantedbits = 64
 
 local bits = 0
 
 local ffi = require ffi
 ffi.cdef[[uint32_t arc4random_uniform(uint32_t);]]
 local function rand(max)
 return ffi.C.arc4random_uniform(max) + 1
 end 
 
 local atoms = { }
 while bits  wantedbits do
 table.insert(atoms, letters[rand(16)])
 table.insert(atoms, vowels[rand(8)])
 bits = bits + letterbits + vowelbits
 end 
 print(table.concat(atoms))
 
 Examples:
 
 treetykaveprethicooputhedu
 soonataviceenoopatecoge
 gootrozapiceelytrithunula
 preezypeendothanundipeesooka

Bruce Schneier agrees. :)
According to him modern password crackers find string of word passwords,
like in XKCD, to be easy to crack.
https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html

But I can't always use a password manager and those passwords are
impossible to remember.



Re: OT:Password strength

2014-11-30 Thread Eric Furman
On Sun, Nov 30, 2014, at 12:48 AM, Nick Holland wrote:
 On 11/29/14 22:06, Eric Furman wrote:
  OFF TOPIC. This has nothing to do with OpenBSD,
  but a lot of guys here know about this stuff.
  I've done some reading, but still not sure.
  OK, at the risk of looking stupid,which of these passwords is better;
  kMH65?3
  or
  mylittlelambjumpedovertenredbarns
 
 there's an XKCD comic along these lines.  I'm too lazy to dig it up.
 
 It's complicated.
 Both have eight things.  The later is drawn from a much much larger
 set (words (thousands), vs. characters (not 100)).  So, looks like a
 simple win for the second over the first, right?
 
 Problem is the words connect to humans.  little is more likely to be
 followed by lamb than it is red (though if red follows little I
 bet the next word would be wagon).  red is more likely to be
 followed by barn than lamb.  Still, there's a huge number of choices
 for each word, so I'd say the phrases still win.
 
 (sorta related side note: At least with names, there's some curious
 clusters that are seen -- for example, a friend of mine and her two
 siblings have (basically) the same names as three of Adolph Hitler's
 siblings (one is a slight stretch, the other two are dead-on, which is
 impressive considering the very different ethnic backgrounds).  I don't
 think my friend's parents would have permitted this had they known.
 I've seen similar groupings of names in other families.  (Did I just
 win the award for most unexpected use of hitler in an internet
 discussion?))
 
 Simply saying there are X words of five letters or less and there are
 eight of them in my pw means there are X^8 PWs someone would have to try
 to get my PW is wrong by probably several orders of magnitude.  That's
 not how humans pick passwords, and if the computer does it for you, it
 might be as hard or harder than if you use random characters.
 
 Then there is the system where it is stored.  If you are working on a
 stock Solaris 9 or AIX system with the default settings, only the first
 eight chars are used, so the random string is much better than
 mylittle, and if you, like most people, reuse passwords or don't know
 that the target system only uses the first eight characters, you can end
 up using a trivial pw that you thought was really good.

Yes, part of the reason for asking this question was that I am aware
that
some authentication schemes only use the first 8 characters. 
Is there any way of knowing if they do ignore any characters after the
first eight?
Are authentication schemes that don't recognize more than eight
characters
still common?

One of my banking sites won't except certain special characters.
Like $, %, ?
Which messes up my best short passwords that I actually remember.



Re: OT:Password strength

2014-11-30 Thread davidson
On Sun, November 30, 2014 8:09 pm, Eric Furman wrote:
 On Sun, Nov 30, 2014, at 12:48 AM, Nick Holland wrote:
lots snipped
 Then there is the system where it is stored.  If you are working on a
 stock Solaris 9 or AIX system with the default settings, only the first
 eight chars are used, so the random string is much better than
 mylittle, and if you, like most people, reuse passwords or don't know
 that the target system only uses the first eight characters, you can end
 up using a trivial pw that you thought was really good.

 Yes, part of the reason for asking this question was that I am aware
 that some authentication schemes only use the first 8 characters.
 Is there any way of knowing if they do ignore any characters after
 the first eight?

sure.  after setting your password to more than eight characters, try
logging in by entering just the first eight characters.

 Are authentication schemes that don't recognize more than eight
 characters still common?

try it and see.

 One of my banking sites won't except certain special characters.
 Like $, %, ?
 Which messes up my best short passwords that I actually remember.

i too find it annoying when the set of valid password characters is
not listed somewhere easy for the user to find.

-wes



Re: OT:Password strength

2014-11-30 Thread Dennis Davis
On Sun, 30 Nov 2014, Miod Vallat wrote:

 From: Miod Vallat m...@online.fr
 To: Ted Unangst t...@tedunangst.com
 Cc: Eric Furman ericfur...@fastmail.net, OpenBSD Misc misc@openbsd.org
 Date: Sun, 30 Nov 2014 20:34:01
 Subject: Re: OT:Password strength

  Examples:
 
  treetykaveprethicooputhedu
  soonataviceenoopatecoge
  gootrozapiceelytrithunula
  preezypeendothanundipeesooka

 These stand no chance against a finnish attacker!

Are you sure?  I thought these passwords would be low-hanging fruit
for the Swedish chef from the Muppets[1].

[1] http://en.wikipedia.org/wiki/Swedish_Chef
-- 
Dennis Davis dennisda...@fastmail.fm



Re: OT:Password strength

2014-11-30 Thread Darren Spruell
On Sun, Nov 30, 2014 at 7:00 PM, david...@ling.ohio-state.edu wrote:

 On Sun, November 30, 2014 8:09 pm, Eric Furman wrote:
  On Sun, Nov 30, 2014, at 12:48 AM, Nick Holland wrote:
 lots snipped
  Then there is the system where it is stored.  If you are working on a
  stock Solaris 9 or AIX system with the default settings, only the first
  eight chars are used, so the random string is much better than
  mylittle, and if you, like most people, reuse passwords or don't know
  that the target system only uses the first eight characters, you can end
  up using a trivial pw that you thought was really good.
 
  Yes, part of the reason for asking this question was that I am aware
  that some authentication schemes only use the first 8 characters.
  Is there any way of knowing if they do ignore any characters after
  the first eight?

 sure.  after setting your password to more than eight characters, try
 logging in by entering just the first eight characters.

  Are authentication schemes that don't recognize more than eight
  characters still common?

 try it and see.

  One of my banking sites won't except certain special characters.
  Like $, %, ?
  Which messes up my best short passwords that I actually remember.

 i too find it annoying when the set of valid password characters is
 not listed somewhere easy for the user to find.

 -wes




-- 
Darren Spruell
phatbuck...@gmail.com



OT:Password strength

2014-11-29 Thread Eric Furman
OFF TOPIC. This has nothing to do with OpenBSD,
but a lot of guys here know about this stuff.
I've done some reading, but still not sure.
OK, at the risk of looking stupid,which of these passwords is better;
kMH65?3
or
mylittlelambjumpedovertenredbarns



Re: OT:Password strength

2014-11-29 Thread Brian Empson

The latter, I would bet.

On 11/29/2014 10:07 PM, Eric Furman wrote:

OFF TOPIC. This has nothing to do with OpenBSD,
but a lot of guys here know about this stuff.
I've done some reading, but still not sure.
OK, at the risk of looking stupid,which of these passwords is better;
kMH65?3
or
mylittlelambjumpedovertenredbarns




Re: OT:Password strength

2014-11-29 Thread bodie

On 30.11.2014 04:07, Eric Furman wrote:

OFF TOPIC. This has nothing to do with OpenBSD,
but a lot of guys here know about this stuff.
I've done some reading, but still not sure.
OK, at the risk of looking stupid,which of these passwords is better;
kMH65?3
or
mylittlelambjumpedovertenredbarns



Nice updated FAQ about that 
http://www.baekdal.com/insights/the-usability-of-passwords-faq (on start 
it links to original worth-to-read article)




Re: OT:Password strength

2014-11-29 Thread Nick Holland
On 11/29/14 22:06, Eric Furman wrote:
 OFF TOPIC. This has nothing to do with OpenBSD,
 but a lot of guys here know about this stuff.
 I've done some reading, but still not sure.
 OK, at the risk of looking stupid,which of these passwords is better;
 kMH65?3
 or
 mylittlelambjumpedovertenredbarns

there's an XKCD comic along these lines.  I'm too lazy to dig it up.

It's complicated.
Both have eight things.  The later is drawn from a much much larger
set (words (thousands), vs. characters (not 100)).  So, looks like a
simple win for the second over the first, right?

Problem is the words connect to humans.  little is more likely to be
followed by lamb than it is red (though if red follows little I
bet the next word would be wagon).  red is more likely to be
followed by barn than lamb.  Still, there's a huge number of choices
for each word, so I'd say the phrases still win.

(sorta related side note: At least with names, there's some curious
clusters that are seen -- for example, a friend of mine and her two
siblings have (basically) the same names as three of Adolph Hitler's
siblings (one is a slight stretch, the other two are dead-on, which is
impressive considering the very different ethnic backgrounds).  I don't
think my friend's parents would have permitted this had they known.
I've seen similar groupings of names in other families.  (Did I just
win the award for most unexpected use of hitler in an internet
discussion?))

Simply saying there are X words of five letters or less and there are
eight of them in my pw means there are X^8 PWs someone would have to try
to get my PW is wrong by probably several orders of magnitude.  That's
not how humans pick passwords, and if the computer does it for you, it
might be as hard or harder than if you use random characters.

Then there is the system where it is stored.  If you are working on a
stock Solaris 9 or AIX system with the default settings, only the first
eight chars are used, so the random string is much better than
mylittle, and if you, like most people, reuse passwords or don't know
that the target system only uses the first eight characters, you can end
up using a trivial pw that you thought was really good.

