BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Most common (or Most important) privacy leaks
- Subject: [Discuss] Most common (or Most important) privacy leaks
- From: richard.pieri at gmail.com (Richard Pieri)
- Date: Wed, 18 Feb 2015 18:51:45 -0500
- In-reply-to: <BN3PR0401MB1204788CAAF9832D2D576698DC2C0@BN3PR0401MB1204.namprd04.prod.outlook.com>
- References: <BN3PR0401MB12046B091F0FA6E67DDB34A2DC2F0@BN3PR0401MB1204.namprd04.prod.outlook.com> <54E4CF78.8010801@horne.net> <CANiupv7soXfXb-3RA_RO3gD5OY5XzJxoLoSf5664+4=kJzkNMg@mail.gmail.com> <54E4E966.20104@gmail.com> <54E4F155.4010301@borg.org> <BN3PR0401MB1204788CAAF9832D2D576698DC2C0@BN3PR0401MB1204.namprd04.prod.outlook.com>
On 2/18/2015 3:28 PM, Edward Ned Harvey (blu) wrote: > They are both secrets, but a password is assumed to be stored in a > human brain and assumed to contain limited entropy, while an There's a flaw with this reasoning: a typical password is stored in at least two places. The first is the human user's brain (or brain assistance device like a piece of paper). The second is on a computer somewhere behind the authentication system. It is in the second place that distinctions between passwords and keys starts to fall apart. It is in the second place where password policies are flawed designs. Simple example: how are Unix and Linux passwords stored? Used to be a password was encrypted with DES using the password itself as the key and the first two characters of the login name as the salt. Eventually DES was replaced with 3DES then MD5 and other secure hash algorithms. Regardless of the cipher or hash the password is the key for itself. This is fundamental to how traditional password authentication works (assuming that passwords aren't left in cleartext). In principle there is no reason why a Unix or web site password must be stored in a human brain (or assistance device). In principle there is no reason why it must have limited entropy. In principle there is no reason why these passwords cannot be long strings of randomly generated bits. Forget the perceived dichotomy between passwords and keys. Implement a robust, verifiable key chain system that uses long, random bit strings of arbitrary length for authentication. Move the security of this system into the physical world because while humans are terrible at digital security we are good with physical security. -- Rich P.
- References:
- [Discuss] Most common (or Most important) privacy leaks
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] Most common (or Most important) privacy leaks
- From: bill at horne.net (Bill Horne)
- [Discuss] Most common (or Most important) privacy leaks
- From: sweetser at alum.mit.edu (Doug)
- [Discuss] Most common (or Most important) privacy leaks
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Most common (or Most important) privacy leaks
- From: kentborg at borg.org (Kent Borg)
- [Discuss] Most common (or Most important) privacy leaks
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] Most common (or Most important) privacy leaks
- Prev by Date: [Discuss] Most common (or Most important) privacy leaks
- Next by Date: [Discuss] Most common (or Most important) privacy leaks
- Previous by thread: [Discuss] Most common (or Most important) privacy leaks
- Next by thread: [Discuss] Most common (or Most important) privacy leaks
- Index(es):