D
Dave Searles
Lew said:[says I'm a liar]Dave said:Whaaat? Nonsense.Arne said:[says I'm a liar]
No, you are.
Lew said:[says I'm a liar]Dave said:Whaaat? Nonsense.Arne said:[says I'm a liar]
You use of big-O is rather unconventional.
But we understand the point.
Very important: you logic assumes different salts per user. That
is good practice. But I think it should be emphasized.
The use of salt makes all dictionary attacks more difficult, because
it invalidates pre-calculated dictionaries.
Dave said:Ken said:Hey!Arne said:Dave Searles wrote:
Arne Vajh�j wrote:
Dave Searles wrote:
markspace wrote:
Dave Searles wrote:
It seems to me that if you have the hash and the salt, and know the
algorithm for convolving the password with the salt, then you can
still carry out a dictionary attack.
A dictionary attack pre-computes the hash, and then just scans the
password file for a simple string match. The salt defeats this,
because each bit in the salt doubles the storage needed for the
dictionary.
<http://en.wikipedia.org/wiki/Salt_(cryptography)>
You're right in that if the password itself is weak and could be
guessed, then all bets are off.
As Tom explained, the salt does not make any single password harder
to crack, but it does slow down an attack aimed at getting all (or
the first) dictionary-vulnerable password.
I was thinking in terms of protecting a particular targeted account
(yours, say, or the superuser account), while you two were apparently
thinking more of protecting all of the accounts in some statistical
sense.
[misquotes me]
Whaaat? Nonsense.
It is true.
No, I am NOT a liar.
I don't consider "no salt" and "same salt for all users" to be
meaningfully distinct; it amounts to a mere difference in the hashing
algorithm, and not one that makes one of them noticeable slower to apply
than the other (one extra add or xor operation).
I think simple is best. There is nothing wrong with clear text
passwords stored on a system that has good file security, few admins,
few but well known and well tested network services AND is physically
secure. The last part can't be overlooked. This will sound a little
extreme but if you want to talk about "hacked" think about how long it
would take to get into your personal system using someone else
computer and just your wits... now think about how fast it would be
with a fire axe starting at your front door. In most cases the second
is more practical.
Leaves more evidence and is a greater crime though; now you're on the
hook for B&E and larceny (assuming you took just the hard drive out of
the case, to mount on your own system) or even grand larceny (if you
took the whole b0x, and it was worth over a grand).
Least-intrusive there is to break in with a Knoppix CD, reboot the
targeted machine from that disc, mount the hard drive, and read stuff as
the Knoppix superuser. Still involves B&E and trespassing as well as the
one constant in all of this, cyber-intrusion.
Upshot: if the machine is not physically secure, relative to how
ruthless and willing to physically show their faces you think your
enemies might be, encrypt the fucking hard drive.
rossum said:[says I'm a liar]Least-intrusive there is to break in
Ken said:[says I'm a liar]
I can think of a few very efficient ways of taking all the data without
anyone being the wiser. The most efficient of all is simply swapping
drives.
Ken said:[says I'm a liar]I am not.They'll notice the replacement drive is missing all their data. You'd
have to copy the whole thing while there to avoid that, in which case
you might as well leave with the copy, not the original.
Here I agree with you. Make a copy while leaving the original drive
in place. The data will be more valuable if the owner does not know
that it has been copied.
rossum
rossum said:I pointed outrossum said:On Thu, 01 Oct 2009 15:23:41 -0400, Dave Searles
Least-intrusive there is to break in
[says I'm a liar]
How is my scenario impossible?
rossum said:I agree with you. Make a copy while leaving the original drive
in place. The data will be more valuable if the owner does not know
that it has been copied.
Lew said:Thank you, Arne, for demonstrating how a person can take correction
without thinking that someone accused him of lying.
Arne said:Wrong.Lew said:Arne said:You are correct.
My mistake.
[gratuitous personal attack deleted]
I am probably in the top decile in stubbornness.
But there is not much point in trying to argue what is
polynomial and what is exponential. It would be like
trying to argue that 2+2=5.
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.