just shows lack of common sense.


On Fri, Oct 19, 2012 at 6:56 PM, Jay Lozier <jsloz...@gmail.com> wrote:

On 10/19/2012 07:32 PM, anne-ology wrote:
>
>>         For the sake of safety, hopefully these are merely fancy
>> advertising
>> schemes  ;-)
>>
>>         BUT judging by the number of hackers able to steal data in recent
>> years, these programs may be working  ;-(
>>
>>         To be conned or not to be conned by these criminal types, seems to
>> boil down to using common sense -
>>             something folks once acquired and used; today common sense
>> seems
>> to have died  ;-(
>>
>>  I have seen many lists of the most common passwords such as password,
> abc123, qwerty, and the like. Plus many reuse their passwords on several
> sites so a hacker gets several sites at once.
>
>>
>> On Tue, Oct 16, 2012 at 9:07 PM, rost52 <bugquestcon...@online.de> wrote:
>>
>> Dennis,
>>
>>> When I am reading your long and excellent explanation, I wonder again how
>>> some PW removing tools, which offer a demo with opening the file or
>>> showing
>>> the PW removed, can claim that the file could be open within a few
>>> seconds
>>> to a minute?
>>>
>>>
>>>
>>> On 16.10.2012 23:34, Dennis E. Hamilton wrote:
>>>
>>>  It is important to separate the use of passwords to set
>>>> protections from use of a password to encrypt the document.
>>>>
>>>> Only "Save with Password" provides cryptographic security
>>>> of the document.
>>>>
>>>> The "Save with Password" encryption is difficult to attack.
>>>> The password is usually the weakest point and the password
>>>> may fall to a variety of attacks that use pre-computed
>>>> dictionaries of SHA1 digests and other brute-force
>>>> techniques.  It is also possible that an attack may break
>>>> the encryption without discovering the password itself.
>>>> All of these attacks are believed to required great effort.
>>>> In general, one should expect that a password used in
>>>> "Save with Password" is not discoverable unless it is
>>>> carelessly chosen or heavily reused.
>>>>
>>>> The harder the password is to attack, the harder it is
>>>> to recover, of course.
>>>>
>>>> In contrast, all of the protection settings are insecure.
>>>>
>>>> The protections are trivial to remove.  It can be done
>>>> by any knowledgeable user with a Zip utility and an XML
>>>> editor.  It is not necessary to know the password to
>>>> remove the protection.  However, all passwords used in
>>>> making protection settings should be considered compromised.
>>>> That is because the document stores an SHA1 or other unsalted
>>>>    hash in "plain view" in the document.  These hashes are
>>>> cracked with ease using conventional systems.  A password
>>>> used to set a protection should not be used for any
>>>> more-private purpose.  In particular, if the same passwords
>>>>    are used for protections on unencrypted documents and for
>>>> saving with password (encryption), the encryption can be
>>>> broken directly using the SHA1 digest from the protection
>>>> setting.
>>>>
>>>> Protection settings are on spreadsheet fields and sheets.
>>>> There are protection settings on text as well.  The
>>>> protection against altering change-tracking and the
>>>> protection for keeping a document read-only are all of
>>>> this kind.  The protection is useful for avoiding mistaken
>>>>    alterations.
>>>>
>>>> It is easy for all of these protections to be removed, the
>>>> document altered, and the protections restored with the
>>>> very same unlocking password without ever having to
>>>> know the password.
>>>>
>>>> A digital signature can prevent the document from undetected
>>>> alterations, but that doesn't work for turnaround documents
>>>> where some alterations are meant to be allowed.
>>>>
>>>> There is more explanation of the use and risk of protections,
>>>> and their removal, here:
>>>> <https://tools.oasis-open.org/****version-control/svn/oic/**<https://tools.oasis-open.org/**version-control/svn/oic/**>
>>>> Advisories/00009-****ProtectionKeySafety/trunk/****description.html<
>>>> https://**tools.oasis-open.org/version-**control/svn/oic/Advisories/**
>>>> 00009-ProtectionKeySafety/**trunk/description.html<https://tools.oasis-open.org/version-control/svn/oic/Advisories/00009-ProtectionKeySafety/trunk/description.html>
>>>> >
>>>>
>>>> A proposal for more-reliable security of protection passwords
>>>> (but not the protections themselves) is before the
>>>> OASIS ODF TC:
>>>> <https://www.oasis-open.org/****committees/document.php?****
>>>> document_id=46220<https://www.oasis-open.org/**committees/document.php?**document_id=46220>
>>>> <https://www.**oasis-open.org/committees/**
>>>> document.php?document_id=46220<https://www.oasis-open.org/committees/document.php?document_id=46220>
>>>> **>
>>>>
>>>>  .
>>>>>
>>>>    - Dennis
>>>>
>>>>
>>>>
>>>> From: Dr. R. O Stapf [mailto:reinhold@stapf-online.****com<
>>>> reinhold@stapf-online.**com <reinh...@stapf-online.com>>
>>>> ]
>>>> Sent: Tuesday, October 16, 2012 06:30
>>>> To: users@global.libreoffice.org
>>>> Subject: Re: [libreoffice-users] Re: how to crack a PW in LO?
>>>>
>>>> you are perfectly right about this!!!
>>>>
>>>>
>>>> On 16.10.2012 22:22, Andrew Douglas Pitonyak wrote:
>>>>
>>>>  Unless you have a lot of time to kill (days, weeks, months, etc), you
>>>>> are much better off not
>>>>> forgetting your password.
>>>>>
>>>>>

-- 
For unsubscribe instructions e-mail to: users+h...@global.libreoffice.org
Problems? http://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/
Posting guidelines + more: http://wiki.documentfoundation.org/Netiquette
List archive: http://listarchives.libreoffice.org/global/users/
All messages sent to this list will be publicly archived and cannot be deleted

Reply via email to