FlyerTalk Forums

FlyerTalk Forums (https://www.flyertalk.com/forum/index.php)
-   Travel Technology (https://www.flyertalk.com/forum/travel-technology-169/)
-   -   Password "security" ? (https://www.flyertalk.com/forum/travel-technology/1740904-password-security.html)

lwildernorva Jan 23, 2016 7:18 pm


Originally Posted by glob99 (Post 26069450)
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!

True and that mostly doesn't happen. The bigger issue is a data security breach where the bad guys get hold of tons of encrypted information in one fell swoop. Now, you can take advantage of time and programs like Hashcat to decrypt at relative leisure. And since most people use the same username and password at multiple sites, all that's necessary is a good program to ramble around the internet randomly entering usernames and passwords at banking and retail sites until--boom!

Sophisticated hackers are like good burglars and robbers. If they get your credit card information, they may not directly use your credit card but instead use the information they obtain to open another account that you're not aware you have--until you get the first month's bill for $10,000.

dtsm Jan 23, 2016 7:38 pm

This doesn't resolve OP question but for everyone else, recommend enabling two tier authorization whenever available. In theory, the only way to access/login, even if pw cracked is to steal your phone.

nkedel Jan 23, 2016 8:37 pm


Originally Posted by glob99 (Post 26069450)
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!

The particular example he's giving is of recovering a password from a file, where the password is hashed into something like an encryption key using a standard algorithm. If you've stolen the file, you can then recover the passwords using various mechanisms.

There are various levels there, but the speed of brute-force lookup you can do on a file of password hashes exceeds the theoretical network rates -- it's not simply a matter of slowing things down, even a site with no blocking mechanism is going to only be able to do a few tens of thousands of login attempts per second on a single account, and as you say, adding some kind of throttling and lockout is pretty easy.

By contrast, if you've got the file locally, you can try depending on the example, up to nearly a trillion and a half possible passwords per second. The encryption type matters a lot, though -- the best algorithms are about 1,000 times slower to test per http://hashcat.net/oclhashcat/ and there are other techniques that can slow down the test rate by a roughly equal amount.

That's still at least a million tests per second locally, something that's virtually impossible against any kind of individual public network endpoint unless you've got an entire botnet at your disposal (and maybe not then -- and a million failed logins in that time frame are going to register on someone's console even at a site like Facebook or Google.)

richard Jan 23, 2016 8:54 pm

the only protection is being inconvenienced and building VERY large passwords with mixed characters, and the only way to manage this is with Keepass or Lastpass and with a long passphrase and make sure you don't have malware on your computer such as keyloggers.

Two tier authorization is nice for some apps, but for Google I tried it and it was so onerous that I had to turn it off.

gqZJzU4vusf0Z2,$d7 Jan 24, 2016 5:11 am


Originally Posted by glob99 (Post 26069450)
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!

You misunderstand how passwords are cracked. Professionals crack passwords off-line, not on-line.

gqZJzU4vusf0Z2,$d7 Jan 24, 2016 5:19 am

> GRC Password Haystacks ...

The tools that estimate password strength are ... crap.

According to one popular password strength meter, BandGeek2014 should
take 74+ centuries to crack; another estimated six [6] years. Big spread, eh?

Reality: Hashcat cracked it in less than 90 minutes.

antichef Jan 24, 2016 5:43 am


Originally Posted by gqZJzU4vusf0Z2,$d7 (Post 26071153)
> GRC Password Haystacks ...

The tools that estimate password strength are ... crap.

According to one popular password strength meter, BandGeek2014 should
take 74+ centuries to crack; another estimated six [6] years. Big spread, eh?

Reality: Hashcat cracked it in less than 90 minutes.

12 characters and no symbols. Still better than "starwars" or "password" though :D. How fast does Hashcat do 20 random multi symbol types? Just for my personal interest ;)

... and how does it know it has cracked it, if it reads gibberish on every iteration?

dtsm Jan 24, 2016 6:43 am


Originally Posted by richard (Post 26070093)
Two tier authorization is nice for some apps, but for Google I tried it and it was so onerous that I had to turn it off.

Google is probably one that I would use the two tier system. For 'trusted' devices, once you do it the initial log-in, usually don't ask again unless you clear cache/history/cookies. And there's always the authenticator app as backup to getting a text message to smartphone.

Other sites I use include amazon, eBay, PayPal, iCloud. POV ;)

nkedel Jan 24, 2016 8:52 am


Originally Posted by antichef (Post 26071198)
... and how does it know it has cracked it, if it reads gibberish on every iteration?

Cracking passwords, in that sense, works backwards.

You have a hash (examples here) and try different passwords until you generate the matching hash value.

Of course, you need a dump of passwords first.

GUWonder Jan 24, 2016 9:39 am


Originally Posted by jspira (Post 26060117)
If we want to really improve security, we would get rid of passwords and use something more secure such as biometrics.

Remember what Henry Ford is supposed to have said: "If I had asked people what they wanted, they would have said faster horses."

If it's going to be single-factor authentication, more complex passwords are more difficult to circumvent than biometric passcodes.

Biometric passcode locks are not all that difficult to circumvent, even as it would tend to localize the password circumvention at first. For example, there are people who have used their sleeping/hung-over roommates' fingers to access the data of phones that get unlocked by a fingerprint. And there have been examples of people using photos -- even of fingerprints -- to access devices locked with biometric passcode.

antichef Jan 24, 2016 10:55 am


Originally Posted by nkedel (Post 26071845)
Cracking passwords, in that sense, works backwards.

You have a hash (examples here) and try different passwords until you generate the matching hash value.

Of course, you need a dump of passwords first.

That helps, thanks ^

Since we are really talking about an offline brute force cracking it presumably means that length and mixed character types are the only thing that will take time and slow up the attacker? Hence my query about 20 letters, so that
!1234567890.Abcdefgh Is a magnitude smaller than !1234567890.Abcdefghi
and therefore much less secure?

I am really trying to gauge how long it will hold back the attacker so that changes could be made if the hack became public!

gqZJzU4vusf0Z2,$d7 Jan 24, 2016 12:01 pm

How long?

It depends on many factors:

Length
Randomness/entropy
Hashing algorithm
System salt
User salt

Whenever hashing passwords, it is imperative to choose an algorithm that is resistant to hardware acceleration.

Fast hashing algorithms that are insecure: MD5, SHA1

Fast hashing algorithms that are secure, but should not be used for passwords: SHA2, because it is easily accelerated.

Slow hashing, secure algorithms that are resistant to hardware acceleration: bcrypt, scrypt or PBKDF2

MANY sysadmins are epic failures when it comes to getting these matters precisely correct.

antichef Jan 24, 2016 12:20 pm

That is helpful to me too, but stretching my subject knowledge now!

Does that mean that even if I choose a 20 digit multi character password all this can be affected and degraded by the way that the website operator chooses to encrypt the password before they store it? Some methods being harder than others to crack?

gfunkdave Jan 24, 2016 3:21 pm


Originally Posted by antichef (Post 26072773)
That is helpful to me too, but stretching my subject knowledge now!

Does that mean that even if I choose a 20 digit multi character password all this can be affected and degraded by the way that the website operator chooses to encrypt the password before they store it? Some methods being harder than others to crack?

Exactly.

glob99 Jan 24, 2016 7:44 pm


Originally Posted by gqZJzU4vusf0Z2,$d7 (Post 26071130)
You misunderstand how passwords are cracked. Professionals crack passwords off-line, not on-line.

So the real problem is that sites use weak encryption on sensitive files!;)


All times are GMT -6. The time now is 1:33 pm.


This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.