From: Mark David Dumlao <madumlao@gmail.com>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Re: Coming up with a password that is very strong.
Date: Wed, 6 Feb 2019 10:41:35 +0800 [thread overview]
Message-ID: <CAG2nJkNPGj6T9EUm7-=PNu0TdwLxzJ1A3ZLn8x57jzEkDenfGg@mail.gmail.com> (raw)
In-Reply-To: <20190205211653.57d0b0dc@digimed.co.uk>
On Wed, Feb 6, 2019 at 5:18 AM Neil Bothwick <neil@digimed.co.uk> wrote:
>
> On Wed, 6 Feb 2019 04:28:49 +0800, Mark David Dumlao wrote:
>
> > My own solution is actually very simple. I have a "secret algorithm"
> > that incorporates several secrets with a predictable way to generate a
> > site-specific secret. The end result is a 100% predictable way to
> > generate unique passwords for every site that are cryptographically
> > secure from each other (you cannot derive
> > one from the other) which can be generated by any device using the
> > appropriate tools.
>
> The was a tool in portage this did this. I tried it but it did not work
> in the real world because you couldn't set a rule for generated passwords
> that matched the requirements of all sites, for example some require a
> non-alphanumeric character while other sites only allow alphanumerics.
>
> I can remember what the tools was called, although I'm pretty sure it
> was written in Python. I'd be interested to know how you get around the
> conflicting restrictions as this seems a good way to do things.
>
Well the original idea is to reduce dependency on specific tools, such
that the algorithm is the secret, and the passwords are just
byproducts of the secret. You will still need tools to do any hashing,
but those are generic tools you can acquire anywhere.
So for example, the "password123" equivalent secret algorithm might be:
1) global pepper: "password"
3) site-specific pepper: pepper plus number = vowels in domain name
2) site-specific ID: pepper dot domain name dot username
4) hashing algorithm: md5sum + base64, take first 8
Example application: madumlao@gmail.com
1) site-specific pepper: pepper3 (3 vowels in domain name: google)
2) site-specific ID: pepper3.google.madumlao
3) site-specific hash: (2) -> md5sum -> base64 -> first8 -> NGI3MTQz
4) combined with global pepper: password.NGI3MTQz
5) hashed with global pepper: (4) -> md5sum -> base64 -> first8 -> MWJjZjg2
password: MWJjZjg2
Example application: madumlao@yahoo.com
1) site-specific pepper: pepper3 (3 vowels in domain name: yahoo)
2) site-specific ID: pepper3.yahoo.madumlao
3) site-specific hash: (2) -> md5sum -> base64 -> first8 -> ZDQzZGM5
4) combined with global pepper: password.ZDQzZGM5
5) hashed with global pepper: (4) -> md5sum -> base64 -> first8 -> ZjUwMTI2
password: ZjUwMTI2
The procedure takes up a little more headspace than 1 password, but
definitely less headspace than a dozen cryptographically secure
passwords. You can change the hashing algorithm, peppering rule, ID
rule, number of characters, etc to your tastes. You can add iteration
rules for the nth password change anywhere in the procedure, and add
constraint rules for sites that have certain password limitations (the
caveat is that you have to remember which sites have password changes
and constraints). For me really all that matters is that the building
blocks are widely available and the end result incorporates data loss
that makes it impossible to recover the original secrets.
"Obviously" do not use this algorithm as-is. The algorithm, not the
password, is the secret, so using this algorithm as is is the
equivalent of using any example of a crypto secure password (correct
horse battery stapler) as a password.
--
This email is: [ ] actionable [x] fyi [ ] social
Response needed: [ ] yes [x] up to you [ ] no
Time-sensitive: [ ] immediate [ ] soon [x] none
next prev parent reply other threads:[~2019-02-06 2:42 UTC|newest]
Thread overview: 62+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-02-04 5:47 [gentoo-user] Coming up with a password that is very strong Dale
2019-02-04 10:24 ` Peter Humphrey
2019-02-04 10:37 ` Neil Bothwick
2019-02-04 11:17 ` Mick
2019-02-04 11:48 ` [gentoo-user] " Nikos Chantziaras
2019-02-04 13:21 ` [gentoo-user] " Neil Bothwick
2019-02-04 13:43 ` Rich Freeman
2019-02-05 6:48 ` Dale
2019-02-05 9:55 ` Mick
2019-02-05 10:04 ` Michael Schwartzkopff
2019-02-05 10:18 ` Dale
2019-02-05 10:13 ` Dale
2019-02-05 11:21 ` Mick
2019-02-05 12:46 ` Dale
2019-02-04 11:10 ` [gentoo-user] " Nikos Chantziaras
2019-02-04 19:38 ` Jack
2019-02-04 20:51 ` Neil Bothwick
2019-02-05 20:28 ` Mark David Dumlao
2019-02-05 21:17 ` Neil Bothwick
2019-02-06 2:41 ` Mark David Dumlao [this message]
2019-02-08 14:26 ` Kai Peter
2019-02-08 20:59 ` Neil Bothwick
2019-02-09 0:19 ` Dale
2019-02-09 10:06 ` Neil Bothwick
2019-02-09 10:42 ` Dale
2019-02-09 16:02 ` Alec Ten Harmsel
2019-02-13 16:31 ` Rich Freeman
2019-02-13 17:12 ` Mark David Dumlao
2019-02-13 19:17 ` Rich Freeman
2019-02-13 21:34 ` Mark David Dumlao
2019-02-13 21:50 ` Rich Freeman
2019-02-04 20:49 ` Dale
2019-02-04 20:59 ` Rich Freeman
2019-02-04 21:06 ` Neil Bothwick
2019-02-04 22:12 ` Dale
2019-02-04 23:18 ` Rich Freeman
2019-02-05 7:34 ` Dale
2019-02-05 14:13 ` Rich Freeman
2019-02-05 16:00 ` Dale
2019-02-04 23:26 ` Mick
2019-02-05 7:55 ` Dale
2019-02-05 11:34 ` Mick
2019-02-05 13:05 ` Dale
2019-02-05 8:41 ` Neil Bothwick
2019-02-05 9:28 ` Mick
2019-02-05 12:27 ` Nikos Chantziaras
2019-02-04 16:42 ` [gentoo-user] " Laurence Perkins
2019-02-04 18:39 ` Lee Clagett
2019-02-04 20:09 ` [gentoo-user] " Dale
2019-02-04 20:19 ` Rich Freeman
2019-02-04 21:39 ` Dale
2019-02-04 22:34 ` [gentoo-user] " Tanstaafl
2019-02-05 1:10 ` Dale
2019-02-05 19:49 ` Tanstaafl
2019-02-05 23:50 ` Dale
2019-02-06 18:13 ` Tanstaafl
2019-02-05 4:42 ` Roger J. H. Welsh
2019-02-10 16:12 ` Andrew Savchenko
2019-02-10 16:27 ` Dale
2019-02-10 16:59 ` Andrew Savchenko
2019-02-10 18:13 ` Mark David Dumlao
2019-02-10 22:44 ` Dale
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAG2nJkNPGj6T9EUm7-=PNu0TdwLxzJ1A3ZLn8x57jzEkDenfGg@mail.gmail.com' \
--to=madumlao@gmail.com \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox