[conspire] storing passwords

Ehud Kaldor ehud.kaldor at gmail.com
Mon Apr 3 11:03:13 PDT 2017


what do you guys think of password managers such as KeePass? have one
master password for it, and have it generate passwords for you...

On Fri, Mar 31, 2017 at 5:31 PM Rick Moen <rick at linuxmafia.com> wrote:

Quoting Paul Zander (paulz at ieee.org):

> Well the pattern I use you could probably break with N=1 samples.  My
> thought is that when passwords are "stolen", they probably go into a
> database where a simple computer software can give a lot of "benefit"
> to the thief by just using the passwords as is, combined with a lot of
> people using same login and password in many places.  Why go to the
> bother of even attempting to "derive a pattern"?

I can only say:  Adjust your approach to suit your personal level of
paranoia -- and don't assume you're not worth (the bad guys) bothering
with unless you're rather sure.

Most attacks on user credentials can be expected to be the automated
kind, which implies not very adaptable, but don't underestimate them.
For example, malware able to gain user-level authority on your computing
device (and this includes Javscript snippets you shouldn't have run) can
be expected (if able) to mine your device activity history for outgoing
access activity, usernames employed, and (if preserved) security tokens
use -- and then convey that information to the bad guys.

The classic old-school example of this was:  You sshed into a shared
server, that unbknownst to you has had a trojaned /usr/bin/ssh client
program (or called library) installed.  You then, unknowing, conduct
outbound ssh or scp activity to a variety of other hosts.  All tokens,
credentials, and remote-host identities you expose to the trojaned SSH
client will get logged and delivered to the bad guys.  (That much is
certain to be totally automated, these days.  The further abuse of your
exposed information might not be.)

Please note that this form of information exposure is not defeated by
using differing usernames and unpredictable passwords, nor by eschewing
passwords and sticking to ssh keypairs -- but nonetheless sticking to
passwords (or other credentials) unique to each system and never reused
across systems will at least help limit the damage to _just_ those lost
credentials.

As to personal level of paranoia, I tend to err on the side of 'Make
security compromise effectively impossible everywhere you can', as
having fewer things to worry about simplifies my life.


_______________________________________________
conspire mailing list
conspire at linuxmafia.com
http://linuxmafia.com/mailman/listinfo/conspire
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://linuxmafia.com/pipermail/conspire/attachments/20170403/acad9ad1/attachment.html>


More information about the conspire mailing list