* [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
@ 2023-09-19 5:36 Dale
2023-09-19 8:26 ` Michael
` (3 more replies)
0 siblings, 4 replies; 35+ messages in thread
From: Dale @ 2023-09-19 5:36 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2904 bytes --]
Howdy,
As some know, I encrypt a lot of stuff here. I use passwords that I can
recall but no one could ever guess. I don't use things that someone may
figure out like pet's name or anything like that. I use a couple sites
to see just how good my passwords are. I try to get into the millions
of years at least. I have a couple that it claims is in the trillions
of years to crack. I've read some things not to use like pet names and
such. I've also read that one should use upper and lower case letters,
symbols and such and I do that, especially on my stuff I never want to
be cracked. Some stuff, when I'm dead, it's gone.
In the real world tho, how do people reading this make passwords that no
one could ever guess? I use Bitwarden to handle website passwords and
it does a good job. I make up my own tho when encrypting drives. I'm
not sure I can really use Bitwarden for that given it is a command line
thing, well, in a script in my case. I doubt anyone would ever guess
any of my passwords but how do people reading this do theirs? Just how
far do you really go to make it secure? Obviously you shouldn't give up
much detail but just some general ideas. Maybe even a example or two of
a fake password, just something that you would come up with and how.
This is the two sites I use.
https://www.passwordmonster.com/
https://www.security.org/how-secure-is-my-password/
I have a password in the first one that shows this:
It would take a computer about 63 thousand years to crack your password
Second one says this.
It would take a computer about 5 million years to crack your password
Exact same password in both. Why such a large range to crack? I tend
to use the first site to create a password. Then I test it in the
second site to sort of confirm it. If both say a long time, then I got
a fairly good one depending on what I'm protecting. Still, why such a
difference? One reason I use the first site, I can make it show the
password. The second site doesn't do that so editing it to improve
things is harder since you can't see it. The first site makes that easy
and gives me a idea of whether I'm on the right track. Second site
confirms it. I did contact the second site and ask for a button to show
the password. After all, no one is here but me. My windows are covered.
Also, I use cryptsetup luksFormat -s 512 ... to encrypt things. Is
that 512 a good number? Can it be something different? I'd think since
it is needed as a option, it can have different values and encrypt
stronger or weaker. Is that the case? I've tried to find out but it
seems everyone uses 512. If that is the only value, why make it a
option? I figure it can have other values but how does that work?
Heck, a link to some good info on that would be good. :-)
Thoughts? Opinions? Suggestions?
Dale
:-) :-)
[-- Attachment #2: Type: text/html, Size: 3958 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 5:36 [gentoo-user] Password questions, looking for opinions. cryptsetup question too Dale
@ 2023-09-19 8:26 ` Michael
2023-09-19 9:10 ` Jude DaShiell
` (2 more replies)
2023-09-19 9:03 ` hitachi303
` (2 subsequent siblings)
3 siblings, 3 replies; 35+ messages in thread
From: Michael @ 2023-09-19 8:26 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 4830 bytes --]
On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
> Howdy,
>
> As some know, I encrypt a lot of stuff here. I use passwords that I can
> recall but no one could ever guess. I don't use things that someone may
> figure out like pet's name or anything like that. I use a couple sites
> to see just how good my passwords are. I try to get into the millions
> of years at least. I have a couple that it claims is in the trillions
> of years to crack. I've read some things not to use like pet names and
> such. I've also read that one should use upper and lower case letters,
> symbols and such and I do that, especially on my stuff I never want to
> be cracked. Some stuff, when I'm dead, it's gone.
As/when quantum computers development progresses, many/some passwords and
hashes will be cracked/brute forced (RSA encryption springs to mind). It is
best if you can think of any password as keeping your door and windows locked.
They will stop most opportunistic attempts, but not anyone who is determined
to break in. It is unlikely your passwords will stop state actors. A strong
password, like a strong door lock, buys you time. Hence the general
recommendation to change your passwords frequently.
> In the real world tho, how do people reading this make passwords that no
> one could ever guess?
You can use gpg, or openssl, or app-admin/apg, or app-admin/pwgen, to generate
random enough strings to use as passwords. They will be difficult to guess,
but will be VERY difficult to remember. You'll have to store them offline
and/or protect them in turn with some master passphrase you can remember.
As an example, you could choose characters/strings from the output stored in
file.txt, when you run:
< /dev/random tr -dc "[:space:][:print:]" | head -c500 > file.txt
> I use Bitwarden to handle website passwords and
> it does a good job. I make up my own tho when encrypting drives. I'm
> not sure I can really use Bitwarden for that given it is a command line
> thing, well, in a script in my case. I doubt anyone would ever guess
> any of my passwords but how do people reading this do theirs? Just how
> far do you really go to make it secure? Obviously you shouldn't give up
> much detail but just some general ideas. Maybe even a example or two of
> a fake password, just something that you would come up with and how.
>
> This is the two sites I use.
>
>
> https://www.passwordmonster.com/
>
> https://www.security.org/how-secure-is-my-password/
>
>
> I have a password in the first one that shows this:
>
>
> It would take a computer about 63 thousand years to crack your password
>
>
> Second one says this.
>
> It would take a computer about 5 million years to crack your password
>
> Exact same password in both. Why such a large range to crack?
I don't know why these guys come up with different years-equivalent strength,
but I tend to treat such websites as suspicious. They are more likely to act
as a honeypot to *record* your passwords, than provide you with truly
meaningful information. I suppose you could use them to test an example of a
password you would never use thereafter, but even this could reveal some
underlying pattern in how you structure your passwords.
> I tend
> to use the first site to create a password. Then I test it in the
> second site to sort of confirm it. If both say a long time, then I got
> a fairly good one depending on what I'm protecting. Still, why such a
> difference? One reason I use the first site, I can make it show the
> password. The second site doesn't do that so editing it to improve
> things is harder since you can't see it. The first site makes that easy
> and gives me a idea of whether I'm on the right track. Second site
> confirms it. I did contact the second site and ask for a button to show
> the password. After all, no one is here but me. My windows are covered.
>
> Also, I use cryptsetup luksFormat -s 512 ... to encrypt things. Is
> that 512 a good number? Can it be something different? I'd think since
> it is needed as a option, it can have different values and encrypt
> stronger or weaker. Is that the case? I've tried to find out but it
> seems everyone uses 512. If that is the only value, why make it a
> option? I figure it can have other values but how does that work?
The size of key options depend on the block cipher. A larger key size tends
to be stronger, but its processing slower. Embedded devices without hardware
accelerated crypto could struggle with larger key sizes.
> Heck, a link to some good info on that would be good. :-)
https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/FAQ.md
https://gitlab.com/cryptsetup/cryptsetup/wikis/LUKS-standard/on-disk-format.pdf
https://wiki.archlinux.org/title/Data-at-rest_encryption
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 5:36 [gentoo-user] Password questions, looking for opinions. cryptsetup question too Dale
2023-09-19 8:26 ` Michael
@ 2023-09-19 9:03 ` hitachi303
2023-09-19 9:13 ` Dale
2023-09-19 9:16 ` Jude DaShiell
2023-09-20 16:18 ` Hoël Bézier
2023-09-27 9:43 ` [gentoo-user] " Nikos Chantziaras
3 siblings, 2 replies; 35+ messages in thread
From: hitachi303 @ 2023-09-19 9:03 UTC (permalink / raw
To: gentoo-user
Am 19.09.23 um 07:36 schrieb Dale:
> Maybe even a example or two of a fake password, just something that you
> would come up with and how.
There was this TV series Sherlock. In one episode they communicated by
numbers where each number referred to a word in a book. This was
somewhat also used in a movie with Nicolas Cage where he is treasure
hunting.
For the passwords which matter this seems to be a quit good way. As long
as nobody guesses your book you can write down your passwords and look
them up if needed. Like 239/4 which would tell you to open page 239 and
use word 4. Or 239/4/3 -> page 239 line 4 word 3.
Then you start to make it difficult so that you don't just use words.
Like start with the first letter of the word than go backwards and use
every second letter until you habe 8 letters. Mix in a number for every
third position.
You can change the rule as you like. Keep it always the same and you can
look your password up every time. In German there are quit a lot of
capital letters so just take them.
You can be creative as wild. Take a poem in middle age German and take
only the first an last letter from every line. Every third number from
pi. Since there is no pattern in pi this should be safe.
Something like that.
