On Sunday, January 22, 2017 at 7:52:42 PM UTC-8, Alex Glaros wrote:
>
> had not seen the reports Dave, thanks for confirming the concern
>
> any ideas on how to generate a key? How long must it be?  Would not tend 
> to trust online generator...
>
> Alex
>

I use KeePass for storing my collection of personal passwords.  It is happy 
to generate a random key for me, and as of v1.31 was defaulting to 111 bits 
(20 characters), but still showed "green" for 80 bits (15 characters).

If you make passwords that you can remember (I do for some), there's the 
problem of dictionary attacks speeding up the brute force cracking, and the 
common obscuring techniques merely force a larger dictionary.  And with 
GPUs not yet having reached their theoretical limit, 111 bits may soon be 
in the reach of home hackers.   Two factor schemes or hardware keys would 
still be indicated for anything requiring serious protection.

Also, encrypting the database is a good way to provide protection for "data 
at rest", but it may still be necessary to think about "data in flight" in 
a rigorous way.  Enforcing HTTPS and banning the broken versions of TLS is 
part of how that's being addressed, but servers may be vulnerable to shared 
memory exploits (which also exposes passwords), and clients may also be 
vulnerable (but if you can limit the data exposed to the client ...).

Sorry, Massimo got me started attending OWASP meetings, and I've picked up 
some of what they are saying.

/dps

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to