Post #376,784
6/22/13 10:55:36 PM
|
same reason you shouldn't store them on disk
Any opinions expressed by me are mine alone, posted from my home computer, on my own time as a free American and do not reflect the opinions of any person or company that I have had professional relations with in the past 58 years. meep
|
Post #376,785
6/22/13 11:12:06 PM
|
Somebody has to, nicht wahr?
If I don't have my username and password on my PC, but the place I'm connecting to does, the problem still exists. If someone gets inside, the information is at risk.
One would think that the cloud is run by people who know what they're doing, so accounts are protected, but we know of too many cases where that isn't true.
IIRC, Kerberos tries to minimize this problem by passing tokens around. But the server still has a database of valid passwords from which it constructs tokens.
Defense in depth makes sense, but it's too easy to forget all this stuff...
Cheers,
Scott.
|
Post #376,786
6/22/13 11:28:51 PM
|
LastPass has been cracked before, IIRC
Regards, -scott Welcome to Rivendell, Mr. Anderson.
|
Post #376,787
6/22/13 11:39:33 PM
|
<boggle>
|
Post #376,801
6/23/13 12:27:44 PM
|
Re: <boggle>
Regards, -scott Welcome to Rivendell, Mr. Anderson.
|
Post #376,804
6/23/13 12:39:55 PM
|
Thanks.
|
Post #376,790
6/23/13 4:34:23 AM
|
Database of valid passwords?
Or valid password hashes?
|
Post #376,791
6/23/13 8:09:01 AM
|
Dunno.
I suppose with public and private keys that there are ways to know whether a username and password are valid without having and storing the actual original values.
But AFAIK, the problem remains. If the system is compromised, then it's only a matter of time before account information can compromised as well.
But I'm no expert on this stuff...
Cheers,
Scott.
|
Post #376,797
6/23/13 11:01:50 AM
|
Makes little difference
http://arstechnica.c...f-your-passwords/
ArsTechnica gave three experts a list of over 16000 cryptographic password hashes. The best one recovered 90% of the plaintext passwords.
The list of "plains," as many crackers refer to deciphered hashes, contains the usual list of commonly used passcodes that are found in virtually every breach involving consumer websites. "123456," "1234567," and "password" are there, as is "letmein," "Destiny21," and "pizzapizza." Passwords of this ilk are hopelessly weak. Despite the additional tweaking, "p@$$word," "123456789j," "letmein1!," and "LETMEin3" are equally awful. But sprinkled among the overused and easily cracked passcodes in the leaked list are some that many readers might assume are relatively secure. ":LOL1313le" is in there, as are "Coneyisland9/," "momof3g8kids," "1368555av," "n3xtb1gth1ng," "qeadzcwrsfxv1331," "m27bufford," "J21.redskin," "Garrett1993*," and "Oscar+emmy2."
|
Post #376,798
6/23/13 11:11:53 AM
|
Neat. Thanks.
|
Post #376,805
6/23/13 12:42:57 PM
|
shouldnt store passwords on your local disk
unprotected is where I was going. How the other end of you connection stores passwords is of interest also. Ensure that your login/password cannot be trivially tracked back to you. boxley and derivatives are used socially, financials are considerably different. Easy to hack boxley, wouldn't help with my protected connections
Any opinions expressed by me are mine alone, posted from my home computer, on my own time as a free American and do not reflect the opinions of any person or company that I have had professional relations with in the past 58 years. meep
|
Post #376,806
6/23/13 12:50:58 PM
|
Yup.
|