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 8:26 ` Michael
@ 2023-09-19 9:10 ` Jude DaShiell
2023-09-20 2:41 ` Dale
2023-09-23 10:57 ` Wols Lists
2023-09-19 10:00 ` Rich Freeman
2023-09-20 4:19 ` Dale
2 siblings, 2 replies; 35+ messages in thread
From: Jude DaShiell @ 2023-09-19 9:10 UTC (permalink / raw
To: gentoo-user
I generate random passwords using dice. First and last characters in
passwords are letters that's arbitrary buys more time. Those should have
lengths over 13 and before the agency I used to work for went to
smartcards and 256 character random passwords their last standard was 16
characters with minimum two symbols minimum two numbers minimum two
upper-case and minimum two lower-case. No dictionary words or keyboard
walking allowed. Firewall piercing with laptops got used regularly by
state actors and there is a firewall-piercing-howto file on the internet
for anyone interested.
The remaining characters first got their sets chosen. A 1 on dice picked
a number for that spot and a 6 picked a symbol. Two or 3 picked an
upper-case and 4 or 5 picked a lower-case. Once the set spots got figured
five dice got used for letters add the total and subtract 4 for the
particular letter. three dice got used for symbols with a single dice
roll of either odd for first 16 symbols or even single dice roll for
second 16 symbols. Your choice as to put which 16 symbols in the even and
odd sets those could be randomized. Numbers used two dice with 2
subtracted from total and a 2 rolled with the dice returned a 0. Slow and
necessary to write worksheet down as dice rolling proceeded and password
needed writing down on completion. Since I do most of my writing in
braille I have a good encryption system I can encrypt further by using the
old English braille instead of the American braille. American braille has
dot arrangement 123 down left side of cell for reading and 4 5 6 down
right side of cell for reading. English braille has 1 3 5 down the left
side and 2 4 6 down the right side of the cell for reading. Those are dot
number arrangements. Braille readers on this list I expect maybe only one
other will understand what I just wrote.
-- Jude <jdashiel at panix dot com> "There are four boxes to be used in
defense of liberty: soap, ballot, jury, and ammo. Please use in that
order." Ed Howdershelt 1940.
On Tue, 19 Sep 2023, Michael wrote:
> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
> > Howdy,
> >
> > As some know, I encrypt a lot of stuff here. I use passwords that I can
> > recall but no one could ever guess. I don't use things that someone may
> > figure out like pet's name or anything like that. I use a couple sites
> > to see just how good my passwords are. I try to get into the millions
> > of years at least. I have a couple that it claims is in the trillions
> > of years to crack. I've read some things not to use like pet names and
> > such. I've also read that one should use upper and lower case letters,
> > symbols and such and I do that, especially on my stuff I never want to
> > be cracked. Some stuff, when I'm dead, it's gone.
>
> As/when quantum computers development progresses, many/some passwords and
> hashes will be cracked/brute forced (RSA encryption springs to mind). It is
> best if you can think of any password as keeping your door and windows locked.
> They will stop most opportunistic attempts, but not anyone who is determined
> to break in. It is unlikely your passwords will stop state actors. A strong
> password, like a strong door lock, buys you time. Hence the general
> recommendation to change your passwords frequently.
>
>
> > In the real world tho, how do people reading this make passwords that no
> > one could ever guess?
>
> You can use gpg, or openssl, or app-admin/apg, or app-admin/pwgen, to generate
> random enough strings to use as passwords. They will be difficult to guess,
> but will be VERY difficult to remember. You'll have to store them offline
> and/or protect them in turn with some master passphrase you can remember.
>
> As an example, you could choose characters/strings from the output stored in
> file.txt, when you run:
>
> < /dev/random tr -dc "[:space:][:print:]" | head -c500 > file.txt
>
>
> > I use Bitwarden to handle website passwords and
> > it does a good job. I make up my own tho when encrypting drives. I'm
> > not sure I can really use Bitwarden for that given it is a command line
> > thing, well, in a script in my case. I doubt anyone would ever guess
> > any of my passwords but how do people reading this do theirs? Just how
> > far do you really go to make it secure? Obviously you shouldn't give up
> > much detail but just some general ideas. Maybe even a example or two of
> > a fake password, just something that you would come up with and how.
> >
> > This is the two sites I use.
> >
> >
> > https://www.passwordmonster.com/
> >
> > https://www.security.org/how-secure-is-my-password/
> >
> >
> > I have a password in the first one that shows this:
> >
> >
> > It would take a computer about 63 thousand years to crack your password
> >
> >
> > Second one says this.
> >
> > It would take a computer about 5 million years to crack your password
> >
> > Exact same password in both. Why such a large range to crack?
>
> I don't know why these guys come up with different years-equivalent strength,
> but I tend to treat such websites as suspicious. They are more likely to act
> as a honeypot to *record* your passwords, than provide you with truly
> meaningful information. I suppose you could use them to test an example of a
> password you would never use thereafter, but even this could reveal some
> underlying pattern in how you structure your passwords.
>
>
> > I tend
> > to use the first site to create a password. Then I test it in the
> > second site to sort of confirm it. If both say a long time, then I got
> > a fairly good one depending on what I'm protecting. Still, why such a
> > difference? One reason I use the first site, I can make it show the
> > password. The second site doesn't do that so editing it to improve
> > things is harder since you can't see it. The first site makes that easy
> > and gives me a idea of whether I'm on the right track. Second site
> > confirms it. I did contact the second site and ask for a button to show
> > the password. After all, no one is here but me. My windows are covered.
> >
> > Also, I use cryptsetup luksFormat -s 512 ... to encrypt things. Is
> > that 512 a good number? Can it be something different? I'd think since
> > it is needed as a option, it can have different values and encrypt
> > stronger or weaker. Is that the case? I've tried to find out but it
> > seems everyone uses 512. If that is the only value, why make it a
> > option? I figure it can have other values but how does that work?
>
> The size of key options depend on the block cipher. A larger key size tends
> to be stronger, but its processing slower. Embedded devices without hardware
> accelerated crypto could struggle with larger key sizes.
>
>
> > Heck, a link to some good info on that would be good. :-)
>
> https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/FAQ.md
>
> https://gitlab.com/cryptsetup/cryptsetup/wikis/LUKS-standard/on-disk-format.pdf
>
> https://wiki.archlinux.org/title/Data-at-rest_encryption
>
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 9:03 ` hitachi303
@ 2023-09-19 9:13 ` Dale
2023-09-23 12:47 ` Wols Lists
2023-09-19 9:16 ` Jude DaShiell
1 sibling, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-19 9:13 UTC (permalink / raw
To: gentoo-user
hitachi303 wrote:
> Am 19.09.23 um 07:36 schrieb Dale:
>> Maybe even a example or two of a fake password, just something that
>> you would come up with and how.
>
>
> There was this TV series Sherlock. In one episode they communicated by
> numbers where each number referred to a word in a book. This was
> somewhat also used in a movie with Nicolas Cage where he is treasure
> hunting.
>
> For the passwords which matter this seems to be a quit good way. As
> long as nobody guesses your book you can write down your passwords and
> look them up if needed. Like 239/4 which would tell you to open page
> 239 and use word 4. Or 239/4/3 -> page 239 line 4 word 3.
> Then you start to make it difficult so that you don't just use words.
> Like start with the first letter of the word than go backwards and use
> every second letter until you habe 8 letters. Mix in a number for
> every third position.
> You can change the rule as you like. Keep it always the same and you
> can look your password up every time. In German there are quit a lot
> of capital letters so just take them.
> You can be creative as wild. Take a poem in middle age German and take
> only the first an last letter from every line. Every third number from
> pi. Since there is no pattern in pi this should be safe.
>
> Something like that.
>
>
I like the Sherlock stuff. Everything from the black and white
versions, 1950's, to the TV series Elementary which is more recent.
That is a idea but I currently come up with them from things I have or
weird things I won't forget. Models of vehicles or some other thing I
have and will have for a long time. Some are a little short but those
password sites say they are good strong passwords.
That's a interesting way to come up with passwords tho. I've seen that
is a few whodunit type shows. Way back in the old days, they had some
interesting ways of coding messages. Passwords are sort of similar.
I'll have to give that some thought. It's not how I usually do it but
it is interesting.
Thanks.
