Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Emil Lundberg via arch-general
I think the fact that it's not possible to be perfectly safe is not a good
reason to not earnestly consider what you _can_ do to try to protect
yourself. Of course you won't stand a chance if a nation-state is
determined to get you, but that doesn't mean you should just give up and
wing it, because the most relevant threats are probably much less capable
in most cases. It's still a good idea to try to quantify one's threat model
and what it would take to protect yourself, and then make a (somewhat)
educated decision on how much effort one is willing to spend on it.

/Emil

On Tue, 25 Jun 2019, 01:14 Ralf Mardorf via arch-general, <
arch-general@archlinux.org> wrote:

> You want to make the packages available for general use. Does general
> use require behavioral biometric verification and spring guns?
>
> Black hats are able to hack Google and Facebook, what ever you
> will do, you never ever will be able to reach the level of security
> those and the other most successful computer related companies are able
> to accomplish.
>
> IMO an averaged "strong" but still memorizable passphrase, even when
> following obsolet rules, is ok.
>


Re: [arch-general] journalctl - configure date output persistent to short-iso

2019-06-24 Thread Friedrich Strohmaier
Hi Jens, *,


Am 23.06.19 um 13:05 schrieb Jens John:
> On Sun, 23 Jun 2019, at 00:22, Friedrich Strohmaier wrote:
>> Anyone around who knows or did this already?

[..]

> Going by these facts, it seems like there is no way to  archieve what you
> want just with journalctl.

Thats definitly not what I wanted to read, but well..

> If that's correct,  there are 2 simple alternatives:

>   * alias journalctl='journalctl -o foo'
>   * Put a journalctl wrapper into a directory that is at the head of $PATH:

>   #!/bin/sh
>   exec /usr/sbin/journalctl -o foo "$@"

Thanks for Your investigation and suggestion.

That smells like a feature request at systemd guys, as I can't see any
advantage having the recent date output as default.
-- 
Friedrich


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Ralf Mardorf via arch-general
You want to make the packages available for general use. Does general
use require behavioral biometric verification and spring guns?

Black hats are able to hack Google and Facebook, what ever you
will do, you never ever will be able to reach the level of security
those and the other most successful computer related companies are able
to accomplish.

IMO an averaged "strong" but still memorizable passphrase, even when
following obsolet rules, is ok.


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Emil Lundberg via arch-general
Some ballpark numbers, rounded to one significant figure:

10 characters chosen truly randomly from an alphabet of 70 characters (e.g.,
[a-zA-Z0-9#$&_() =+/%]) is ~61 bits of entropy and will take just about 90
years to brute-force at 1e9 guesses per second, or 30 days at 1e12/s.

The Bitcoin swarm is currently estimated to perform 60e18 hash guesses per
second [1], so the 10-character password would be safe from the swarm for
about 50 milliseconds, give or take a few orders of magnitude (depending on
algorithm differences; mostly irrelevant for this discussion).

14 characters (85 bits) would be safe from the (current) swarm for about 10
days, 16 characters (98 bits) for about 200 years.

6 words chosen randomly (not a grammatically valid sentence!) from a list
of 1000 words (59 bits) would take about 30 years to break at 1e9/s, and 10
days at 1e12/s. 9 words (89 bits) gives you half a year against the swarm,
and 10 words (99 bits) gives you 500 years.

So, somewhere between 10 and 16 random characters should probably be good
enough, depending on how defensive you want to be.

[1]: https://digiconomist.net/bitcoin-energy-consumption

I personally use `pass` for password management and keep my PGP key on a
YubiKey (full disclosure: I work for Yubico) with a 6-digit PIN, so my
private key is not stored on disk and is protected against brute force
attacks by blocking the key (effectively destroying the key) after too many
incorrect PIN attempts (I also have an airgapped backup of the key, of
course).

/Emil

On Mon, 24 Jun 2019, 22:37 Eli Schwartz via arch-general, <
arch-general@archlinux.org> wrote:

