Why use strong passwords?


 
Thread Tools Search this Thread
Special Forums Cybersecurity Why use strong passwords?
# 8  
Old 11-05-2012
Quote:
Originally Posted by Corona688
That only matters when you've swiped someone's shadow file though. If they have to brute-force your login, most systems will slow down failed logins severely.
Well, that is exactly what I said in my first post, that the issue is when someone steals the password file (what ever kind it is), my post was:

Quote:
One reason is that if someone steals the password file with all the encrypted passwords , it is easy to crack weak passwords. So, imagine a business with 20,000 customers and someone steals the password file. It would be easy for a criminal to run a brute force exploit (attack) against the encrypted passwords in the password file, and then subsequently compromise the accounts.
And in reality, this is what happens. A password file or database full of passwords (encrypted) are stolen; this can also include encrypted credit card information and other confidential data.

The same is also true for encrypted WIFI keys, which can be stored as encrypted text and then later on, a brute force attack is applied against those passwords; so the exploit is first gathering the data (encrypted text) and later running an attack against the ciphertext.
# 9  
Old 11-05-2012
Even so, you are still left with the problem of determining the seed used on the target system. The same password for the same user on the same system does not produce the same encrypted key each time the password is changed.
# 10  
Old 11-05-2012
The seed is not a problem, it is just more bits to brute force, for the most part, and it does not take a cryptographic genius to run brute force attacks against passwords with salt.

Actually, I recall from my old days in Internet security that the salt / seeds can actually be exploited and some actually weaken the crypto when many examples of the encrypted data exist.

For example, a large passwd file has many examples of the same crypt algorithm running against the same plaintext, so the salt can actually weaken the crypto, in some cases.

But, it's been a while since it been years since I did this deep level security.

The bottom line is that crypto is math and brute force attacks against cipertext is easy in the world of modern computing. The most important thing is to use the longest key space possible and modern algorithms designed to be strong against modern computing power.
# 11  
Old 11-05-2012
Here is one quick reference about salt:

Quote:
Obviously, the use of salting does not necessarily improve the strength of the encryption. In fact, especially since the mechanism of DEA is not well understood by cryptanalysts who do not have access to classified files explaining the algorithm, it is possible that salting may have weakened the encryption process.
Frankly, many years ago, I worked on a project to help NIST in the US evaluate the AES algorithm. I even wrote a paper on the topic; but it was not published (public).

Crypto is math, and computing power... and the state of the art changes as computing power changes. What was a great crypto algorithm for the processing power of 10 years ago is just weak "history" today, and the same is true for the crypto today, when we fast forward 10 or more years.

Edit: Anyway, this is mostly "abstract" because when discussing cryptography, we should really not speak in sweeping generalizations; but focus on the exact algorithms, hash functions, length of keys, salt, method of storing both cryptographics hashes and salt, etc.
# 12  
Old 11-05-2012
Passwords are no longer stored in /etc/passwd. If you have access to /etc/shadow, then you already have root access to the target system anyway, either through the root password, or physical access.
# 13  
Old 11-05-2012
Quote:
Originally Posted by jgt
Passwords are no longer stored in /etc/passwd. If you have access to /etc/shadow, then you already have root access to the target system anyway, either through the root password, or physical access.
Yes, I am using the term "password file" in the general since, as we have not discussed a specific system, algorithm, configuration, security policy, etc.

And, we are getting far off topic in my view; the original poster asked why there is a requirement for strong passwords versus weak ones; not for a discussion of every possible argument pro and con for security.

It's not that hard for an experienced attacker to gain root access; but that is not a topic for this thread. In fact, as we know, we can gain root access for most any computer we have physical access to.

Let's not go down that path.. thanks. The path just gets further and further off topic of the question asked by the original poster.
# 14  
Old 11-05-2012
In case anyone needs help with choosing a strong password: xkcd: Password Strength

Regards,
Alister
This User Gave Thanks to alister For This Post:
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

When did UNIX start using encrypted passwords, and not displaying passwords when you type them in?

I've been using various versions of UNIX and Linux since 1993, and I've never run across one that showed your password as you type it in when you log in, or one that stored passwords in plain text rather than encrypted. I'm writing a script for work for a security audit, and two of the... (5 Replies)
Discussion started by: Anne Neville
5 Replies

2. Shell Programming and Scripting

Strong quotes and spaces

We ran into a problem because of a shop that uses Windows and UNIX. The file names that Windows uses have spaces in them. When they get moved to the unix system they still have spaces. This produces a problem in our script that moves them again from one unix system to another. I've made up a... (2 Replies)
Discussion started by: jimcampanella
2 Replies
Login or Register to Ask a Question