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 9:03 ` hitachi303
2023-09-19 9:13 ` Dale
@ 2023-09-19 9:16 ` Jude DaShiell
2023-09-19 11:22 ` Dale
1 sibling, 1 reply; 35+ messages in thread
From: Jude DaShiell @ 2023-09-19 9:16 UTC (permalink / raw
To: gentoo-user
another possibility is use of a dictionary. Find a word in dictionary
note page column and line. Divide pages in dictionary by 2 and either add
or subtract that number of pages to or from page word is found on then on
the new page find the column and line for your actual password. Of
course, you write the first word you looked up down as your password and
not the second word you just found you use for your real password.
-- Jude <jdashiel at panix dot com> "There are four boxes to be used in
defense of liberty: soap, ballot, jury, and ammo. Please use in that
order." Ed Howdershelt 1940.
On Tue, 19 Sep 2023, hitachi303 wrote:
> Am 19.09.23 um 07:36 schrieb Dale:
> > Maybe even a example or two of a fake password, just something that you
> > would come up with and how.
>
>
> There was this TV series Sherlock. In one episode they communicated by numbers
> where each number referred to a word in a book. This was somewhat also used in
> a movie with Nicolas Cage where he is treasure hunting.
>
> For the passwords which matter this seems to be a quit good way. As long as
> nobody guesses your book you can write down your passwords and look them up if
> needed. Like 239/4 which would tell you to open page 239 and use word 4. Or
> 239/4/3 -> page 239 line 4 word 3.
> Then you start to make it difficult so that you don't just use words. Like
> start with the first letter of the word than go backwards and use every second
> letter until you habe 8 letters. Mix in a number for every third position.
> You can change the rule as you like. Keep it always the same and you can look
> your password up every time. In German there are quit a lot of capital letters
> so just take them.
> You can be creative as wild. Take a poem in middle age German and take only
> the first an last letter from every line. Every third number from pi. Since
> there is no pattern in pi this should be safe.
>
> Something like that.
>
>
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 8:26 ` Michael
2023-09-19 9:10 ` Jude DaShiell
@ 2023-09-19 10:00 ` Rich Freeman
2023-09-19 11:13 ` Dale
2023-09-20 4:19 ` Dale
2 siblings, 1 reply; 35+ messages in thread
From: Rich Freeman @ 2023-09-19 10:00 UTC (permalink / raw
To: gentoo-user
On Tue, Sep 19, 2023 at 4:26 AM Michael <confabulate@kintzios.com> wrote:
>
> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
> > Howdy,
> >
> A strong
> password, like a strong door lock, buys you time. Hence the general
> recommendation to change your passwords frequently.
While that can help on websites, it is of no use for full disk
encryption passwords - at least not without jumping through some big
hoops.
In order to crack your LUKS password somebody obviously needs to be
able to read the encrypted contents of your disk. They cannot begin
cracking it until they have a copy of the LUKS headers. However, once
they do have it, they can make a copy and crack it at their leisure.
If they manage to crack it, then it will give them the volume key. At
that point if they were able to make a full copy of your disk they can
read whatever was on it at the time. If they can make a fresh copy of
your disk then changing the passphrase will not change the volume key,
and so they'll be able to read what is currently on your disk.
Changing the volume key would defeat this, but requires running
cryptsetup-reencrypt which will take considerable time/CPU, though it
sounds like it can be done online.
> > In the real world tho, how do people reading this make passwords that no
> > one could ever guess?
You didn't ask this question, but I'll just note that most
organizations don't use human-readable passwords to implement full
disk encryption. The most commonly used solution is to use a TPM to
measure the boot process and secure the disk encryption keys. If the
system is booted normally, the bootloader can read the encryption keys
from the TPM and can decrypt the disk without any user interaction (or
even awareness it is happening). If the system is booted from
alternative media, or the on-disk bootloader is tampered with, or even
if the firmware is tampered with, then the TPM measurements will not
agree with those used to store the key, and the TPM will not allow the
keys to be read.
This is how solutions like Bitlocker work.
The components for this exist in the Linux world, but I'm not aware of
any distro/etc actually implementing this with a pretty front-end, and
there are obviously details that need to be carefully handled so that
a bootloader or firmware update doesn't render your disk unreadable.
Typically software implementations have ways to store "recovery keys"
for these situations (just another copy of the disk key stored outside
the TPM).
> You can use gpg, or openssl, or app-admin/apg, or app-admin/pwgen, to generate
> random enough strings to use as passwords.
You might want to also consider app-admin/xkcdpass
> > Also, I use cryptsetup luksFormat -s 512 ... to encrypt things. Is
> > that 512 a good number? Can it be something different? I'd think since
> > it is needed as a option, it can have different values and encrypt
> > stronger or weaker. Is that the case? I've tried to find out but it
> > seems everyone uses 512. If that is the only value, why make it a
> > option? I figure it can have other values but how does that work?
You can use a different size, but 512b is the recommended value for
the default cipher. It is also the default I believe, so there isn't
much point in passing it. Actually, I'd consider passing that
parameter harmful unless you also specify the cipher. If in the
future the default changes to some other cipher, perhaps 512b will no
longer be appropriate, and you'll weaken it by specifying one and not
the other.
If you just want to trust the defaults, then trust the defaults.
As to why 512b is the recommendation, that seems like it would require
a LOT more reading. Apparently it is in an IEEE standard and I'd need
to grok a lot more crypto to appreciate it.
--
Rich
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 10:00 ` Rich Freeman
@ 2023-09-19 11:13 ` Dale
2023-09-19 11:47 ` Michael
0 siblings, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-19 11:13 UTC (permalink / raw
To: gentoo-user
Hmmmm,
For some reason, I didn't get Michael's email. I see him being quoted
but don't have his original. I wonder what is up with that. O-o
Rich Freeman wrote:
> On Tue, Sep 19, 2023 at 4:26 AM Michael <confabulate@kintzios.com> wrote:
>> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
>>> Howdy,
>>>
>> A strong
>> password, like a strong door lock, buys you time. Hence the general
>> recommendation to change your passwords frequently.
> While that can help on websites, it is of no use for full disk
> encryption passwords - at least not without jumping through some big
> hoops.
>
> In order to crack your LUKS password somebody obviously needs to be
> able to read the encrypted contents of your disk. They cannot begin
> cracking it until they have a copy of the LUKS headers. However, once
> they do have it, they can make a copy and crack it at their leisure.
> If they manage to crack it, then it will give them the volume key. At
> that point if they were able to make a full copy of your disk they can
> read whatever was on it at the time. If they can make a fresh copy of
> your disk then changing the passphrase will not change the volume key,
> and so they'll be able to read what is currently on your disk.
>
> Changing the volume key would defeat this, but requires running
> cryptsetup-reencrypt which will take considerable time/CPU, though it
> sounds like it can be done online.
>
Let's jump into a hypothetical here. Let's say I'm a nasty terrorist or
some other really evil dude. Let's say I have passwords are that really
good. Let's say around 20 characters and a really nice mix of
characters. If some gov't agency got my hard drive, how long would it
take for them to crack it? I know when Snowden released all that info,
there was some changes to encryption. Still, do they have the ability
to crack them without much trouble? Is there something better to use
than what I'm using now?
I might add, when I configured my three drive setup, I sort of did it a
different way. I still used cryptsetup but I used it later in the
process. I also made sure to put the luks bit in. That way I can
change passwords if needed. I found a new howto and it seems to end the
same way but it's done in layers. Luks first and then encryption but
different somehow. Mostly, I can change passwords on it. I don't
really get the whole thing, yet. If I read it enough, my light bulb
will come on. o_O
>
>>> Also, I use cryptsetup luksFormat -s 512 ... to encrypt things. Is
>>> that 512 a good number? Can it be something different? I'd think since
>>> it is needed as a option, it can have different values and encrypt
>>> stronger or weaker. Is that the case? I've tried to find out but it
>>> seems everyone uses 512. If that is the only value, why make it a
>>> option? I figure it can have other values but how does that work?
> You can use a different size, but 512b is the recommended value for
> the default cipher. It is also the default I believe, so there isn't
> much point in passing it. Actually, I'd consider passing that
> parameter harmful unless you also specify the cipher. If in the
> future the default changes to some other cipher, perhaps 512b will no
> longer be appropriate, and you'll weaken it by specifying one and not
> the other.
>
> If you just want to trust the defaults, then trust the defaults.
>
> As to why 512b is the recommendation, that seems like it would require
> a LOT more reading. Apparently it is in an IEEE standard and I'd need
> to grok a lot more crypto to appreciate it.