> On 6/24/19 4:31 PM, Manuel Reimer wrote:
> > On 24.06.19 18:00, mpan wrote:
> >>If you’re using a password manager, you should not care about the
> >> password being “too long”. After all it’s not you who type it. Go for 16
> >> or 20 random chars.
> >
> > If the key is too complicated to remember or to type in manually, then I
> > have to use a password manager which now saves my password to local disk
> > again. Maybe encrypted with a master password.
> >
> > Then we are back at the starting problem.
> >
> > If someone can take my private key file, then he can also take my
> > password manager database.
> >
> > How strong would you make this master password and where to save this
> > one? A second password manager?
> >
> > I think if really someone takes over control over my PC, then I have to
> > expect the password to be gone, too. I someone is really able to take my
> > private key file, then I think he should also be able to install some
> > kind of key logger.
> >
> > And I really think that finally someone *has* to come up with some
> > replacement for this password nightmare. Some kind of hardware key maybe.
> >
> > I could protect the private signing key with an UUID (just call uuidgen
> > on console). This should be pretty hard to crack but is impossible to
> > remember so I would have to keep this written down somewhere and need
> > this piece of paper every time I unlock the key for signing.
>
> I'm not sure where you're going with any of this.
>
> The purpose of a PGP signing key is that it does interesting crypto
> things that prove your identity in a way that passwords don't (passwords
> can be guessed).
>
> The purpose of password-protecting your PGP private key is to prevent
> someone who gains access to the filesystem, from gaining access to the key.
>
> Password managers, like PGP keys, are things that "should be encrypted
> with a password to prevent an attacker with disk access from gaining
> your secret material".
>
> How you protect the master password for a password manager, has nothing
> to do with whether it's intelligent to use a password in the first
> place. Personally, I find it very easy to remember *one* master password
> (or even, to be honest, two or three), which exists only in my own head
> and unlocks the secrets that are stored on disk -- like PGP keys and
> password databases.
>
> ...
>
> As for hardware keys, there is no need to come up with a replacement for
> the password nightmare. Hardware keys have existed for some time now,
> and they were already intended as a replacement for the password
> "nightmare", something they do an excellent job at. Did you try getting
> one?
>
> --
> Eli Schwartz
> Bug Wrangler and Trusted User
>
>


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Robin Broda via arch-general
On 6/24/19 5:45 PM, Jude DaShiell wrote:
> The last standard the United States Navy used before it migrated to
> smartcards was 16 characters with at least two digits; at least two
> upper-case, at least two lower-case, and at least two special
> characters.  A slight improvement on that would have been to insure the
> pass phrase started and ended with a letter.
> 

Unrelated to the topic at hand, these password recommendations have been
outdated for about a decade.

Additionally, that 'slight improvement' you're mentioning actually
*decreases* the search-space required for bruteforcing...


-- 
Rob (coderobe)

O< ascii ribbon campaign - stop html mail - www.asciiribbon.org



signature.asc
Description: OpenPGP digital signature


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Eli Schwartz via arch-general
On 6/24/19 4:31 PM, Manuel Reimer wrote:
> On 24.06.19 18:00, mpan wrote:
>>    If you’re using a password manager, you should not care about the
>> password being “too long”. After all it’s not you who type it. Go for 16
>> or 20 random chars.
> 
> If the key is too complicated to remember or to type in manually, then I
> have to use a password manager which now saves my password to local disk
> again. Maybe encrypted with a master password.
> 
> Then we are back at the starting problem.
> 
> If someone can take my private key file, then he can also take my
> password manager database.
> 
> How strong would you make this master password and where to save this
> one? A second password manager?
> 
> I think if really someone takes over control over my PC, then I have to
> expect the password to be gone, too. I someone is really able to take my
> private key file, then I think he should also be able to install some
> kind of key logger.
> 
> And I really think that finally someone *has* to come up with some
> replacement for this password nightmare. Some kind of hardware key maybe.
> 
> I could protect the private signing key with an UUID (just call uuidgen
> on console). This should be pretty hard to crack but is impossible to
> remember so I would have to keep this written down somewhere and need
> this piece of paper every time I unlock the key for signing.

I'm not sure where you're going with any of this.

The purpose of a PGP signing key is that it does interesting crypto
things that prove your identity in a way that passwords don't (passwords
can be guessed).

The purpose of password-protecting your PGP private key is to prevent
someone who gains access to the filesystem, from gaining access to the key.

Password managers, like PGP keys, are things that "should be encrypted
with a password to prevent an attacker with disk access from gaining
your secret material".

How you protect the master password for a password manager, has nothing
to do with whether it's intelligent to use a password in the first
place. Personally, I find it very easy to remember *one* master password
(or even, to be honest, two or three), which exists only in my own head
and unlocks the secrets that are stored on disk -- like PGP keys and
password databases.

...

As for hardware keys, there is no need to come up with a replacement for
the password nightmare. Hardware keys have existed for some time now,
and they were already intended as a replacement for the password
"nightmare", something they do an excellent job at. Did you try getting one?

-- 
Eli Schwartz
Bug Wrangler and Trusted User



signature.asc
Description: OpenPGP digital signature


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Manuel Reimer

On 24.06.19 18:00, mpan wrote:

   If you’re using a password manager, you should not care about the
password being “too long”. After all it’s not you who type it. Go for 16
or 20 random chars.


