On Sat, 30 Jul 2011 00:33:02 +0000 (UTC), Andrew Smallshaw
<andrews@sdf.lonestar.org> wrote:
>On 2011-07-29, Robert Wessel <robertwessel2@yahoo.com> wrote:
>> On Fri, 29 Jul 2011 19:52:33 +0000 (UTC), Andrew Smallshaw
>><andrews@sdf.lonestar.org> wrote:
>>
>>>At that point I couldn't reuse an old password since thay were
>>>automatically black-listed (in other words, they were _not_ being
>>>irretrievably hashed) (...)
>>
>> While it may indicate that, the way it's usually done is to keep the
>> last N hashes, and prevent password that have the same hash from being
>> reused. Obviously there's a chance of collisions, but a decent hash
>> of adequate size keeps that to a minimum.
>
>Not here, since the blacklisting was coupled with a "too much alike"
>test. So, for example, if a previous password was "Password1" it
>would reject "Password2" as well. I don't see how you can implement
>that without being able to recover the original password.
Usually you do a number of very short "hashes" to catch certain
conditions. For example, you could sum the characters of the password
(perhaps mod some value), and insist that the old and new sum be at
least two different - that way you catch all the password1, password2,
password3... attempts. You have to be careful to not end up storing
too much information when you do that. Of course that can generate
false positives.
As I said, I don't know anything about the implementation in question,
and they could very well be doing it badly.
Reply by Andrew Smallshaw●July 29, 20112011-07-29
On 2011-07-29, Robert Wessel <robertwessel2@yahoo.com> wrote:
> On Fri, 29 Jul 2011 19:52:33 +0000 (UTC), Andrew Smallshaw
><andrews@sdf.lonestar.org> wrote:
>
>>At that point I couldn't reuse an old password since thay were
>>automatically black-listed (in other words, they were _not_ being
>>irretrievably hashed) (...)
>
> While it may indicate that, the way it's usually done is to keep the
> last N hashes, and prevent password that have the same hash from being
> reused. Obviously there's a chance of collisions, but a decent hash
> of adequate size keeps that to a minimum.
Not here, since the blacklisting was coupled with a "too much alike"
test. So, for example, if a previous password was "Password1" it
would reject "Password2" as well. I don't see how you can implement
that without being able to recover the original password.
--
Andrew Smallshaw
andrews@sdf.lonestar.org
Reply by Robert Wessel●July 29, 20112011-07-29
On Fri, 29 Jul 2011 19:52:33 +0000 (UTC), Andrew Smallshaw
<andrews@sdf.lonestar.org> wrote:
>Those kind of precautions always strike me as counter-productive.
>One case in point was a former credit card provider who had all
>that kind of strong-password precautions, expired them every 90
>days and locked your account on the third unsuccessful attempt.
>The problem is that I may have only wanted to check my credit card
>online a couple of times a year at most. In other words, I needed
>to change my password every time I logged in.
>
>At that point I couldn't reuse an old password since thay were
>automatically black-listed (in other words, they were _not_ being
>irretrievably hashed) (...)
While it may indicate that, the way it's usually done is to keep the
last N hashes, and prevent password that have the same hash from being
reused. Obviously there's a chance of collisions, but a decent hash
of adequate size keeps that to a minimum.
A problem with the one-way hashes is that they inherently reduce the
entropy in the passwords, since you're throwing some of that away to
make the process irreversible. So there will always be multiple
passwords that hash to the same value.
Reply by Don Y●July 29, 20112011-07-29
Hi Andrew,
On 7/29/2011 12:52 PM, Andrew Smallshaw wrote:
> On 2011-07-28, Don Y<nowhere@here.com> wrote:
>> <frown> Yeah, something needs to be done about this:
>>
>> "Never use the same password for different accounts"
>> "Never write down your password"
>> "Never use an easy to guess (remember!) password"
>> "Never use less than 14 characters containing a mix of
>> alpha, numeric, punctuation and differing cases."
>
> Those kind of precautions always strike me as counter-productive.
