mersenneforum.org  

Go Back   mersenneforum.org > Other Stuff > Forum Feedback

Reply
 
Thread Tools
Old 2007-10-02, 16:53   #12
ewmayer
2ω=0
 
ewmayer's Avatar
 
Sep 2002
República de California

103·113 Posts
Default

We should probably dub this strategy [or non-strategy, as the case may be] of hiding it in plain sight the "purloined letter strategy," after the famous E.A.Poe short story.

"We use PLS2007 encryption here at our nuclear lab" - sounds pretty impressive, don't it?
ewmayer is offline   Reply With Quote
Old 2007-10-05, 19:04   #13
hhh
 
hhh's Avatar
 
Jun 2005

17516 Posts
Default

A propos passwords:

Xyzzy, what I was always wondering:
are you able to see my password, "biggudikku" ("Big dick" in japanese), and can hence more easily guess the password for my email account, "grossebohnen"?
And if you can, do you do so?

That's what I was always wondering.

H.
hhh is offline   Reply With Quote
Old 2007-10-07, 10:29   #14
xilman
Bamboozled!
 
xilman's Avatar
 
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across

101010000000012 Posts
Default

Quote:
Originally Posted by hhh View Post
A propos passwords:

Xyzzy, what I was always wondering:
are you able to see my password, "biggudikku" ("Big dick" in japanese), and can hence more easily guess the password for my email account, "grossebohnen"?
And if you can, do you do so?

That's what I was always wondering.

H.
Let's examine that statement more precisely.

I can't see you typing your password from where I am. However, if I were looking over your shoulder, I could almost certainly see you typing. If the characters were visible, I would almost certainly memorize them. I've done so in the past in other circumstances and I don't see why I shouldn't be able to do so in the future. There are several places around the world where I can get in through PIN-protected door locks...

Further, I have had quite a bit of practice with password searching in the past. A useful exercise with Google might be to validate that claim. You may have to go back 15 years or more. I'll make life easier for you and suggest some keywords: "Crack", "dictionary" (or "dictionaries"), "lexicon" (or "lexicons"), "OxCERT", "black.ox.ac.uk" and "ftp.ox.ac.uk" will get you started.

If, after researching the situation, you still don't believe that I'd spent time and effort trying to work out whether you have a pattern in choosing your password and testing my hypotheses, I'd say you were hopelessly naive.

All the above assumes that I'd have a motive to spend that effort. I have had sound motives in the past. Unfortunately, I can't give you detailed information about the cases I've investigated (CERTs have strict confidentiality procedures) but I assure you that I've broken people's passwords in earnest.


Paul

Last fiddled with by xilman on 2007-10-07 at 14:43 Reason: Fix a couple of speeling misteaks
xilman is offline   Reply With Quote
Old 2007-10-07, 14:03   #15
Xyzzy
 
Xyzzy's Avatar
 
"Mike"
Aug 2002

25×257 Posts
Default

All the passwords in the forum database are encrypted so even if you forget your password and ask us to send you a reminder we cannot. The only recourse is to reset the password. (Well, with enough time we could brute force the password, but it would take a long time.)

We also have a "login attempt rate limiter, with lockout" to prevent brute force attacks to the forum.

In the past we have had to break passwords on machines we have had physical access to. We have done so the hard way (brute force dictionary attacks) but usually it is much easier to just boot the machine in single user mode and get root access.

For fun, sometimes we'll run a password cracker against the password file on some of our friend's machines, at their request. Usually more than half the passwords are easily retrieved within an hour or so.

Some info about vBulletin's password system:

http://www.vbulletin.com/forum/showthread.php?t=131103
http://www.vbulletin.com/forum/showthread.php?p=543534

By far the easiest way to get a password is via social engineering.
Xyzzy is offline   Reply With Quote
Old 2007-10-07, 15:34   #16
Mr. P-1
 
Mr. P-1's Avatar
 
Jun 2003

22218 Posts
Default

Quote:
Originally Posted by Xyzzy View Post
All the passwords in the forum database are encrypted so even if you forget your password and ask us to send you a reminder we cannot. The only recourse is to reset the password. (Well, with enough time we could brute force the password, but it would take a long time.)
You could also hack the code so as to dump the plaintext password into a file whenever people log in or change their password.

