RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-22 Thread Mark Challender
A simple passphrase -- Golfmakesyougomad! -- as a password will create
a very difficult password to crack. 


Mark Challender, MCSE 
Network Administrator 


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Exibar
Sent: Thursday, October 21, 2004 10:07 AM
To: joe; [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Senior M$ member says stop using
passwords completely!

I couldn't picture having to tell my users to type in a 256 character
password.  Let's make it force 20 uppercase, 20 symbols, 20 high-bit
character, 20 numbers as well.   Although it'll be hard to crack, it'll
take
three hours before they can log in once.  and that's with 2 phone calls
to the helpdesk to unlock their accounts after they entered their
password wrong 3 times in a row. :-)

   Use a secure-ID key fob with a PIN, along with your usual
Userid/password combination.  You'll have a pretty secure login at that
point.

  Exibar

- Original Message -
From: joe [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, October 21, 2004 11:32 AM
Subject: RE: [Full-Disclosure] Senior M$ member says stop using
passwords completely!


 Well I don't think anyone is saying that the issue is that 128
character
 passwords are being easily hacked so I am not quite sure I understand
your
 point about 256 characters and why you mention it. People seem to
dislike
 passwords greater than 14 characters let alone entering passwords of
150 ,
 200 , or 250 characters. To put it another way, if MS suddenly
increased
the
 buffer to allow for hashing of passwords 1024 characters in size would
you
 push that MS was more secure based on that? I doubt it, I certainly
 wouldn't.

 BTW, I tried the link someone previously gave with the password hash I
 previously posted and it is well under 128 characters and the web site
 reported:

 Password: not found!


   joe



 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Eric
Paynter
 Sent: Monday, October 18, 2004 1:32 PM
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Senior M$ member says stop using
passwords
 completely!

 On Sat, October 16, 2004 5:25 pm, Tim said:
  The reason for my post was to point out that Mr. Hensing doesn't
  appear to be a reliable source of information on the topic of
  passwords and hash security.

 I think that much became apparent when Mr. Hensing took sarcastic
shots at
 Linux security (e.g. Attack easier targets like all those Linux boxes
you
 installed because its so much more secure . . .). Funny thing is,
Linux
 supports up to 256 character passwords by default - twice as long as
 Windows.

 -Eric

 --
 arctic bears - email and dns services
 http://www.arcticbears.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-21 Thread joe
Well I don't think anyone is saying that the issue is that 128 character
passwords are being easily hacked so I am not quite sure I understand your
point about 256 characters and why you mention it. People seem to dislike
passwords greater than 14 characters let alone entering passwords of 150 ,
200 , or 250 characters. To put it another way, if MS suddenly increased the
buffer to allow for hashing of passwords 1024 characters in size would you
push that MS was more secure based on that? I doubt it, I certainly
wouldn't.

BTW, I tried the link someone previously gave with the password hash I
previously posted and it is well under 128 characters and the web site
reported: 

Password: not found! 


  joe

 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Eric Paynter
Sent: Monday, October 18, 2004 1:32 PM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Senior M$ member says stop using passwords
completely!

On Sat, October 16, 2004 5:25 pm, Tim said:
 The reason for my post was to point out that Mr. Hensing doesn't 
 appear to be a reliable source of information on the topic of 
 passwords and hash security.

I think that much became apparent when Mr. Hensing took sarcastic shots at
Linux security (e.g. Attack easier targets like all those Linux boxes you
installed because its so much more secure . . .). Funny thing is, Linux
supports up to 256 character passwords by default - twice as long as
Windows.

-Eric

--
arctic bears - email and dns services
http://www.arcticbears.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-21 Thread Exibar
I couldn't picture having to tell my users to type in a 256 character
password.  Let's make it force 20 uppercase, 20 symbols, 20 high-bit
character, 20 numbers as well.   Although it'll be hard to crack, it'll take
three hours before they can log in once.  and that's with 2 phone calls to
the helpdesk to unlock their accounts after they entered their password
wrong 3 times in a row. :-)

   Use a secure-ID key fob with a PIN, along with your usual Userid/password
combination.  You'll have a pretty secure login at that point.