If the back-end storage gives away the length of the pw in any way and
you see the pw is 33 chars long, you can probably bet it isn't going to
be random characters, so you would probably set your PW guesser to use
dictionary words rather than random characters, reducing the advantage.

Which is easier to remember for real people?  Which is easier to type?
No contest -- and for that reason, I'd say the overall benefit is with
the string of eight words over the string of eight random characters.

But...
Realistically, most attacks seem to be based on breaking TRIVIAL
passwords, social engineering, or use software flaws that permit access
to things that allow access to things that allow access to things ...so
either is probably more than sufficient to make sure that a password
guess of either of those accounts was NOT the reason for a security breach.

Kinda like escaping from a hungry lion...you don't need to outrun the
lion, you just need to outrun your friend.  You don't need an
unbreakable password, you just need one better than management uses, and
you can't be able to be blamed for the breach.  Anything more than that
is probably wasted effort.  If there is a breach that permits the
download of the hashed PW file, both may be similarly prone to off-line
brute-forcing.

Sounds cynical, but really, if you are arguing over which is the
better password, you are wasting time that should be spent looking for
more likely security problems.  That kinda brings it back to OpenBSD for
you. :)

Nick.



Re: OT:Password strength

2014-11-29 Thread bodie

On 30.11.2014 06:48, Nick Holland wrote:

On 11/29/14 22:06, Eric Furman wrote:

OFF TOPIC. This has nothing to do with OpenBSD,
but a lot of guys here know about this stuff.
I've done some reading, but still not sure.
OK, at the risk of looking stupid,which of these passwords is 
better;

kMH65?3
or
mylittlelambjumpedovertenredbarns


there's an XKCD comic along these lines.  I'm too lazy to dig it up.


You mean this one I think http://xkcd.com/936/



It's complicated.
Both have eight things.  The later is drawn from a much much larger
set (words (thousands), vs. characters (not 100)).  So, looks like a
simple win for the second over the first, right?

Problem is the words connect to humans.  little is more likely to 
be
followed by lamb than it is red (though if red follows little 
I

bet the next word would be wagon).  red is more likely to be
followed by barn than lamb.  Still, there's a huge number of 
choices

for each word, so I'd say the phrases still win.

(sorta related side note: At least with names, there's some curious
clusters that are seen -- for example, a friend of mine and her two
siblings have (basically) the same names as three of Adolph Hitler's
siblings (one is a slight stretch, the other two are dead-on, which 
is
impressive considering the very different ethnic backgrounds).  I 
don't

think my friend's parents would have permitted this had they known.
I've seen similar groupings of names in other families.  (Did I 
just

win the award for most unexpected use of hitler in an internet
discussion?))

Simply saying there are X words of five letters or less and there 
are
eight of them in my pw means there are X^8 PWs someone would have to 
try
to get my PW is wrong by probably several orders of magnitude.  
That's
not how humans pick passwords, and if the computer does it for you, 
it

might be as hard or harder than if you use random characters.

Then there is the system where it is stored.  If you are working on a
stock Solaris 9 or AIX system with the default settings, only the 
first

eight chars are used, so the random string is much better than
mylittle, and if you, like most people, reuse passwords or don't 
know
that the target system only uses the first eight characters, you can 
end

up using a trivial pw that you thought was really good.

If the back-end storage gives away the length of the pw in any way 
and
you see the pw is 33 chars long, you can probably bet it isn't going 
to
be random characters, so you would probably set your PW guesser to 
use
dictionary words rather than random characters, reducing the 
advantage.


Which is easier to remember for real people?  Which is easier to 
type?
No contest -- and for that reason, I'd say the overall benefit is 
with

the string of eight words over the string of eight random characters.

But...
Realistically, most attacks seem to be based on breaking TRIVIAL
passwords, social engineering, or use software flaws that permit 
access
to things that allow access to things that allow access to things 
...so
either is probably more than sufficient to make sure that a 
password
guess of either of those accounts was NOT the reason for a security 
breach.


Kinda like escaping from a hungry lion...you don't need to outrun the
lion, you just need to outrun your friend.  You don't need an
unbreakable password, you just need one better than management uses, 
and
you can't be able to be blamed for the breach.  Anything more than 
that

is probably wasted effort.  If there is a breach that permits the
download of the hashed PW file, both may be similarly prone to 
off-line

brute-forcing.


Yeah you can do a lot for eg. friend's computer, but then he will start
to use regular browser and JavaScript and such and then suddenly most
of that you done doesn't matter anymore 
http://www.youtube.com/watch?v=0QT4YJn7oVI


:-)



Sounds cynical, but really, if you are arguing over which is the
better password, you are wasting time that should be spent looking 
for
more likely security problems.  That kinda brings it back to OpenBSD 
for

you. :)

Nick.