If the key is too complicated to remember or to type in manually, then I 
have to use a password manager which now saves my password to local disk 
again. Maybe encrypted with a master password.


Then we are back at the starting problem.

If someone can take my private key file, then he can also take my 
password manager database.


How strong would you make this master password and where to save this 
one? A second password manager?


I think if really someone takes over control over my PC, then I have to 
expect the password to be gone, too. I someone is really able to take my 
private key file, then I think he should also be able to install some 
kind of key logger.


And I really think that finally someone *has* to come up with some 
replacement for this password nightmare. Some kind of hardware key maybe.


I could protect the private signing key with an UUID (just call uuidgen 
on console). This should be pretty hard to crack but is impossible to 
remember so I would have to keep this written down somewhere and need 
this piece of paper every time I unlock the key for signing.


Manuel


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread mpan
  tl;dr: follow standard practices — there is nothing special about
passwords for private keys.

> I want to publish a package repository with some packages that I need
> and only want to build once for all my systems.
> 
> I want to make the packages available for general use. I have server
> space for that so I only have to rsync my final repo to my server after
> compiling my packages.
> 
> I have my autobuild set up and signing seems to work, too.
> 
> For convenience, I decided to make the passphrase not too long.
  This alone makes me raise an eyebrow and wonder, if the security is
already compromised.

> I have 10 characters with both, alphanumeric and "special characters".
  Is it coming from a proper CSPRNG or an unbiased random source?

  If not — in particular if was your brain that generated it, you have
applied any changes to „make it easier to remember” or chosen one from a
set of random passwords — you are close to having no password at all.
But if it properly generated, it is meeting the often repeated password
criteria: 8 characters in the past, becoming 10 nowadays.

  But that doesn’t mean it is fine. Random, compact passwords are hard
to remember. Unless you’re using a password manager, you’re going to
either make mistakes (like writing down the password) or you’ll undetake
an unneccessary effort for little gain (remembering it). There are
better ways. See diceware and friends: it lets you generate a password
with very good entropy, but being easy to remember.

  If you’re using a password manager, you should not care about the
password being “too long”. After all it’s not you who type it. Go for 16
or 20 random chars.

> I think if the passphrase is meant to be uncrackable alone, then we
> wouldn't need the big private key file, right?
  Those topics are unrelated. The password is only used to protect the
key in case of a leak and plays no role in security based on that key.
If the key is breakable, whether it is protected by a strong or weak
pasword, or not protected at all is insignificant. The attack will not
even consider the password.



signature.asc
Description: OpenPGP digital signature


Re: [arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Jude DaShiell
The last standard the United States Navy used before it migrated to
smartcards was 16 characters with at least two digits; at least two
upper-case, at least two lower-case, and at least two special
characters.  A slight improvement on that would have been to insure the
pass phrase started and ended with a letter.

On Mon, 24 Jun 2019, Manuel Reimer wrote:

> Date: Mon, 24 Jun 2019 11:02:57
> From: Manuel Reimer 
> Reply-To: General Discussion about Arch Linux 
> To: arch-general@archlinux.org
> Subject: [arch-general] How long do you make the passphrase for the private
> key?
>
> Hello,
>
> I want to publish a package repository with some packages that I need and only
> want to build once for all my systems.
>
> I want to make the packages available for general use. I have server space for
> that so I only have to rsync my final repo to my server after compiling my
> packages.
>
> I have my autobuild set up and signing seems to work, too.
>
> For convenience, I decided to make the passphrase not too long.
>
> I have 10 characters with both, alphanumeric and "special characters".
>
> I think if the passphrase is meant to be uncrackable alone, then we wouldn't
> need the big private key file, right?
>
> Is my passphrase long enough? What do the trusted users think about this
> topic?
>
> Thanks in advance
>
> Manuel
>
>

-- 


[arch-general] How long do you make the passphrase for the private key?

2019-06-24 Thread Manuel Reimer

Hello,

I want to publish a package repository with some packages that I need 
and only want to build once for all my systems.


I want to make the packages available for general use. I have server 
space for that so I only have to rsync my final repo to my server after 
compiling my packages.


I have my autobuild set up and signing seems to work, too.

For convenience, I decided to make the passphrase not too long.

I have 10 characters with both, alphanumeric and "special characters".

I think if the passphrase is meant to be uncrackable alone, then we 
wouldn't need the big private key file, right?


Is my passphrase long enough? What do the trusted users think about this 
topic?


Thanks in advance

Manuel