  Exibar

- Original Message - 
From: joe [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, October 21, 2004 11:32 AM
Subject: RE: [Full-Disclosure] Senior M$ member says stop using passwords
completely!


 Well I don't think anyone is saying that the issue is that 128 character
 passwords are being easily hacked so I am not quite sure I understand your
 point about 256 characters and why you mention it. People seem to dislike
 passwords greater than 14 characters let alone entering passwords of 150 ,
 200 , or 250 characters. To put it another way, if MS suddenly increased
the
 buffer to allow for hashing of passwords 1024 characters in size would you
 push that MS was more secure based on that? I doubt it, I certainly
 wouldn't.

 BTW, I tried the link someone previously gave with the password hash I
 previously posted and it is well under 128 characters and the web site
 reported:

 Password: not found!


   joe



 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Eric Paynter
 Sent: Monday, October 18, 2004 1:32 PM
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Senior M$ member says stop using passwords
 completely!

 On Sat, October 16, 2004 5:25 pm, Tim said:
  The reason for my post was to point out that Mr. Hensing doesn't
  appear to be a reliable source of information on the topic of
  passwords and hash security.

 I think that much became apparent when Mr. Hensing took sarcastic shots at
 Linux security (e.g. Attack easier targets like all those Linux boxes you
 installed because its so much more secure . . .). Funny thing is, Linux
 supports up to 256 character passwords by default - twice as long as
 Windows.

 -Eric

 --
 arctic bears - email and dns services
 http://www.arcticbears.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-21 Thread Georgi Guninski
due to Tiny-delicate windows implementation, current windows passwords don't
seem long enough (a m$ guy confirmed it).
i recommend windows passwords to be enlarged by 3 to 5 inches.
100% guaranteed!  (if permitted by the EULA)

-- 
georgi

On Wed, Oct 20, 2004 at 10:56:37AM -0400, Danny wrote:
 Georgi, passwords vs. passphrases, which do you recommend?
 
 ...D

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-21 Thread Danny
On Thu, 21 Oct 2004 23:52:18 +0300, Georgi Guninski
[EMAIL PROTECTED] wrote:
 due to Tiny-delicate windows implementation, current windows passwords don't
 seem long enough (a m$ guy confirmed it).
 i recommend windows passwords to be enlarged by 3 to 5 inches.
 100% guaranteed!  (if permitted by the EULA)

Password girth or length? 

...D

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Aviv Raff
If they crack it, they might be able to automatically change the password to
a readable one.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Todd Towles
Sent: Tuesday, October 19, 2004 10:42 PM
To: Pavel Kankovsky; [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Senior M$ member says stop using passwords
completely!


I was under the understand that passwords of over 14 characters were stored
with a more secure hash, therefore 14 characters passwords were harder to
crack, due to the more secure hash. Windows will create two different hashes
for passwords shorting than 14 characters, I do believe.

Just use a non-printable character in your password and cracking is
useless...if they crack it, they can't read what they cracked. ;) 

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Pavel 
 Kankovsky
 Sent: Sunday, October 17, 2004 2:21 PM
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Senior M$ member says stop using 
 passwords completely!
 
 On Sat, 16 Oct 2004, Frank Knobbe wrote:
 
  It's a nice recommendation of MS to make (to use long passphrases 
  instead of passwords). But I don't consider 14 chars a passphrase.
  Perhaps they should enable more/all password components to
 handle much
  longer passwords/phrases.
 
 A passphrase consisting of 7 words and 12 bits of entropy per a word 
 is as guessable as a password with 14 characters and 6 bits of entropy 
 per a character. You get 84 bits of total entropy in both cases.
 
 The only advantage of passphrases is that lusers might find long 
 random sequences of words easier to remember than long random 
 sequences of characters.
 