>
Well, I was wondering if it could be set to 1024 and it make the
encryption stronger or something. I've searched but no one explains
what that number really does other than set something. Since that is
the default, I guess I can leave that out of my command. Save me some
typing. Anyway, 512 it is.
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 9:16 ` Jude DaShiell
@ 2023-09-19 11:22 ` Dale
0 siblings, 0 replies; 35+ messages in thread
From: Dale @ 2023-09-19 11:22 UTC (permalink / raw
To: gentoo-user
Jude DaShiell wrote:
> another possibility is use of a dictionary. Find a word in dictionary
> note page column and line. Divide pages in dictionary by 2 and either add
> or subtract that number of pages to or from page word is found on then on
> the new page find the column and line for your actual password. Of
> course, you write the first word you looked up down as your password and
> not the second word you just found you use for your real password.
>
>
> -- Jude <jdashiel at panix dot com> "There are four boxes to be used in
> defense of liberty: soap, ballot, jury, and ammo. Please use in that
> order." Ed Howdershelt 1940.
>
>
I think I've seen that used for messages ages ago. It's a way of
sending info that without knowing how to decode it and the same version
of dictionary, you have no idea what it says. Just don't lose the book
you use.
The responses I'm getting sure are interesting. Some I've seen but
never thought of using myself. After all, it was a TV show, sometimes a
history documentary or something. Reading about it here, it makes sense.
Oh, like the signature too. ;-)
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 11:13 ` Dale
@ 2023-09-19 11:47 ` Michael
2023-09-19 13:30 ` hitachi303
2023-09-20 2:52 ` Dale
0 siblings, 2 replies; 35+ messages in thread
From: Michael @ 2023-09-19 11:47 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2075 bytes --]
On Tuesday, 19 September 2023 12:13:40 BST Dale wrote:
> Hmmmm,
>
> For some reason, I didn't get Michael's email. I see him being quoted
> but don't have his original. I wonder what is up with that. O-o
Assuming you will receive this message, have a look here:
https://marc.info/?l=gentoo-user&m=169511184714476&w=2
> Rich Freeman wrote:
> > On Tue, Sep 19, 2023 at 4:26 AM Michael <confabulate@kintzios.com> wrote:
> >> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
> >>> Howdy,
> >>
> >> A strong
> >> password, like a strong door lock, buys you time. Hence the general
> >> recommendation to change your passwords frequently.
> >
> > While that can help on websites, it is of no use for full disk
> > encryption passwords - at least not without jumping through some big
> > hoops.
> >
> > In order to crack your LUKS password somebody obviously needs to be
> > able to read the encrypted contents of your disk. They cannot begin
> > cracking it until they have a copy of the LUKS headers. However, once
> > they do have it, they can make a copy and crack it at their leisure.
> > If they manage to crack it, then it will give them the volume key. At
> > that point if they were able to make a full copy of your disk they can
> > read whatever was on it at the time. If they can make a fresh copy of
> > your disk then changing the passphrase will not change the volume key,
> > and so they'll be able to read what is currently on your disk.
> >
> > Changing the volume key would defeat this, but requires running
> > cryptsetup-reencrypt which will take considerable time/CPU, though it
> > sounds like it can be done online.
>
> Let's jump into a hypothetical here. Let's say I'm a nasty terrorist or
> some other really evil dude. Let's say I have passwords are that really
> good. Let's say around 20 characters and a really nice mix of
> characters. If some gov't agency got my hard drive, how long would it
> take for them to crack it?
A couple of minutes?
https://xkcd.com/538/
:-)
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 11:47 ` Michael
@ 2023-09-19 13:30 ` hitachi303
2023-09-20 2:52 ` Dale
1 sibling, 0 replies; 35+ messages in thread
From: hitachi303 @ 2023-09-19 13:30 UTC (permalink / raw
To: gentoo-user
Am 19.09.23 um 13:47 schrieb Michael:
> A couple of minutes?
>
> https://xkcd.com/538/
>
> 😄
Most crypto nerds have a wrench at home. The gov. can even save those 5$.
:-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 9:10 ` Jude DaShiell
@ 2023-09-20 2:41 ` Dale
2023-09-20 2:59 ` [gentoo-user] " Grant Edwards
2023-09-20 6:47 ` [gentoo-user] " hitachi303
2023-09-23 10:57 ` Wols Lists
1 sibling, 2 replies; 35+ messages in thread
From: Dale @ 2023-09-20 2:41 UTC (permalink / raw
To: gentoo-user
Jude DaShiell wrote:
> I generate random passwords using dice. First and last characters in
> passwords are letters that's arbitrary buys more time. Those should have
> lengths over 13 and before the agency I used to work for went to
> smartcards and 256 character random passwords their last standard was 16
> characters with minimum two symbols minimum two numbers minimum two
> upper-case and minimum two lower-case. No dictionary words or keyboard
> walking allowed. Firewall piercing with laptops got used regularly by
> state actors and there is a firewall-piercing-howto file on the internet
> for anyone interested.
> The remaining characters first got their sets chosen. A 1 on dice picked
> a number for that spot and a 6 picked a symbol. Two or 3 picked an
> upper-case and 4 or 5 picked a lower-case. Once the set spots got figured
> five dice got used for letters add the total and subtract 4 for the
> particular letter. three dice got used for symbols with a single dice
> roll of either odd for first 16 symbols or even single dice roll for
> second 16 symbols. Your choice as to put which 16 symbols in the even and
> odd sets those could be randomized. Numbers used two dice with 2
> subtracted from total and a 2 rolled with the dice returned a 0. Slow and
> necessary to write worksheet down as dice rolling proceeded and password
> needed writing down on completion. Since I do most of my writing in
> braille I have a good encryption system I can encrypt further by using the
> old English braille instead of the American braille. American braille has
> dot arrangement 123 down left side of cell for reading and 4 5 6 down
> right side of cell for reading. English braille has 1 3 5 down the left
> side and 2 4 6 down the right side of the cell for reading. Those are dot
> number arrangements. Braille readers on this list I expect maybe only one
> other will understand what I just wrote.
>
>
> -- Jude <jdashiel at panix dot com> "There are four boxes to be used in
> defense of liberty: soap, ballot, jury, and ammo. Please use in that
> order." Ed Howdershelt 1940.
It is interesting what people can come up with. Thing is, if one uses a
true random generated password, they are hard to crack but also hard to
remember. I try to come up with something that will be hard to crack
but easy for me to remember. Thing is, I do have a few passwords to
keep up with. I recently changed my root password. I plan to change my
user password soon. Then I have the password for Bitwarden. Then I
have the password for the NAS, three external hard drives with different
passwords for each etc. That's a lot to remember. To be honest, it's
getting to be a bit much. Associating one password to one item is also
difficult. Unless one leaves clues. Thing is, those clues reveal
things as well.
For websites, I really like Bitwarden. I remember one password and it
can generate passwords for all the websites I use. The passwords it
generates are pretty random. For sites that don't allow symbols, I can
turn that off. The big point, I only remember one password. Thing is,
on one hand I need help remembering all these passwords. On the other
hand, that is a risk itself.
This reminds me of a tennis ball. It just goes back and forth.
Dale
:-) :-)
> On Tue, 19 Sep 2023, Michael wrote:
>
>> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
>>> Howdy,
>>>
>>> As some know, I encrypt a lot of stuff here. I use passwords that I can
>>> recall but no one could ever guess. I don't use things that someone may
>>> figure out like pet's name or anything like that. I use a couple sites
>>> to see just how good my passwords are. I try to get into the millions
>>> of years at least. I have a couple that it claims is in the trillions
>>> of years to crack. I've read some things not to use like pet names and
>>> such. I've also read that one should use upper and lower case letters,
>>> symbols and such and I do that, especially on my stuff I never want to
>>> be cracked. Some stuff, when I'm dead, it's gone.
>> As/when quantum computers development progresses, many/some passwords and
>> hashes will be cracked/brute forced (RSA encryption springs to mind). It is
>> best if you can think of any password as keeping your door and windows locked.
>> They will stop most opportunistic attempts, but not anyone who is determined
>> to break in. It is unlikely your passwords will stop state actors. A strong
>> password, like a strong door lock, buys you time. Hence the general
>> recommendation to change your passwords frequently.
>>
>>
>>> In the real world tho, how do people reading this make passwords that no
>>> one could ever guess?
