[ale] password management

Transam bob at verysecurelinux.com
Wed Jul 23 15:36:57 EDT 2003


On Wed, Jul 23, 2003 at 02:44:35PM -0400, Geoffrey wrote:
> J.M. Taylor wrote:

> >Let's take any string that's common to any set of passwords (ie, some
> >systems use the username as a salt, or some such), my question is more --
> >does it matter in a brute-force or even educated-guess type attack?  Or is
> >the complexity of
> >secret_thing<concat>special_characters<concat>common_string<concat>month
> >enough to foil those kinds of attacks? It certainly *seems* safer than me
> >making up a longish random password that I have to write down until it's
> >memorized...

> My approach is to think of a sentence, then use the first character of 
> each word in the sentence.  I then throw in some punctuation, followed 
> by something that links it to that machine. Sometimes I'll mix 
> characters for words (u for you..). Grant it, I don't have 100's of 
> passwords.  But it works for me and might be a start.  For example, I 
> used to use the following for the bios password on my first pentium box:

You'd want at least 10 characters for routine use.  15 letters would be
much better.  My "strong" passwords are longer than that and non-trivial.

> Uwngt1!p200

> You will never guess this one


> You == U, one == 1, p200 the speed of that processor.

> >-- Richard Feynman, "Surely You're Joking, Mr. Feynman!"

> Excellent book!
Excellent book!

> -- 
> Until later: Geoffrey		esoteric at 3times25.net

> The latest, most widespread virus?  Microsoft end user agreement.
> Think about it...
Bob
_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale





More information about the Ale mailing list