I think there's two separate issues here:

a)      How, as a user, do you generate "good" passwords? What's considered 
"good" is continually changing - Microsoft (and others) were touting "pass 
phrases" not that long ago, and even then it was pretty obvious that attacks 
would migrate using whole words and mangled words as part of an attack. Even 
with a tool to generate passwords, do you go back to old site to update your 
password each time a class of passwords becomes "easy game"?

b)      How, as an authentication system, do you safely store the credentials 
of your user base? What rules do you enforce on the passwords that can be 
supplied/generated, and once generated, how best to secure these "at rest" and 
"in transit"? I think this is the main question that Greg is asking

Greg - sites like Slashdot, routinely cover advances in crypto and attack 
vectors in a format that non-experts can easily digest. E.g. GPU based 
attacking has been the norm for some time now.

Cheers
Ken

From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com] On 
Behalf Of Grant Maw
Sent: Monday, 24 March 2014 11:08 AM
To: ozDotNet
Subject: Re: [OT] Password hash cracking

Or, just use Schneier's Password Safe program and let it generate all your 
passwords for you. I've been using it for years and I swear by it. I have 
hundreds of passwords stored in it's files and they're all long and very 
complex.

http://passwordsafe.sourceforge.net/

On 22 March 2014 16:08, Greg Keogh <g...@mira.net<mailto:g...@mira.net>> wrote:
Folks, in Bruce Schneier's latest 
newsletter<https://www.schneier.com/crypto-gram-1403.html> there is a section 
at the end where he discusses the vulnerability of passwords. One of the links 
is to this interesting and frightening article:

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/

The hashes in this cracking test were made with plain old MD5, but even 
ignoring that, it's a sobering reminder of the progress in guessing and 
cracking hashed passwords. I was surprised to learn that salting the hashes 
doesn't offer much defence. I was amazed that they were using GPUs for hashing 
and a graph shows that they're faster than CPUs ... is that possible? After 
this I think the lessons are:

* Schneier suggests you make passwords out of pieces of words and sentences to 
avoid predictable formats.
* Use a more recent and computationally intensive hasher.
* Don't let anyone steal your hashes.
* Don't store the whole hash (I learned in Russinovich's book that 
msv1_0<http://dll.paretologic.com/detail.php/msv1_0>.dll only stores half a 
user's hash in the registry).

Greg K

Reply via email to