>> You can use gpg, or openssl, or app-admin/apg, or app-admin/pwgen, to generate
>> random enough strings to use as passwords. They will be difficult to guess,
>> but will be VERY difficult to remember. You'll have to store them offline
>> and/or protect them in turn with some master passphrase you can remember.
>>
>> As an example, you could choose characters/strings from the output stored in
>> file.txt, when you run:
>>
>> < /dev/random tr -dc "[:space:][:print:]" | head -c500 > file.txt
>>
>>
>>> I use Bitwarden to handle website passwords and
>>> it does a good job. I make up my own tho when encrypting drives. I'm
>>> not sure I can really use Bitwarden for that given it is a command line
>>> thing, well, in a script in my case. I doubt anyone would ever guess
>>> any of my passwords but how do people reading this do theirs? Just how
>>> far do you really go to make it secure? Obviously you shouldn't give up
>>> much detail but just some general ideas. Maybe even a example or two of
>>> a fake password, just something that you would come up with and how.
>>>
>>> This is the two sites I use.
>>>
>>>
>>> https://www.passwordmonster.com/
>>>
>>> https://www.security.org/how-secure-is-my-password/
>>>
>>>
>>> I have a password in the first one that shows this:
>>>
>>>
>>> It would take a computer about 63 thousand years to crack your password
>>>
>>>
>>> Second one says this.
>>>
>>> It would take a computer about 5 million years to crack your password
>>>
>>> Exact same password in both. Why such a large range to crack?
>> I don't know why these guys come up with different years-equivalent strength,
>> but I tend to treat such websites as suspicious. They are more likely to act
>> as a honeypot to *record* your passwords, than provide you with truly
>> meaningful information. I suppose you could use them to test an example of a
>> password you would never use thereafter, but even this could reveal some
>> underlying pattern in how you structure your passwords.
>>
>>
>>> I tend
>>> to use the first site to create a password. Then I test it in the
>>> second site to sort of confirm it. If both say a long time, then I got
>>> a fairly good one depending on what I'm protecting. Still, why such a
>>> difference? One reason I use the first site, I can make it show the
>>> password. The second site doesn't do that so editing it to improve
>>> things is harder since you can't see it. The first site makes that easy
>>> and gives me a idea of whether I'm on the right track. Second site
>>> confirms it. I did contact the second site and ask for a button to show
>>> the password. After all, no one is here but me. My windows are covered.
>>>
>>> Also, I use cryptsetup luksFormat -s 512 ... to encrypt things. Is
>>> that 512 a good number? Can it be something different? I'd think since
>>> it is needed as a option, it can have different values and encrypt
>>> stronger or weaker. Is that the case? I've tried to find out but it
>>> seems everyone uses 512. If that is the only value, why make it a
>>> option? I figure it can have other values but how does that work?
>> The size of key options depend on the block cipher. A larger key size tends
>> to be stronger, but its processing slower. Embedded devices without hardware
>> accelerated crypto could struggle with larger key sizes.
>>
>>
>>> Heck, a link to some good info on that would be good. :-)
>> https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/FAQ.md
>>
>> https://gitlab.com/cryptsetup/cryptsetup/wikis/LUKS-standard/on-disk-format.pdf
>>
>> https://wiki.archlinux.org/title/Data-at-rest_encryption
>>
>
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 11:47 ` Michael
2023-09-19 13:30 ` hitachi303
@ 2023-09-20 2:52 ` Dale
1 sibling, 0 replies; 35+ messages in thread
From: Dale @ 2023-09-20 2:52 UTC (permalink / raw
To: gentoo-user
Michael wrote:
> On Tuesday, 19 September 2023 12:13:40 BST Dale wrote:
>> Hmmmm,
>>
>> For some reason, I didn't get Michael's email. I see him being quoted
>> but don't have his original. I wonder what is up with that. O-o
> Assuming you will receive this message, have a look here:
>
> https://marc.info/?l=gentoo-user&m=169511184714476&w=2
>
>
>> Rich Freeman wrote:
>>> On Tue, Sep 19, 2023 at 4:26 AM Michael <confabulate@kintzios.com> wrote:
>>>> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
>>>>> Howdy,
>>>> A strong
>>>> password, like a strong door lock, buys you time. Hence the general
>>>> recommendation to change your passwords frequently.
>>> While that can help on websites, it is of no use for full disk
>>> encryption passwords - at least not without jumping through some big
>>> hoops.
>>>
>>> In order to crack your LUKS password somebody obviously needs to be
>>> able to read the encrypted contents of your disk. They cannot begin
>>> cracking it until they have a copy of the LUKS headers. However, once
>>> they do have it, they can make a copy and crack it at their leisure.
>>> If they manage to crack it, then it will give them the volume key. At
>>> that point if they were able to make a full copy of your disk they can
>>> read whatever was on it at the time. If they can make a fresh copy of
>>> your disk then changing the passphrase will not change the volume key,
>>> and so they'll be able to read what is currently on your disk.
>>>
>>> Changing the volume key would defeat this, but requires running
>>> cryptsetup-reencrypt which will take considerable time/CPU, though it
>>> sounds like it can be done online.
>> Let's jump into a hypothetical here. Let's say I'm a nasty terrorist or
>> some other really evil dude. Let's say I have passwords are that really
>> good. Let's say around 20 characters and a really nice mix of
>> characters. If some gov't agency got my hard drive, how long would it
>> take for them to crack it?
> A couple of minutes?
>
> https://xkcd.com/538/
>
> :-)
I did get this one. I also got the other message, I think at the same
time. It sure did arrive late tho. I have mine set up to view as
threads. This thread looked odd until it got the previous message.
Must have got hung up somewhere. Maybe a server somewhere had to reboot
and it took a while. ROFL
I like the cartoon. In some countries, that would likely be a first
option. :/
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* [gentoo-user] Re: Password questions, looking for opinions. cryptsetup question too.
2023-09-20 2:41 ` Dale
@ 2023-09-20 2:59 ` Grant Edwards
2023-09-20 4:49 ` Dale
2023-09-20 6:47 ` [gentoo-user] " hitachi303
1 sibling, 1 reply; 35+ messages in thread
From: Grant Edwards @ 2023-09-20 2:59 UTC (permalink / raw
To: gentoo-user
On 2023-09-20, Dale <rdalek1967@gmail.com> wrote:
> For websites, I really like Bitwarden. I remember one password and it
> can generate passwords for all the websites I use. The passwords it
> generates are pretty random. For sites that don't allow symbols, I can
> turn that off. The big point, I only remember one password. Thing is,
> on one hand I need help remembering all these passwords. On the other
> hand, that is a risk itself.
I second the recommendation of Bitwarden. I used to use Lastpass but
they discontinued their free version, and the entry-level price was
just too high. I was so impressed with Bitwarden's support that I did
end up subsribing to their lowest-level paid service even though I
don't really need any of the extras that gets me. It's also nice to
know that I can set up my own Bitwarden server if I want to.
If you're using Bitwarden's cloudy storage, don't forget to back up
your password database locally too. I always back it up in human
readable format and then encrypt it using openssl command-line
methods. You don't want to have to depend on either Bitwarden's
servers or the Bitwarden app to retreive your passwords.
--
Grant
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 8:26 ` Michael
2023-09-19 9:10 ` Jude DaShiell
2023-09-19 10:00 ` Rich Freeman
@ 2023-09-20 4:19 ` Dale
2023-09-20 12:28 ` Michael
2 siblings, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-20 4:19 UTC (permalink / raw
To: gentoo-user
Michael wrote:
> On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
>
>> Heck, a link to some good info on that would be good. :-)
> https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/FAQ.md
>
> https://gitlab.com/cryptsetup/cryptsetup/wikis/LUKS-standard/on-disk-format.pdf
>
> https://wiki.archlinux.org/title/Data-at-rest_encryption
Oops. Should have sent this in other message.
Interesting links. Some of the info I'm clueless. I don't know some of
the terms and what they mean. Some of it I get tho. Basically, despite
people wanting to encrypt to protect data, some powerful entities can
still crack it no matter how good the password or phrase is. It seems
encryption done 'on the fly' I think is the phrase they use is just very
hard to do without some serious CPU power or other tools. Am I getting it?
I have a question tho. Can a person use a password/pass phrase that is
like this: 'This is a stupid pass phrase.' Does it accept that even
with spaces? I know file names can have spaces for a long while now but
way back, you couldn't do that easily. One had to use dashes or
underscores. Uses spaces could open a few options.
