[security flaw] Ubuntu is a plain text offender
Kent Borg
kentborg at borg.org
Mon May 23 16:58:13 UTC 2011
Steve Flynn wrote:
> Acorss 54 sites, my average password length is 20.1 bytes (I try to
> generate 32 byte passwords by default but some sites restrict me down
> to say 12).
Be warned that sometimes passwords are silently truncated to just a few
bytes, accepting long passwords, but ignoring all the good entropy.
Also, I count my passwords in bits of entropy, not bytes of ASCII. That
is, I don't generate passwords by thinking up something that *seems*
random and measure the output, rather I use a real random source to
chose the content and measure the input. For example, if you had a list
of 64-words, you could use 6-coin tosses to select on word from the
list. (2^6=64), so one word so chosen has 6-bits of entropy. If you use
a longer word list and repeat, it is possible to come up with a easy to
remember passphrase that is pretty good.
For example: "beauty-alias-citizen" or "budget-sunset-radio" each have
32-bits of entropy. (I have a program that does that.)
Take 32-bits and turn it into hex and you might get 94997b2e, again this
password is worth 32-bits of entropy (but hard to remember). In both
cases the best brute-force attack would take over 4-billion (2^32)
guesses to try all the combinations. 32-bits of entropy is plenty for a
password (where the rate of guessing should be limited) but far too
little for an encryption key (where parallel computers can all work on
parts of the problem at once).
The strength of a passphrase should be set according to how it is used,
and that strength is fundamentally the number of random bits that went
into it. "May the force be with you." Might be longer than the examples
above, but it is a terrible password because too few bits went into
selecting it.
-kb
P.S. Running a program like mine over and over again until you get a
sequence you like is cheating and reduces the quality of the result.
Passwords should be chosen at random, not pawed over by a human. Run the
password generator once and use the first result, and there won't be any
human decisions that can be second guessed. Assume that running a
program like mine twice and choosing the one you like best shaves off a
whole bit of entropy, leaving you with only a 31-bit password.
More information about the ubuntu-users
mailing list