Everyone else should assume that websites do this, and not re-use critical passwords (such as for online banking sites) anywhere else.
Mr. P-1 is offline   Reply With Quote
Old 2007-10-08, 13:14   #17
retina
Undefined
 
retina's Avatar
 
"The unspeakable one"
Jun 2006
My evil lair

22×1,549 Posts
Default

Of course, not forgetting that the entire login process is not encrypted in any fashion while the information is on it's way from your browser to the forum server. Any ISP or router hub sysop could have all your passwords for those non-SSL sites you log into.

Just wanted to add this: I never bother to use a hard to guess (and type) password for non-encrypted sites. It is just too easy for anyone to monitor the TCP port and grab whatever they want. I thought about it and decided if I use one of those ugly hard passwords it is more bother for me each time I use it than for the website sysop to extract it. It would only create more bother for me every time I visit and log in.

Besides, the sysop already has complete access to everything, so there is no sense in trying to keep him/her out with an ugly password.

Last fiddled with by retina on 2007-10-08 at 13:19
retina is online now   Reply With Quote
Old 2007-10-08, 13:55   #18
Mr. P-1
 
Mr. P-1's Avatar
 
Jun 2003

7·167 Posts
Default

Quote:
Originally Posted by retina View Post
Besides, the sysop already has complete access to everything, so there is no sense in trying to keep him/her out with an ugly password.
There's no point in trying to keep the sysop out. There is, however, a point in concealing from the sysop any passwords you reuse anywhere else, or which might give clues about how you construct other passwords.

For example, I create unique memorable passwords for different sites by munging the domain name. If that were all I do, then a malicious sysop could perhaps work out the munging algorithm and guess other passwords. To prevent this I pass the result of the munge through mkpasswd, then munge a second time.
Mr. P-1 is offline   Reply With Quote
Old 2007-10-08, 14:11   #19
Siemelink
 
Siemelink's Avatar
 
Jan 2006
Hungary

22×67 Posts
Default

Quote:
Originally Posted by Mr. P-1 View Post
There's no point in trying to keep the sysop out. There is, however, a point in concealing from the sysop any passwords you reuse anywhere else, or which might give clues about how you construct other passwords.

For example, I create unique memorable passwords for different sites by munging the domain name. If that were all I do, then a malicious sysop could perhaps work out the munging algorithm and guess other passwords. To prevent this I pass the result of the munge through mkpasswd, then munge a second time.
I do the same. But my memory is like a sieve, so I write down all my passwords and staple them to my forehead.

Willem.
Siemelink is offline   Reply With Quote
Old 2007-10-20, 15:08   #20
Flatlander
I quite division it
 
Flatlander's Avatar
 
"Chris"
Feb 2005
England

31×67 Posts
Default

I was thinking about passwords the other day when I was laying awake worrying about prime numbers. (Somebody has to.)

An easy way to generate and remember numerical passwords (or PINs) is to just remember a fairly small prime number and then calculate that prime mod each smaller prime.
i.e. for 17

17 mod 2 is 1
17 mod 3 is 2
17 mod 5 is 2
etc.

So the code is 122364. Unguessable by non-nerds anyway.
(You could start from mod a higher prime instead of 2 but that would be an extra thing to remember.)

btw Would any of these sequences be in the OEIS in a different guise?
Flatlander is offline   Reply With Quote
Old 2007-10-20, 21:27   #21
Jens K Andersen
 
Jens K Andersen's Avatar
 
Feb 2006
Denmark

2·5·23 Posts
Default

Quote:
Originally Posted by Flatlander View Post
Would any of these sequences be in the OEIS in a different guise?
You have p mod q with p fixed. This is p for all q>p. p mod q with q fixed is more interesting and is in OEIS up to q=19, for example A039715 for 17.
Jens K Andersen is offline   Reply With Quote
Reply



Similar Threads
Thread Thread Starter Forum Replies Last Post
Windows 10 in Ubuntu, good idea, bad idea, or...? jasong jasong 8 2017-04-07 00:23
Stupid Windows.... petrw1 Hardware 11 2013-01-16 02:45
Bright full moon tonight davieddy Lounge 22 2009-01-18 18:01
(may be) stupid idea for speed of mersenne-LLT Random_zh Software 1 2006-11-24 08:25
Stupid Question fropones Math 2 2003-05-28 00:44

All times are UTC. The time now is 13:05.


Sat Jul 17 13:05:14 UTC 2021 up 50 days, 10:52, 1 user, load averages: 2.57, 2.23, 1.90

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.