> One case in point was a former credit card provider who had all
> that kind of strong-password precautions, expired them every 90
> days and locked your account on the third unsuccessful attempt.
> The problem is that I may have only wanted to check my credit card
> online a couple of times a year at most. In other words, I needed
> to change my password every time I logged in.
Automated systems for enforcing these sorts of policies are
silly. All they effectively do is force you to come up with
(trivial) ways to get around their rules. E.g., change
your "foo!Baz3" password to "goo@Caz4"... then "hoo#Daz5", etc.
I.e., all you are doing is making my life more difficult
and doing nothing to increase the security *on* my account.
I avoid most on-line accounts and insist on talking to
a real human being. They verify the number I am calling
from coincides with the number from which I originally
authorized the card. And, can ask me selective questions to
verify my identity -- hopefully better than a machine can!
> At that point I couldn't reuse an old password since thay were
> automatically black-listed (in other words, they were _not_ being
> irretrievably hashed) so the only practical portion was to record
> the password somewhere - surely counter-productive. I think this
> kind of paranoid and truly impractical security has more to do with
> the card provider covering their own back than actually providing
> effective security.
Exactly! Remember that their goal in all of this is to reduce
*their* costs by making it easier for you to interact with a machine
(even though you might have to spend *more* time on each such
transaction). So, they want to do "enough" to NOT be accused of
being sloppy, etc.
> Another case in point was in a former government job. 90%+ of the
> material was only restricted but there was a small minority of
> confidential material. In other words, not terribly sensitive
> stuff, but the government tends to be pretty hot on these things.
> Again, passwords expired every 90 days and the accounts were locked
> on the third unsuccessful attack. This time passwords were
> machine-generated. To give you some idea of how secure this "highly
> secure" system is in reality I once had to check everyone's desks
> at the end of the day for some missing papers. I checked twelve
> desks and found passwords for nine accounts, hidden under keyboards
> or suchlike. In other words, the real level of security was close
> to zero, since one thing those systems had going for them was a
> proper single-point sign on. Once logged in, you had full access
> to _all_ services you were authorised for.
sex, passw0rd, admin, god, etc. I am amazed at how often these
passwords actually *work*!
The problem with passwords is that they require too much effort
and discretion on the part of the user (password holder). I'd
much prefer smartcard readers or their ilk... something where
I can carry a *token* for authentication.
I've settled on long passwords that are easy to remember
but contain unusual characters (not obvious ones like
using '@' as "at", '2' as "to", '4' as "for", etc.).
I also regularly watch the rainbow table builders to see
what limitations they impose on their tables to block
that (easy!) attack (at least on my PC's).
I routinely discard on-line accounts (email, etc.) so the
problem of changing passwords seldom presents itself.
[OTOH, these tools make it *really* easy to exploit naive
users... I always find it amusing to consider how the
"victim's" machine actually does ALL the work cracking
*their* password! :-/ ]
Reply by Andrew Smallshaw●July 29, 20112011-07-29
On 2011-07-28, Don Y <nowhere@here.com> wrote:
>
> There are some "free" NNTP services (with limitations).
I've been using eternal-september.org for the last couple of years.
Free and the only real issue I've noticed is they don't carry binary
groups, but that isn't a problem at all for me.
><frown> Yeah, something needs to be done about this:
>
> "Never use the same password for different accounts"
> "Never write down your password"
> "Never use an easy to guess (remember!) password"
> "Never use less than 14 characters containing a mix of
> alpha, numeric, punctuation and differing cases."
Those kind of precautions always strike me as counter-productive.
One case in point was a former credit card provider who had all
that kind of strong-password precautions, expired them every 90
days and locked your account on the third unsuccessful attempt.
The problem is that I may have only wanted to check my credit card
online a couple of times a year at most. In other words, I needed
to change my password every time I logged in.
At that point I couldn't reuse an old password since thay were
automatically black-listed (in other words, they were _not_ being
irretrievably hashed) so the only practical portion was to record
the password somewhere - surely counter-productive. I think this
kind of paranoid and truly impractical security has more to do with
the card provider covering their own back than actually providing
effective security.