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Re: Password questions, looking for opinions. cryptsetup question too.
2023-09-20 2:59 ` [gentoo-user] " Grant Edwards
@ 2023-09-20 4:49 ` Dale
2023-09-20 20:22 ` Frank Steinmetzger
0 siblings, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-20 4:49 UTC (permalink / raw
To: gentoo-user
Grant Edwards wrote:
> On 2023-09-20, Dale <rdalek1967@gmail.com> wrote:
>
>> For websites, I really like Bitwarden. I remember one password and it
>> can generate passwords for all the websites I use. The passwords it
>> generates are pretty random. For sites that don't allow symbols, I can
>> turn that off. The big point, I only remember one password. Thing is,
>> on one hand I need help remembering all these passwords. On the other
>> hand, that is a risk itself.
> I second the recommendation of Bitwarden. I used to use Lastpass but
> they discontinued their free version, and the entry-level price was
> just too high. I was so impressed with Bitwarden's support that I did
> end up subsribing to their lowest-level paid service even though I
> don't really need any of the extras that gets me. It's also nice to
> know that I can set up my own Bitwarden server if I want to.
>
> If you're using Bitwarden's cloudy storage, don't forget to back up
> your password database locally too. I always back it up in human
> readable format and then encrypt it using openssl command-line
> methods. You don't want to have to depend on either Bitwarden's
> servers or the Bitwarden app to retreive your passwords.
>
> --
> Grant
>
Usually, once a year I change my major passwords, bank, credit card,
ebay, Paypal, Amazon and such. I have a folder thingy that I store
those in to make sure I don't forget to change something important.
Anyway, when I do that and use the new passwords successfully, I make a
backup copy and on my rig, I can encrypt it with a right click. I then
shred the original. While I think Bitwarden will be around and they
will work fine, one never knows.
I'm thinking of making a one time donation to Bitwarden. Just to help
them out. I can't do much but I can do that. I used Lastpass until
they switched too. I actually imported my passwords from one to the
other. It seems to work the same way to me.
I still use Lastpass in Seamonkey. Bitwarden doesn't have a plugin for
Seamonkey that I've found. Lastpass hasn't been updated in ages
either. Once Firefox did their major changes a few years ago, a lot of
old plugins are no longer maintained. Seamonkey needs to catch up or it
is going to die.
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-20 2:41 ` Dale
2023-09-20 2:59 ` [gentoo-user] " Grant Edwards
@ 2023-09-20 6:47 ` hitachi303
1 sibling, 0 replies; 35+ messages in thread
From: hitachi303 @ 2023-09-20 6:47 UTC (permalink / raw
To: gentoo-user
Am 20.09.23 um 04:41 schrieb Dale:
> It is interesting what people can come up with. Thing is, if one uses a
> true random generated password, they are hard to crack but also hard to
> remember. I try to come up with something that will be hard to crack
> but easy for me to remember.
If someone has a child one can always frame the first language test and
put it at the wall in the office together with some family photos. Those
spelling errors might not be random but for all practical use they are
not predictable. One can always look it up. Just remember the line of
the password. This is hidden in plain sight.
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-20 4:19 ` Dale
@ 2023-09-20 12:28 ` Michael
2023-09-20 18:05 ` Frank Steinmetzger
0 siblings, 1 reply; 35+ messages in thread
From: Michael @ 2023-09-20 12:28 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 3006 bytes --]
On Wednesday, 20 September 2023 05:19:18 BST Dale wrote:
> Michael wrote:
> > On Tuesday, 19 September 2023 06:36:13 BST Dale wrote:
> >> Heck, a link to some good info on that would be good. :-)
> >
> > https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/FAQ.md
> >
> > https://gitlab.com/cryptsetup/cryptsetup/wikis/LUKS-standard/on-disk-forma
> > t.pdf
> >
> > https://wiki.archlinux.org/title/Data-at-rest_encryption
>
> Oops. Should have sent this in other message.
>
> Interesting links. Some of the info I'm clueless. I don't know some of
> the terms and what they mean. Some of it I get tho. Basically, despite
> people wanting to encrypt to protect data, some powerful entities can
> still crack it no matter how good the password or phrase is. It seems
> encryption done 'on the fly' I think is the phrase they use is just very
> hard to do without some serious CPU power or other tools. Am I getting it?
Security can be compromised because people use easy to guess passwords, or by
using side-channel attack methods. As Snowden mentioned, if you rely on a low
entropy device, e.g. a mobile phone, on which the base frequency can also be
compromised, then that could be the weakest link for an attack. Not to
mention keyloggers and various MITM attacks, which on phones at least are
rumoured to be the way to compromise a device. Cracking algos and ciphers is
computationally more expensive, performed offline and probably the last
resort. That said, if you assume state actors are at least 10 years ahead of
you in terms of technological solutions and resources, you'd be at the right
ballpark.
> I have a question tho. Can a person use a password/pass phrase that is
> like this: 'This is a stupid pass phrase.' Does it accept that even
> with spaces? I know file names can have spaces for a long while now but
> way back, you couldn't do that easily. One had to use dashes or
> underscores. Uses spaces could open a few options.
Generally speaking space characters are a poor choice for randomness. I
recall seeing some documentary about the Enigma machine used by the German
military during the 2nd WW. To minimise attempts to brute force the
ciphertext, they started by identifying which letter(s) were most frequently
used in the German language - e.g. the letter "e", then the second most
frequent letter and so on. This statistical analysis approach in combination
with likely message content reduced the number of guesses. In principle, a
repeated space character in your passphrase could help reduce the
computational burden of an offline brute force attack, by e.g. helping an
attacker to identify the number of individual words in a passphrase. All
these passphrases and whatever other private info you pasted into different
websites could also be harvested and used to determine some statistical
pattern in your selected passphrases. However, different ciphers and stronger
keys guard against easy cracking by brute force.
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 5:36 [gentoo-user] Password questions, looking for opinions. cryptsetup question too Dale
2023-09-19 8:26 ` Michael
2023-09-19 9:03 ` hitachi303
@ 2023-09-20 16:18 ` Hoël Bézier
2023-09-20 16:39 ` Jack
2023-09-20 17:54 ` Jude DaShiell
2023-09-27 9:43 ` [gentoo-user] " Nikos Chantziaras
3 siblings, 2 replies; 35+ messages in thread
From: Hoël Bézier @ 2023-09-20 16:18 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1126 bytes --]
Am Tue, Sep 19, 2023 at 12:36:13AM -0500 schrieb Dale:
>In the real world tho, how do people reading this make passwords that no
>one could ever guess? I use Bitwarden to handle website passwords and
>it does a good job. I make up my own tho when encrypting drives. I'm
>not sure I can really use Bitwarden for that given it is a command line
>thing, well, in a script in my case. I doubt anyone would ever guess
>any of my passwords but how do people reading this do theirs? Just how
>far do you really go to make it secure? Obviously you shouldn't give up
>much detail but just some general ideas. Maybe even a example or two of
>a fake password, just something that you would come up with and how.
For storing passwords, I use app-admin/pass.
For choosing passphrases, I write sentences. I know having space character at a
predictable frequence in the passphrase makes it easier to find out, but using
phrases makes it easier to come up with very long passphrases (which, I
believe, balances the space thing, though I’m no crypto expert), which are also
easy to remember.
Hoël
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-20 16:18 ` Hoël Bézier
@ 2023-09-20 16:39 ` Jack
2023-09-20 17:54 ` Jude DaShiell
1 sibling, 0 replies; 35+ messages in thread
From: Jack @ 2023-09-20 16:39 UTC (permalink / raw
To: gentoo-user
On 9/20/23 12:18, Hoël Bézier wrote:
> Am Tue, Sep 19, 2023 at 12:36:13AM -0500 schrieb Dale:
>> In the real world tho, how do people reading this make passwords that no
>> one could ever guess? I use Bitwarden to handle website passwords and
>> it does a good job. I make up my own tho when encrypting drives. I'm
>> not sure I can really use Bitwarden for that given it is a command line
>> thing, well, in a script in my case. I doubt anyone would ever guess
>> any of my passwords but how do people reading this do theirs? Just how
>> far do you really go to make it secure? Obviously you shouldn't give up
>> much detail but just some general ideas. Maybe even a example or two of
>> a fake password, just something that you would come up with and how.
>
> For storing passwords, I use app-admin/pass.