 (But wait: 12 bits of entropy per a word--this is equivalent to a 
 uniform choice of one word out of 4096. 4 thousand? That might exceed 
 an average luser's vocabulary by an order of magnitude! ;)
 
 --Pavel Kankovsky aka Peak  [ Boycott 
 Microsoft--http://www.vcnet.com/bms ] Resistance is futile.
 Open your source code and prepare for assimilation.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


#
This Mail Was Scanned by 012.net Anti Virus Service - Powered by TrendMicro
Interscan

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread stephane nasdrovisky
Todd Towles wrote:
I was under the understand that passwords of over 14 characters were
stored with a more secure hash, therefore 14 characters passwords were
harder to crack, due to the more secure hash. Windows will create two
different hashes for passwords shorting than 14 characters, I do
believe.
 

If my memory is right, lm passwords are hashed as 2*7 uppercase bytes 
(which is not the same as 14 bytes, it's easier to bf)
If lm passwords are enabled, even longer passwords will collide with a 
14 characters password (as far as you're more interested in accessing 
one's account than knowing its dog's name, i.e. if your pass is My name 
is bond, james bond!, using MY NAME IS BON will give you the access 
you diserve)!
Back in the nt 4.0 time, it was required to disable lm passwords (w95 
compatibility issue) in order to have stronger passwords (if nt password 
fails, lm password is checked).

Just use a non-printable character in your password and cracking is
useless...if they crack it, they can't read what they cracked. ;) 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread James . McKinlay

Subject: RE: [Full-Disclosure] Senior M$ member
says stop using passwords completely!
Date: Tue, 19 Oct 2004 15:42:17 -0500
From: Todd Towles [EMAIL PROTECTED]
To: Pavel Kankovsky [EMAIL PROTECTED],
  [EMAIL PROTECTED]

I was under the understand that passwords of over 14 characters were
stored with a more secure hash, therefore 14 characters passwords were
harder to crack, due to the more secure hash. Windows will create two
different hashes for passwords shorting than 14 characters, I do
believe.

Just use a non-printable character in your password and cracking is
useless...if they crack it, they can't read what they cracked. ;) 

Would it not be possible to modify the cracking program
to include an output
for the successful string that displayed like Unix/linux
command octal-dump [ od -c ] ??

mtcw
J.





This E-mail transmission may contain confidential or legally privileged information that is intended for the addressee only. 
Any views or opinions presented are solely those of the author and do not necessarily represent those of CNM Limited. 
If you are not the intended recipient you are hereby notified that any disclosure, copying, distribution or reliance upon the contents of this E-mail is strictly prohibited. 
If you have received this E-mail transmission in error, please notify the sender immediately, so that CNM Limited may arrange for its proper delivery. 
Please then delete the message from your inbox.

This email has been scanned for all viruses by the MessageLabs SkyScan
service. For more information on a proactive anti-virus service working
around the clock, around the globe, visit http://www.messagelabs.com



Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Georgi Guninski
the poor m$ guy updated his blog.

looks like he uses Excel(tm) for solving crypto problems.

to quote him:

 (I can't even tell you how many petabytes it would be becuase Excel barfs
 when I try to make it tell me, it can't calculate a number that big G).

does bili teach m$ puppets math from the book the r0ad ahead -

http://mersenneforum.org/showthread.php?t=3097

-- 
georgi


On Sat, Oct 16, 2004 at 08:14:18AM -0500, RandallM wrote:
  http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx
 http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx 
  
 thank you
 Randall M
  
  
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Danny
On Wed, 20 Oct 2004 17:01:56 +0300, Georgi Guninski
[EMAIL PROTECTED] wrote:
 the poor m$ guy updated his blog.
 
 looks like he uses Excel(tm) for solving crypto problems.
[...]
Georgi, passwords vs. passphrases, which do you recommend?

...D

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Todd Towles
Changing it is a option, but that is true for any password cracking. But
of course changing the password makes your presence really known. 

 -Original Message-
 From: Aviv Raff [mailto:[EMAIL PROTECTED] 
 Sent: Wednesday, October 20, 2004 1:16 AM
 To: Todd Towles; 'Pavel Kankovsky'; [EMAIL PROTECTED]
 Subject: RE: [Full-Disclosure] Senior M$ member says stop 
 using passwords completely!
 
