[153660] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Dear Linkedin,

daemon@ATHENA.MIT.EDU (John Souvestre)
Sun Jun 10 03:26:03 2012

From: "John Souvestre" <johns@sstar.com>
To: <nanog@nanog.org>
In-Reply-To: <4FD446CF.30008@bogus.com>
Date: Sun, 10 Jun 2012 02:25:22 -0500
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 6/10/12, Joel jaeggli <joelja@bogus.com> wrote:

 > How good does a password/phrase have to be in order to protect=20
 > against brute-force or dictionary attacks against the password =
itself?
 > ? Entropy in language.
 >   A typical english sentence has 1.2 bits of entropy per character,=20
 > you need 107 characters to get a statistically random md5 hash.
 > Using totally random english characters you need 28 characters.
 > Using a random distribution of all 95 printable ascii characters you=20
 > need 20 characters.
 > ? Observation, good passwords are hard to come by.

I don't disagree, except regarding dictionary attacks.  If the attack =
isn't random then math based on random events doesn't apply.  In the =
case of a purely dictionary attack if you choose a non-dictionary word =
and you are 100.000% safe.  :)

John

    John Souvestre - New Orleans LA - (504) 454-0899




home help back first fref pref prev next nref lref last post