Another case in point was in a former government job. 90%+ of the
material was only restricted but there was a small minority of
confidential material. In other words, not terribly sensitive
stuff, but the government tends to be pretty hot on these things.
Again, passwords expired every 90 days and the accounts were locked
on the third unsuccessful attack. This time passwords were
machine-generated. To give you some idea of how secure this "highly
secure" system is in reality I once had to check everyone's desks
at the end of the day for some missing papers. I checked twelve
desks and found passwords for nine accounts, hidden under keyboards
or suchlike. In other words, the real level of security was close
to zero, since one thing those systems had going for them was a
proper single-point sign on. Once logged in, you had full access
to _all_ services you were authorised for.
--
Andrew Smallshaw
andrews@sdf.lonestar.org
Reply by bbhack●July 29, 20112011-07-29
On 07/28/2011 03:59 AM, Don Y wrote:
> On 7/27/2011 9:51 PM, bbhack wrote:
>> On 07/23/2011 04:56 PM, Don Y wrote:
>
>>> But why *use* google groups instead of a "real" news service?
>>>
>>> (sorry, I don't use anything but google search -- and that, DECREASINGLY
>>> so...)
>>
>> I'm using Clear at the moment. Previously TW, previously ATT. None offer
>> NNTP anymore (some time now).
>
> There are some "free" NNTP services (with limitations).
>
> Locally, smaller providers (typically those with UN*X services)
> will often give you access to an NNTP -- if not a complete *feed*
> (as well as shell access, etc.)
>
>> So, it's just one more expense to have real NNTP, but I found out, after
>> some effort, that low byte-count NNTP is real cheap. Just another
>> account and password, like you don't have too many already.
>
> <frown> Yeah, something needs to be done about this:
>
> "Never use the same password for different accounts"
> "Never write down your password"
Way OT, but whatever. A security expert once said to keep you passwords
strong and different, write them down and put them in your wallet. I
would agree, but I don't do that. I do keep a card at my desk, though.
And they're not all strong and not all different.
> "Never use an easy to guess (remember!) password"
> "Never use less than 14 characters containing a mix of
> alpha, numeric, punctuation and differing cases."
>
> OK, yet every financial institution, internet service,
> retailer, etc. wants me to set up a *separate* account
> with them... just how much of this am I supposed to
> commit to memory? :>
>
> [I am actually amused at just how much of this cruft I
> *can* keep in my head!]
>On Thu, 28 Jul 2011 06:44:46 -0500, Robert Wessel
><robertwessel2@yahoo.com> wrote:
>
>>On Thu, 28 Jul 2011 01:59:13 -0700, Don Y <nowhere@here.com> wrote:
>>
>>>On 7/27/2011 9:51 PM, bbhack wrote:
>>>> So, it's just one more expense to have real NNTP, but I found out, after
>>>> some effort, that low byte-count NNTP is real cheap. Just another
>>>> account and password, like you don't have too many already.
>>>
>>><frown> Yeah, something needs to be done about this:
>>>
>>>"Never use the same password for different accounts"
>>>"Never write down your password"
>>>"Never use an easy to guess (remember!) password"
>>>"Never use less than 14 characters containing a mix of
>>> alpha, numeric, punctuation and differing cases."
>>>
>>>OK, yet every financial institution, internet service,
>>>retailer, etc. wants me to set up a *separate* account
>>>with them... just how much of this am I supposed to
>>>commit to memory? :>
>>>
>>>[I am actually amused at just how much of this cruft I
>>>*can* keep in my head!]
>>
>>
>>While a global authentication scheme has its attractions (and its
>>drawbacks), in the interim something like Password Safe can go a long
>>way to making the multitude of accounts and passwords problem
>>tractable:
>>
>>http://passwordsafe.sourceforge.net/
>
>There's also http://keepass.info/, another FOSS password keeper. A nice
>feature (that may be in Password Safe but I've never used that one) is
>that it can be set to clear the clipboard after X seconds, so that a
>copy-n-paste operation to use an account's password isn't vulnerable to
>a clipboard sniffer (or accidentally pasting the password somewhere else
>in the clear fifteen minutes later).