 If they crack it, they might be able to automatically change 
 the password to a readable one.
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Todd Towles
 Sent: Tuesday, October 19, 2004 10:42 PM
 To: Pavel Kankovsky; [EMAIL PROTECTED]
 Subject: RE: [Full-Disclosure] Senior M$ member says stop 
 using passwords completely!
 
 
 I was under the understand that passwords of over 14 
 characters were stored with a more secure hash, therefore 14 
 characters passwords were harder to crack, due to the more 
 secure hash. Windows will create two different hashes for 
 passwords shorting than 14 characters, I do believe.
 
 Just use a non-printable character in your password and 
 cracking is useless...if they crack it, they can't read what 
 they cracked. ;) 
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Pavel 
  Kankovsky
  Sent: Sunday, October 17, 2004 2:21 PM
  To: [EMAIL PROTECTED]
  Subject: Re: [Full-Disclosure] Senior M$ member says stop using 
  passwords completely!
  
  On Sat, 16 Oct 2004, Frank Knobbe wrote:
  
   It's a nice recommendation of MS to make (to use long passphrases 
   instead of passwords). But I don't consider 14 chars a 
 passphrase.
   Perhaps they should enable more/all password components to
  handle much
   longer passwords/phrases.
  
  A passphrase consisting of 7 words and 12 bits of entropy 
 per a word 
  is as guessable as a password with 14 characters and 6 bits 
 of entropy 
  per a character. You get 84 bits of total entropy in both cases.
  
  The only advantage of passphrases is that lusers might find long 
  random sequences of words easier to remember than long random 
  sequences of characters.
  
  (But wait: 12 bits of entropy per a word--this is equivalent to a 
  uniform choice of one word out of 4096. 4 thousand? That 
 might exceed 
  an average luser's vocabulary by an order of magnitude! ;)
  
  --Pavel Kankovsky aka Peak  [ Boycott 
  Microsoft--http://www.vcnet.com/bms ] Resistance is futile.
  Open your source code and prepare for assimilation.
  
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.netsys.com/full-disclosure-charter.html
  
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 ##
 ##
 #
 This Mail Was Scanned by 012.net Anti Virus Service - Powered 
 by TrendMicro Interscan
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Thomas G O'Reilly

Actually in a Win2003 domain the LM hashes are eliminated by default. In a 2000 domain you can add the NoLMHash value to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA This prevents the old LM hashes from being stored from the next time passwords are changed.








Todd Towles [EMAIL PROTECTED]
Sent by: [EMAIL PROTECTED]
10/19/2004 04:42 PM


To:Pavel Kankovsky [EMAIL PROTECTED], [EMAIL PROTECTED]
cc:
Subject:RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!


I was under the understand that passwords of over 14 characters were
stored with a more secure hash, therefore 14 characters passwords were
harder to crack, due to the more secure hash. Windows will create two
different hashes for passwords shorting than 14 characters, I do
believe.

Just use a non-printable character in your password and cracking is
useless...if they crack it, they can't read what they cracked. ;) 

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Pavel Kankovsky
 Sent: Sunday, October 17, 2004 2:21 PM
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Senior M$ member says stop 
 using passwords completely!
 
 On Sat, 16 Oct 2004, Frank Knobbe wrote:
 
  It's a nice recommendation of MS to make (to use long passphrases 
  instead of passwords). But I don't consider 14 chars a passphrase.
  Perhaps they should enable more/all password components to 
 handle much 
  longer passwords/phrases.
 
 A passphrase consisting of 7 words and 12 bits of entropy per 
 a word is as guessable as a password with 14 characters and 6 
 bits of entropy per a character. You get 84 bits of total 
 entropy in both cases.
 
 The only advantage of passphrases is that lusers might find 
 long random sequences of words easier to remember than long 
 random sequences of characters.
 