>
> For choosing passphrases, I write sentences. I know having space
> character at a predictable frequence in the passphrase makes it easier
> to find out, but using phrases makes it easier to come up with very
> long passphrases (which, I believe, balances the space thing, though
> I’m no crypto expert), which are also easy to remember.
I don't think anyone has yet mentioned using the first (or last or
second) letter of each word in the first (or last) sentence of a
favorite book or poem or song, possibly modifying with some upper case
and sprinkling in digits and special characters.
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-20 16:18 ` Hoël Bézier
2023-09-20 16:39 ` Jack
@ 2023-09-20 17:54 ` Jude DaShiell
1 sibling, 0 replies; 35+ messages in thread
From: Jude DaShiell @ 2023-09-20 17:54 UTC (permalink / raw
To: gentoo-user
Another possibility is to write down encrypted passwords and don't
disclose encryption technique. The rot13 is worthless.
-- Jude <jdashiel at panix dot com> "There are four boxes to be used in
defense of liberty: soap, ballot, jury, and ammo. Please use in that
order." Ed Howdershelt 1940.
On Wed, 20 Sep 2023, Hoël Bézier wrote:
> Am Tue, Sep 19, 2023 at 12:36:13AM -0500 schrieb Dale:
> >In the real world tho, how do people reading this make passwords that no
> >one could ever guess? I use Bitwarden to handle website passwords and
> >it does a good job. I make up my own tho when encrypting drives. I'm
> >not sure I can really use Bitwarden for that given it is a command line
> >thing, well, in a script in my case. I doubt anyone would ever guess
> >any of my passwords but how do people reading this do theirs? Just how
> >far do you really go to make it secure? Obviously you shouldn't give up
> >much detail but just some general ideas. Maybe even a example or two of
> >a fake password, just something that you would come up with and how.
>
> For storing passwords, I use app-admin/pass.
>
> For choosing passphrases, I write sentences. I know having space character at
> a predictable frequence in the passphrase makes it easier to find out, but
> using phrases makes it easier to come up with very long passphrases (which, I
> believe, balances the space thing, though I’m no crypto expert), which are
> also easy to remember.
>
> Hoël
>
>
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-20 12:28 ` Michael
@ 2023-09-20 18:05 ` Frank Steinmetzger
2023-09-23 12:39 ` Wols Lists
0 siblings, 1 reply; 35+ messages in thread
From: Frank Steinmetzger @ 2023-09-20 18:05 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 3175 bytes --]
Am Wed, Sep 20, 2023 at 01:28:09PM +0100 schrieb Michael:
> > I have a question tho. Can a person use a password/pass phrase that is
> > like this: 'This is a stupid pass phrase.' Does it accept that even
> > with spaces? I know file names can have spaces for a long while now but
> > way back, you couldn't do that easily. One had to use dashes or
> > underscores.
Sure, why not? It’s a string like any other. No spaces in filenames where a
restriction of (now outdated) file systems. And I guess developers didn’t
account for them back in those days (and later out of habit). When I used
DOS, of course I adhered to the 8.3 rule. But ever since I started using
Windows, XP at the latest (2001), I wholly started using spaces everywhere
and never looked back. The programs that had problems with spaces were few
and script authors should just adhere to best practices and put filename
variables in quotes, so they can work with spaces. The only nuissance they
pose for me is it may make tab completion cumbersome sometimes.
PS.: I find underscores ugly. :D
> Generally speaking space characters are a poor choice for randomness. I
> recall seeing some documentary about the Enigma machine used by the German
> military during the 2nd WW. To minimise attempts to brute force the
> ciphertext, they started by identifying which letter(s) were most frequently
> used in the German language - e.g. the letter "e", then the second most
> frequent letter and so on. This statistical analysis approach in combination
> with likely message content reduced the number of guesses.
Here you speak of the payload, not the passphrase, which is the encyption
key. The key was rotated after each character and the initial key setting (the
tumbler position) was distributed in secret code books.
> In principle, a repeated space character in your passphrase could help
> reduce the computational burden of an offline brute force attack, by e.g.
> helping an attacker to identify the number of individual words in a
> passphrase.
Due to the rotation, the Enigma encoded each subsequent letter differently,
even if the same one repeated, which was (one of) the big strengths of the
Enigma cipher. The flaws were elsewhere, for example that a character could
never be encrypted onto itself due to the internal wiring and certain
message parts were always the same, like message headers and greetings.
For LUKS, having spaces in your passphrase (or their frequency) has no
influence on the ciphertext, since the passphrase itself is not used for
encryption. The passphrase only unlocks the actual key, which is then used
for encryption. It comes down to whether the passphrase can easily be
guessed by dictionary attacks. So if you write normal sentences with
correctly written words, they might be easy to crack. I don’t expect it
makes a big difference to the brute force software whether you use spaces or
not.
--
Grüße | Greetings | Salut | Qapla’
Please do not share anything from, with or about me on any social network.
Suicide is the most honest form of self-criticism.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Re: Password questions, looking for opinions. cryptsetup question too.
2023-09-20 4:49 ` Dale
@ 2023-09-20 20:22 ` Frank Steinmetzger
2023-09-20 20:51 ` Rich Freeman
0 siblings, 1 reply; 35+ messages in thread
From: Frank Steinmetzger @ 2023-09-20 20:22 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 519 bytes --]
Am Tue, Sep 19, 2023 at 11:49:24PM -0500 schrieb Dale:
> Anyway, when I do that and use the new passwords successfully, I make a
> backup copy and on my rig, I can encrypt it with a right click. I then
> shred the original.
Just on a sidenote, once you’re on an SSD, shredding has no use and is
actually detrimental.
--
Grüße | Greetings | Salut | Qapla’
Please do not share anything from, with or about me on any social network.
On Mondays I feel like Robinson -- I’m waiting for Friday.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Re: Password questions, looking for opinions. cryptsetup question too.
2023-09-20 20:22 ` Frank Steinmetzger
@ 2023-09-20 20:51 ` Rich Freeman
2023-09-20 21:56 ` Frank Steinmetzger
0 siblings, 1 reply; 35+ messages in thread
From: Rich Freeman @ 2023-09-20 20:51 UTC (permalink / raw
To: gentoo-user
On Wed, Sep 20, 2023 at 4:22 PM Frank Steinmetzger <Warp_7@gmx.de> wrote:
>
> Am Tue, Sep 19, 2023 at 11:49:24PM -0500 schrieb Dale:
>
> > Anyway, when I do that and use the new passwords successfully, I make a
> > backup copy and on my rig, I can encrypt it with a right click. I then
> > shred the original.
>
> Just on a sidenote, once you’re on an SSD, shredding has no use and is
> actually detrimental.
>
I'm not sure I'd go quite that far, but it certainly isn't as effective.
No way to be certain how well it works, but it is certainly worth
doing an ATA Secure Erase command on the drive. A good SSD should
implement that in a way that ensures all the data is actually
unretrievable (probably by implementing full disk encryption and
erasing the key). Of course, there is no way to tell if the drive was
implemented well.
Full-disk encryption at the OS level is of course the best way to
protect against recovery of data on a discarded disk.
--
Rich
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Re: Password questions, looking for opinions. cryptsetup question too.
2023-09-20 20:51 ` Rich Freeman
@ 2023-09-20 21:56 ` Frank Steinmetzger
0 siblings, 0 replies; 35+ messages in thread
From: Frank Steinmetzger @ 2023-09-20 21:56 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1071 bytes --]
Am Wed, Sep 20, 2023 at 04:51:36PM -0400 schrieb Rich Freeman:
> > > Anyway, when I do that and use the new passwords successfully, I make a
> > > backup copy and on my rig, I can encrypt it with a right click. I then
> > > shred the original.
> >
> > Just on a sidenote, once you’re on an SSD, shredding has no use and is
> > actually detrimental.
> >
>
> I'm not sure I'd go quite that far, but it certainly isn't as effective.
>
> No way to be certain how well it works, but it is certainly worth
> doing an ATA Secure Erase command on the drive. A good SSD should
> implement that in a way that ensures all the data is actually
> unretrievable (probably by implementing full disk encryption and
> erasing the key). Of course, there is no way to tell if the drive was
> implemented well.
Uhm, Dale was talking of a single file, not an entire disk. ;-)
--
Grüße | Greetings | Salut | Qapla’
Please do not share anything from, with or about me on any social network.
do something for your image -- let yourself be seen with me.
