Re: Certificate pass phrase brute force...

2014-09-05 Thread Kyle Hamilton
If someone has the encrypted key data, they can feed that data anywhere they wish. In that case, they can feed it into processing systems that do not enforce rate-limiting. Thus, there is no way to do what Dave Paxton suggests in any case. -Kyle H On September 5, 2014 12:51:04 PM PST, flgirl7

Re: Certificate pass phrase brute force...

2014-09-05 Thread Gregory Sloop
There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption is that your users will pick truly random 10char passw

RE: Certificate pass phrase brute force...

2014-09-05 Thread Michael Wojcik
Very few attackers are going to bother with an online attempt to crack a password, except when a (broken) system provides an oracle for validating password attempts. They'll get a copy of a password verifier (such as a salted hash or something encrypted using the password) and perform an offline

Re: Certificate pass phrase brute force...

2014-09-05 Thread netout net
je comprends pas ce qu'il se passe Le 5 sept. 2014 22:04, "dave paxton" a écrit : > Perfect. No rudeness here. Just ideas. I do think that relying on a > password as a base system for the private key will be the Achilles heal of > any system. Even if you allow for CAPS you will soon have sys

Re: Certificate pass phrase brute force...

2014-09-05 Thread dave paxton
Perfect. No rudeness here. Just ideas. I do think that relying on a password as a base system for the private key will be the Achilles heal of any system. Even if you allow for CAPS you will soon have systems that will try to pass these in a few million times a second. As an administrator look

Re: Certificate pass phrase brute force...

2014-09-05 Thread flgirl799901
I most certainly did NOT hack into anything. I thank you so much for your response, but deplore your rudeness Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone Original message From: dave paxton Date:09/05/2014 3:33 PM (GMT-05:00) To: openssl-users@openssl.org

RE: Certificate pass phrase brute force...

2014-09-05 Thread Michael Wojcik
[Apologies for top-posting; I'm using Outlook, and it's incapable of handling replies to HTML email properly. I'm sympathetic to its dislike of HTML email, but not to its inability to do things that BSD Mail managed to accomplish 30 years ago. Anyway...] First: Passphrases for certificates are

Re: Certificate pass phrase brute force...

2014-09-05 Thread dave paxton
That is easy. Just restrict the number of different passwords per day. Any account. Thus the old school brute force idea passes out the window. Most of what you are looking at it a signing issue. Basically one person does a transaction and the the other person verifies it. They do the DSA and

RE: Certificate pass phrase brute force...

2014-09-05 Thread Salz, Rich
There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption is that your users will pick truly random 10char passwor

RE: Certificate pass phrase brute force...

2014-09-05 Thread flgirl799901
How do I unsubscribe from all of this? Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone Original message From: Gregory Sloop Date:09/05/2014 1:36 PM (GMT-05:00) To: openssl-users@openssl.org Cc: Subject: Certificate pass phrase brute force... General quest

Certificate pass phrase brute force...

2014-09-05 Thread Gregory Sloop
General question: I've done a number of searches and can't find a lot about the subject. [I've searched the list archives too...at least as best I could.] In several cases, the most obvious being OpenVPN, I use client certificates generated by openssl, with a pass-phrase [password]. This means

RE: The no-stdio and NO_FP_API options

2014-09-05 Thread Salz, Rich
Thanks. There is no big rush, knowing you're working on it, and this is for after 1.0.2. Perhaps by January/Feb? -- Principal Security Engineer Akamai Technologies, Cambridge MA IM: rs...@jabber.me Twitter: RichSalz __ Open