 (But wait: 12 bits of entropy per a word--this is equivalent 
 to a uniform choice of one word out of 4096. 4 thousand? That 
 might exceed an average luser's vocabulary by an order of 
 magnitude! ;)
 
 --Pavel Kankovsky aka Peak [ Boycott 
 Microsoft--http://www.vcnet.com/bms ] Resistance is futile. 
 Open your source code and prepare for assimilation.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html




Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Maarten
On Wednesday 20 October 2004 16:56, Danny wrote:
 On Wed, 20 Oct 2004 17:01:56 +0300, Georgi Guninski

 [EMAIL PROTECTED] wrote:
  the poor m$ guy updated his blog.
 
  looks like he uses Excel(tm) for solving crypto problems.

 [...]
 Georgi, passwords vs. passphrases, which do you recommend?

I vote for passparagraphs !  ;-)

Maarten

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Andrew Farmer
On 16 Oct 2004, at 07:46, Tim wrote:
Pre-computation attacks are a somewhat new and interesting phenomenon
we are starting to encounter 'in the wild' through chainsaw security
consultants.  What they do is they pre-compute all of the possible LM 
or
NT password hashes of a given length with a given character set and 
burn
the pre-computed password-hash-to-password-mappings to DVD.  Heck they
can even submit their request to have your password hash reversed back
into a password using a web page someone has setup to do the job for 
you
(sorry, not going to give out THAT URL here.) . . . for free!
To save everyone the looking:
http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/


PGP.sig
Description: This is a digitally signed message part


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-19 Thread Pavel Kankovsky
On Sat, 16 Oct 2004, Frank Knobbe wrote:

 It's a nice recommendation of MS to make (to use long passphrases
 instead of passwords). But I don't consider 14 chars a passphrase.
 Perhaps they should enable more/all password components to handle much
 longer passwords/phrases.

A passphrase consisting of 7 words and 12 bits of entropy per a word is
as guessable as a password with 14 characters and 6 bits of entropy per 
a character. You get 84 bits of total entropy in both cases.

The only advantage of passphrases is that lusers might find long random
sequences of words easier to remember than long random sequences of
characters.

(But wait: 12 bits of entropy per a word--this is equivalent to a uniform
choice of one word out of 4096. 4 thousand? That might exceed an average
luser's vocabulary by an order of magnitude! ;)

--Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
Resistance is futile. Open your source code and prepare for assimilation.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-19 Thread Banta, Will
Wow! Three-year-olds are supposed to have a vocab of 500+ words 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Pavel
Kankovsky
Sent: Sunday, October 17, 2004 2:21 PM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Senior M$ member says stop using
passwords completely!

On Sat, 16 Oct 2004, Frank Knobbe wrote:

 It's a nice recommendation of MS to make (to use long passphrases 
 instead of passwords). But I don't consider 14 chars a passphrase.
 Perhaps they should enable more/all password components to handle much

 longer passwords/phrases.

A passphrase consisting of 7 words and 12 bits of entropy per a word is
as guessable as a password with 14 characters and 6 bits of entropy per
a character. You get 84 bits of total entropy in both cases.

The only advantage of passphrases is that lusers might find long random
sequences of words easier to remember than long random sequences of
characters.

(But wait: 12 bits of entropy per a word--this is equivalent to a
uniform choice of one word out of 4096. 4 thousand? That might exceed an
average luser's vocabulary by an order of magnitude! ;)

--Pavel Kankovsky aka Peak  [ Boycott
Microsoft--http://www.vcnet.com/bms ] Resistance is futile. Open your
source code and prepare for assimilation.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-19 Thread Todd Towles
I was under the understand that passwords of over 14 characters were
stored with a more secure hash, therefore 14 characters passwords were
harder to crack, due to the more secure hash. Windows will create two
different hashes for passwords shorting than 14 characters, I do
believe.

Just use a non-printable character in your password and cracking is
useless...if they crack it, they can't read what they cracked. ;) 

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Pavel Kankovsky
 Sent: Sunday, October 17, 2004 2:21 PM
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Senior M$ member says stop 
 using passwords completely!
 
 On Sat, 16 Oct 2004, Frank Knobbe wrote:
 
  It's a nice recommendation of MS to make (to use long passphrases 
  instead of passwords). But I don't consider 14 chars a passphrase.
  Perhaps they should enable more/all password components to 
 handle much 
  longer passwords/phrases.
 