Password Safe is similar. It locks the database (so you have to enter
the database password again) and clears the clipboard after the
configured interval, and usually clears the clipboard after you
minimize the app too.
I've not used Keepass, but there are a lot of nice features in PWS,
and I've used it for years. I don't think I could live without
something like that - I've got nearly 300 entries in mine.
Reply by Rich Webb●July 28, 20112011-07-28
On Thu, 28 Jul 2011 06:44:46 -0500, Robert Wessel
<robertwessel2@yahoo.com> wrote:
>On Thu, 28 Jul 2011 01:59:13 -0700, Don Y <nowhere@here.com> wrote:
>
>>On 7/27/2011 9:51 PM, bbhack wrote:
>>> So, it's just one more expense to have real NNTP, but I found out, after
>>> some effort, that low byte-count NNTP is real cheap. Just another
>>> account and password, like you don't have too many already.
>>
>><frown> Yeah, something needs to be done about this:
>>
>>"Never use the same password for different accounts"
>>"Never write down your password"
>>"Never use an easy to guess (remember!) password"
>>"Never use less than 14 characters containing a mix of
>> alpha, numeric, punctuation and differing cases."
>>
>>OK, yet every financial institution, internet service,
>>retailer, etc. wants me to set up a *separate* account
>>with them... just how much of this am I supposed to
>>commit to memory? :>
>>
>>[I am actually amused at just how much of this cruft I
>>*can* keep in my head!]
>
>
>While a global authentication scheme has its attractions (and its
>drawbacks), in the interim something like Password Safe can go a long
>way to making the multitude of accounts and passwords problem
>tractable:
>
>http://passwordsafe.sourceforge.net/
There's also http://keepass.info/, another FOSS password keeper. A nice
feature (that may be in Password Safe but I've never used that one) is
that it can be set to clear the clipboard after X seconds, so that a
copy-n-paste operation to use an account's password isn't vulnerable to
a clipboard sniffer (or accidentally pasting the password somewhere else
in the clear fifteen minutes later).
--
Rich Webb Norfolk, VA
Reply by Robert Wessel●July 28, 20112011-07-28
On Thu, 28 Jul 2011 01:59:13 -0700, Don Y <nowhere@here.com> wrote:
>On 7/27/2011 9:51 PM, bbhack wrote:
>> So, it's just one more expense to have real NNTP, but I found out, after
>> some effort, that low byte-count NNTP is real cheap. Just another
>> account and password, like you don't have too many already.
>
><frown> Yeah, something needs to be done about this:
>
>"Never use the same password for different accounts"
>"Never write down your password"
>"Never use an easy to guess (remember!) password"
>"Never use less than 14 characters containing a mix of
> alpha, numeric, punctuation and differing cases."
>
>OK, yet every financial institution, internet service,
>retailer, etc. wants me to set up a *separate* account
>with them... just how much of this am I supposed to
>commit to memory? :>
>
>[I am actually amused at just how much of this cruft I
>*can* keep in my head!]
While a global authentication scheme has its attractions (and its
drawbacks), in the interim something like Password Safe can go a long
way to making the multitude of accounts and passwords problem
tractable:
http://passwordsafe.sourceforge.net/
Reply by Walter Banks●July 28, 20112011-07-28
Don Y wrote:
> Hi Walter,
>
> On 7/27/2011 2:01 AM, Walter Banks wrote:
> > A typical microwave implementation
> > that I am familiar with uses 40-60K of 8 bit processor code
> > for oven control and separate micro for display and keyboard.
>
> Is this a "typical microwave oven"? Or, just one that you are
> familiar with?
>
I am familiar with two companies microwave oven product lines. Both are
large companies with a range of models and features. Both ship products
world wide. My typical comment was a statistical mean of the products
they ship. I am familiar with both their low end product and high end
products. A the low end software has few user features but still
requires oven control for reasonable product life and safety. The high
end models implement indirect instrumentation to measure contents and
data bases of cooking profiles.
Regards,
w..
--
Walter Banks
Byte Craft Limited
http://www.bytecraft.com