On 01/09/2015 09:19 PM, Jerry Stuckle wrote: > On 1/9/2015 8:49 PM, Joel Rees wrote: >> On Fri, Jan 9, 2015 at 6:25 PM, Martin Steigerwald <mar...@lichtvoll.de> >> wrote: >>> Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian: >>>> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote: >>>>> Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle: >>>>>> Just ensure you're using good security practices - don't allow root >>>>>> login, use long, random passwords, etc. I also use a random character >>>>>> strings for the login ids, as well as passwords - just one more thing >>>>>> for the hackers to have to figure out how to get around. >>>>> >>>>> Only allow SSH key based logins. Of course, only after you copied a public >>>>> key onto the machine with ssh-copy-id. >>>>> >>>>> And have SSH keys with *strong* passphrases, to protect against someone >>>>> stealing your key. Use ssh-agent wisely only on trusted machines. >>>> >>>> SSH password logins are just as safe. 20 characters gives a strong >>>> password for use on trusted machines. There is no need to worry about >>>> it being stolen because it is in your memory, >>> >>> I think SSH keys are safer, cause there is no password at all that can be >>> brute forced. >> >> What do you mean by that? >> >>> Okay, one can try to guess the key, but try that with a 4096 bit >>> key. >> >> Hmm. >> >> 10 characters, 6 to 7 bits per character, that's 60 bits. >> >> If the bits are truly random, straight brute-force will take, on >> average, half of 2^60 attempts. >> >> We can hold the integer 2^59 in a C variable on most recent desktops, >> but if we have bc (dc if you like post-fix), we can do this on even 32 >> bit CPUs: >> >> 576460752303423488 (base ten) >> >> At one milion attempts per second, that's 5764607523034 seconds, or >> 182678 CPU-years. >> >> There's no way that's going to happen on-line, if the password is >> truly random, and not randomly a password that's a quick permutation >> of common memes or of entries in rainbow tables. >> > > Actually, 62 possible characters (upper case, lower case and digits), 10 > positions is 62^10 or 839,299,365,868,340,224 possible combinations. > > Adding in special characters obviously would increase that. > > But there is no way you'll hit a server 1,000,000 times a second trying > to brute force a password. > > >> I currently use sixteen or more letters in my passwords, don't use >> simple permutations or common phrases (as for the first leter trick), >> use disconnected words from multiple languages. Or use 16 character >> true random passwords for the important stuff. >> > > All good suggestions. > >> SSH keys are useful, but you have to keep them somewhere. The real >> danger to good passwords is the off-line attempts, and the passphrase >> you use for your private keystore is potentially subject to off-line >> if your password is. >> > > Yes, keys may actually be less secure than passwords. > > Jerry > > If you have a dedicated hacker, or hackers, time is on their side. I would much rather use a key with a passphrase.
-- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/54b09b89.5060...@gmx.com