 A passphrase consisting of 7 words and 12 bits of entropy per 
 a word is as guessable as a password with 14 characters and 6 
 bits of entropy per a character. You get 84 bits of total 
 entropy in both cases.
 
 The only advantage of passphrases is that lusers might find 
 long random sequences of words easier to remember than long 
 random sequences of characters.
 
 (But wait: 12 bits of entropy per a word--this is equivalent 
 to a uniform choice of one word out of 4096. 4 thousand? That 
 might exceed an average luser's vocabulary by an order of 
 magnitude! ;)
 
 --Pavel Kankovsky aka Peak  [ Boycott 
 Microsoft--http://www.vcnet.com/bms ] Resistance is futile. 
 Open your source code and prepare for assimilation.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-19 Thread Frank Knobbe
On Tue, 2004-10-19 at 15:15, Banta, Will wrote:
 Wow! Three-year-olds are supposed to have a vocab of 500+ words 

So, how long would it take a 3 year old to brute-force through that key
space? ;)

-Frank



signature.asc
Description: This is a digitally signed message part


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-18 Thread joe
I think Mr. Hensing was trying to tell people how to be more secure with
what they currently have. While I agree that added length doesn't
necessarily make a password theoretically stronger, a passphrase will tend
to be longer than 14 characters and push you past the storage of the lm hash
which has the chunking you described[1] and will most likely not be one of
the 50 or so most commonly used passwords making many of the little
automated crackers for viruses worthless. Plus if cracking a password of
10-12 words, the cracker best know that it is a passphrase versus a password
up front or else the cracking token used in the brute force will be
characters which will take a while or use some fairly large tables. 

Personally the part I didn't really agree with was forcing longer passwords
through the policy. I like the idea of forcing a longer password but not
through the Windows policy, but through a password filter so that a
machine/person can't query what the actual policy is. If you as a cracker
just know the password must be between 6 and 128 characters (or 1-128
characters) you can't really assume that a passphrase is being used. If you
encounter a policy set to 20-25 characters minimum it would be a rather good
guess that a pass phrase would be used so you can start using words as
tokens instead of characters and substantially narrow your tables or brute
force range. 

BTW, if you want, here is a password from one of my test ids. My policy on
my local machine requires a password of 6 characters or better. How long
does it take you to crack it? Brute force or table and if table how big of a
table?

testuser:1022:NO
PASSWORD*:015ED52DE1744CE8352899BA93702E88:::


From the rest of your writing it seems you tore into it merely because you
don't like MS. Note that the blogs done by the MS employees are not
filtered/controlled by MS. They are just people who want to put out info
that will hopefully help the users and people working with the technology.
The fact that he made a recommendation of using a passphrase versus a
password wasn't a statement for or against salted hashes. He was, again,
telling people what to do to help with what they currently have. Far more
useful than a rant against something he has no control over as I'm sure if
he had the pull to make that change by saying the word, what I know of him
from other things I have read would tell me he probably would do it. You
trying to gauge his knowledge and capability based on a blog that you don't
think says what needs to be said is on par with me trying to gauge your
knowledge based on what you have written here. 

Quite honestly, the quality of password hashes in the Windows world is far
less an issue than the quality of passwords being used if they are being
used at all. The problems you point out for all internet users has nothing
to do with password hashes. The viruses of which I think you are alluding
too don't crack passwords due to unsalted hashes, they crack simple easy
passwords people use through brute force attempts because they are weak and
the machines have disabled or weak password lockout policies or
alternatively walk through open doors on unpatched machines or most likely
are social engineering pieces that get some numbskill to click on things and
just run them. Whether they are done at the click or have to type in three
passwords and hop on one leg doesn't matter, some people will just do it so
they can see that picture of Brittany Spears or get those instructions on
how to re-enable their account.

  joe



[1] This can also be done with policy/registry modification but it dependent
on how much legacy support is required for a system. More than anything,
this legacy support really hurts MS'es attempts to get more secure. MS has
historically bent to try and keep legacy systems functional, far more than
they should in my opinion. The latest SP for XP they didn't do this to the
extent they did in the past and the whining about it will be considered
legendary some day. 
  

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tim
Sent: Saturday, October 16, 2004 8:25 PM
To: Micheal Espinola Jr
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Senior M$ member says stop using passwords
completely!

Hello Mr Espinola,

 That much is obvious.  Read the the full article, do a little 
 background research and get back to us when you reach a more sensible 
 conclusion.

The reason for my post was to point out that Mr. Hensing doesn't appear to
be a reliable source of information on the topic of passwords and hash
security.  If you haven't come to the same conclusion, perhaps you should do
more homework yourself.

 Reactionary conclusions based on obvious article 'skimming' make it 
 apparent you didn't do your homework before posting.

Pardon me for my reactionary style.  I am merely frustrated by M$'s
irresponsible business practices, and their unwillingness to correct

Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-18 Thread Eric Paynter
On Sat, October 16, 2004 5:25 pm, Tim said:
 The reason for my post was to point out that Mr. Hensing doesn't appear
 to be a reliable source of information on the topic of passwords and
 hash security.

I think that much became apparent when Mr. Hensing took sarcastic shots at
Linux security (e.g. Attack easier targets like all those Linux boxes you
installed because its so much more secure . . .). Funny thing is, Linux
supports up to 256 character passwords by default - twice as long as
Windows.

-Eric

--
arctic bears - email and dns services
http://www.arcticbears.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread RandallM
 http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx
http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx 
 
thank you
Randall M
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread Aviv Raff

No...
Senior Microsoft member says: use passPHRASES instead of passWORDS.

You should read the article before you start flaming.

-- Aviv. 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of RandallM
Sent: Saturday, October 16, 2004 3:14 PM
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Senior M$ member says stop using passwords
completely!


 http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx
http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx 
 
thank you
Randall M
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread Tim
 http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx 

Jesus, that guy just doesn't get it, does he?  

Pre-computation attacks are a somewhat new and interesting phenomenon
we are starting to encounter 'in the wild' through chainsaw security
consultants.  What they do is they pre-compute all of the possible LM or
NT password hashes of a given length with a given character set and burn
the pre-computed password-hash-to-password-mappings to DVD.  Heck they
can even submit their request to have your password hash reversed back
into a password using a web page someone has setup to do the job for you
(sorry, not going to give out THAT URL here.) . . . for free!


Even if this was a new attack, a full rainbow table shouldn't be
possible against a secure hash.  Bottom line, M$ dropped the ball, and
has refused to pick it up.


The LM hash is no longer cryptographically secure...

When was it?


Pass-phrase LENGTH, not complexity defeats these attacks.

Not if your hashes are chunked like some (all?) of M$'s.  Precomputed
chunks with a good lookup table defeats longer passwords.


Mind you, I am no expert on M$ cryptography, but someone on their
security team ought to know a bit more than this.


tim

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread Micheal Espinola Jr
That much is obvious.  Read the the full article, do a little
background research and get back to us when you reach a more sensible
conclusion.

Reactionary conclusions based on obvious article 'skimming' make it
apparent you didn't do your homework before posting.

FWIW I have used rainbow tables for dictionary-styled attacks for
about 7 years now.  There have been available CLI-based tools for
generating dictionary lists using different character sets for the
better part of the past 10 years.  There are also many dictionary
lists in multiple languages available on many university public FTP
sites to build and extend your own from.

Personally, I'm surprised this style attack took this long to catch on.


On Sat, 16 Oct 2004 10:46:44 -0400, Tim
[EMAIL PROTECTED] wrote:
 
 Mind you, I am no expert on M$ cryptography, but someone on their
 security team ought to know a bit more than this.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread Frank Knobbe
On Sat, 2004-10-16 at 11:46, Frank Knobbe wrote:
 It's a nice recommendation of MS to make (to use long passphrases
 instead of passwords). But I don't consider 14 chars a passphrase.
 Perhaps they should enable more/all password components to handle much
 longer passwords/phrases.

heh... I suck. Scratch that msg (where's my coffee?). My gaming laptop
is even configured to log in automatically with AutoLogon=1 and a
password that is longer than 14.

Perhaps a faint memory of pain from the old Winders days wallowed up
inside me. Oh well, I'll shut up now...



signature.asc
Description: This is a digitally signed message part


RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread RandallM
I did. He said stop using passwords. I'm not flamming, I was passing on an
article.

thank you
Randall M
 
 

|-Original Message-
|From: Aviv Raff [mailto:[EMAIL PROTECTED] 
|Sent: Saturday, October 16, 2004 10:19 AM
|To: 'RandallM'; [EMAIL PROTECTED]
|Subject: RE: [Full-Disclosure] Senior M$ member says stop 
|using passwords completely!
|
|
|No...
|Senior Microsoft member says: use passPHRASES instead of passWORDS.
|
|You should read the article before you start flaming.
|
|-- Aviv. 
|
|-Original Message-
|From: [EMAIL PROTECTED]
|[mailto:[EMAIL PROTECTED] On Behalf Of RandallM
|Sent: Saturday, October 16, 2004 3:14 PM
|To: [EMAIL PROTECTED]
|Subject: [Full-Disclosure] Senior M$ member says stop using 
|passwords completely!
|
|
| 
|http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx
|http://blogs.msdn.com/robert_hensing/archive/2004/07/28/199610.aspx 
| 
|thank you
|Randall M
| 
|
|

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread Frank Knobbe
On Sat, 2004-10-16 at 09:46, Tim wrote:
 Even if this was a new attack, a full rainbow table shouldn't be
 possible against a secure hash. 

True if the hashes are salted. (with more than one byte please,
otherwise they just use 256 DVDs :)

 Pass-phrase LENGTH, not complexity defeats these attacks.
 
 Not if your hashes are chunked like some (all?) of M$'s.  Precomputed
 chunks with a good lookup table defeats longer passwords.

It's a nice recommendation of MS to make (to use long passphrases
instead of passwords). But I don't consider 14 chars a passphrase.
Perhaps they should enable more/all password components to handle much
longer passwords/phrases.

Let me guess, that will all be fixed in Longshot.

Cheers,
Frank



signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-16 Thread Tim
Hello Mr Espinola,

 That much is obvious.  Read the the full article, do a little
 background research and get back to us when you reach a more sensible
 conclusion.

The reason for my post was to point out that Mr. Hensing doesn't appear
to be a reliable source of information on the topic of passwords and
hash security.  If you haven't come to the same conclusion, perhaps you
should do more homework yourself.

 Reactionary conclusions based on obvious article 'skimming' make it
 apparent you didn't do your homework before posting.

Pardon me for my reactionary style.  I am merely frustrated by M$'s
irresponsible business practices, and their unwillingness to correct the
problems that they make for every internet user (not just Windows users).


 FWIW I have used rainbow tables for dictionary-styled attacks for
 about 7 years now.  There have been available CLI-based tools for
 generating dictionary lists using different character sets for the
 better part of the past 10 years.  There are also many dictionary
 lists in multiple languages available on many university public FTP
 sites to build and extend your own from.

Your point?  I agree that these have been around a while, but even if
they have been, it shouldn't change the fact that a hash is either
secure or it isn't, for the level of computation possible by today's
computers.  Yes, good passwords are always a must, along with a good
hash, but what he defines as good, is a joke.  I mean really, how many
bits of entropy are in an english sentence?  Last I heard, about 1 to
1.5 bits per character.  

Mr. Hensing comes across as (if I may paraphrase): You foolish users,
why aren't you using secure passphrases???  8-character passwords just
aren't good enough because of all of these big nasty hackers have great
cracking tools!!!  Which, of course, is horseshit.

You ever tried building a rainbow table for salted SHA?  How much disk
you got?  Let's see... for 8-character alphanumerics w/ 10 special
characters, on a 14bit salt, you'll need around 
(46^8)*(7+20)*(2^14) ~= 8868422 TerraBytes
Do let me know if I fudged on any of those off-the-napkin calculations.

So, the moral of the story is, he doesn't know what he is talking about.
Feel free to defend him, but I am not posting any more on this topic.

tim

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html