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 9:10 ` Jude DaShiell
2023-09-20 2:41 ` Dale
@ 2023-09-23 10:57 ` Wols Lists
1 sibling, 0 replies; 35+ messages in thread
From: Wols Lists @ 2023-09-23 10:57 UTC (permalink / raw
To: gentoo-user
On 19/09/2023 10:10, Jude DaShiell wrote:
> Once the set spots got figured
> five dice got used for letters add the total and subtract 4 for the
> particular letter.
Which actually isn't random. It's a bell curve peaking probably between
J and M. Think, if you throw 2 dice, there are 36 possible combinations.
Only one of them generates 2, only one generates 12, but 6 combinations
can generate 7.
Cheers,
Wol
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-20 18:05 ` Frank Steinmetzger
@ 2023-09-23 12:39 ` Wols Lists
2023-09-23 13:35 ` Dale
0 siblings, 1 reply; 35+ messages in thread
From: Wols Lists @ 2023-09-23 12:39 UTC (permalink / raw
To: gentoo-user
On 20/09/2023 19:05, Frank Steinmetzger wrote:
>> In principle, a repeated space character in your passphrase could help
>> reduce the computational burden of an offline brute force attack, by e.g.
>> helping an attacker to identify the number of individual words in a
>> passphrase.
> Due to the rotation, the Enigma encoded each subsequent letter differently,
> even if the same one repeated, which was (one of) the big strengths of the
> Enigma cipher. The flaws were elsewhere, for example that a character could
> never be encrypted onto itself due to the internal wiring and certain
> message parts were always the same, like message headers and greetings.
And, as always, one of the biggest weaknesses was the operator.
Enigma had three (or in later versions four) rotors. The code book
specified the INITIAL "settings of the day" for those rotors. What was
*supposed* to happen was the operator was supposed to select a random
three/four character string, transmit that string twice, then reset the
rotors to that string before carrying on. So literally no two messages
were supposed to have the same settings beyond the first six characters.
Except that a lot of operators re-used the same characters time and time
again. So if you got a message from an operator you recognised, you
might well know his "seventh character reset". That saved a lot of grief
trying to crack which of the several rotors were "the rotors of the day".
And given that, for a large chunk of the war, the radio operators were
"chatty", you generally got a lot of six-character strings for which you
had a damn good idea what the plain text was.
So even where some of the operators were seriously crypto-aware and
careful, once you'd cracked the rotors and initial settings from the
careless, you could read every message sent by everyone (using those
settings) that day.
Along with other things like RDF giving subs positions away (although
I'm not quite sure how much we had good RDF and how much it was a cover
for us reading their location in status reports), it certainly helped us
loads hunting them down.
Cheers,
Wol
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-19 9:13 ` Dale
@ 2023-09-23 12:47 ` Wols Lists
2023-09-23 13:42 ` Dale
0 siblings, 1 reply; 35+ messages in thread
From: Wols Lists @ 2023-09-23 12:47 UTC (permalink / raw
To: gentoo-user
On 19/09/2023 10:13, Dale wrote:
> That's a interesting way to come up with passwords tho. I've seen that
> is a few whodunit type shows. Way back in the old days, they had some
> interesting ways of coding messages. Passwords are sort of similar.
Back when we were busy conquering India ...
The story goes of a General trying to send a message back of his latest
conquest, but he didn't want to use codes because he had a suspicion the
Indians could read them if his messenger was captured.
It appears the story is apocryphal, but the message he sent read "peccavi".
https://www.ft.com/content/49036e66-ac48-11e8-94bd-cba20d67390c
Cheers,
Wol
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-23 12:39 ` Wols Lists
@ 2023-09-23 13:35 ` Dale
2023-09-23 14:00 ` Wol
0 siblings, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-23 13:35 UTC (permalink / raw
To: gentoo-user
Wols Lists wrote:
> On 20/09/2023 19:05, Frank Steinmetzger wrote:
>>> In principle, a repeated space character in your passphrase could help
>>> reduce the computational burden of an offline brute force attack, by
>>> e.g.
>>> helping an attacker to identify the number of individual words in a
>>> passphrase.
>
>> Due to the rotation, the Enigma encoded each subsequent letter
>> differently,
>> even if the same one repeated, which was (one of) the big strengths
>> of the
>> Enigma cipher. The flaws were elsewhere, for example that a character
>> could
>> never be encrypted onto itself due to the internal wiring and certain
>> message parts were always the same, like message headers and greetings.
>
> And, as always, one of the biggest weaknesses was the operator.
>
> Enigma had three (or in later versions four) rotors. The code book
> specified the INITIAL "settings of the day" for those rotors. What was
> *supposed* to happen was the operator was supposed to select a random
> three/four character string, transmit that string twice, then reset
> the rotors to that string before carrying on. So literally no two
> messages were supposed to have the same settings beyond the first six
> characters.
>
> Except that a lot of operators re-used the same characters time and
> time again. So if you got a message from an operator you recognised,
> you might well know his "seventh character reset". That saved a lot of
> grief trying to crack which of the several rotors were "the rotors of
> the day".
>
> And given that, for a large chunk of the war, the radio operators were
> "chatty", you generally got a lot of six-character strings for which
> you had a damn good idea what the plain text was.
>
> So even where some of the operators were seriously crypto-aware and
> careful, once you'd cracked the rotors and initial settings from the
> careless, you could read every message sent by everyone (using those
> settings) that day.
>
> Along with other things like RDF giving subs positions away (although
> I'm not quite sure how much we had good RDF and how much it was a
> cover for us reading their location in status reports), it certainly
> helped us loads hunting them down.
>
> Cheers,
> Wol
>
>
Another question. Are people trying to work on better encryption given
current encryption can be cracked? I read some things changed after
Snowden. I'm just not sure what and if more changes are needed even
today.
If you wanted the most secure and hard to crack encryption, what would
you use? How does one tell cryptsetup to use it? I have several
encryption options here but no idea what is the best or even just good.
I'm making pepper sauce today. I hope this typing is OK. The air has a
spicy warmth to it. o_O
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-23 12:47 ` Wols Lists
@ 2023-09-23 13:42 ` Dale
2023-09-23 15:44 ` Håkon Alstadheim
0 siblings, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-23 13:42 UTC (permalink / raw
To: gentoo-user
Wols Lists wrote:
> On 19/09/2023 10:13, Dale wrote:
>> That's a interesting way to come up with passwords tho. I've seen that
>> is a few whodunit type shows. Way back in the old days, they had some
>> interesting ways of coding messages. Passwords are sort of similar.
>
> Back when we were busy conquering India ...
>
> The story goes of a General trying to send a message back of his
> latest conquest, but he didn't want to use codes because he had a
> suspicion the Indians could read them if his messenger was captured.
>
> It appears the story is apocryphal, but the message he sent read
> "peccavi".
>
> https://www.ft.com/content/49036e66-ac48-11e8-94bd-cba20d67390c
>
> Cheers,
> Wol
>
>
It seems that requires a subscription. Oh well.
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-23 13:35 ` Dale
@ 2023-09-23 14:00 ` Wol
2023-09-23 15:05 ` Dale
0 siblings, 1 reply; 35+ messages in thread
From: Wol @ 2023-09-23 14:00 UTC (permalink / raw
To: gentoo-user
On 23/09/2023 14:35, Dale wrote:
> Another question. Are people trying to work on better encryption given
> current encryption can be cracked? I read some things changed after
> Snowden. I'm just not sure what and if more changes are needed even
> today.
> If you wanted the most secure and hard to crack encryption, what
> would you use? How does one tell cryptsetup to use it? I have several
> encryption options here but no idea what is the best or even just good.
If you want encryption that can't be cracked, go for RSA. It's uncrackable.
Now you might be wondering why I say that, given that is a simple,
well-known attack, but it's true. You can trick me into encoding as much
plain text as you like, where you can intercept the cipher text, and you
will not be able to crack the cipher itself. What you need to do is get
hold of ONE of my key-pairs. The public one of course is usually freely
available, and if you get hold of the private one it's game over.
You can then mathematically solve "the puzzle of the keys" from my
public pair and recover the private key. This is why RSA keys keep
getting bigger - it takes more and more brute force to solve.
I don't know enough about ECC - do you crack it or solve it?
Both these ciphers however have a massive weakness - make a mistake
setting them up and the solution becomes easy. RSA relies on multiplying
two huge primes together. Dunno what ECC relies on. If one of your RSA
primes is not, in fact, prime then factoring the huge product becomes
easy, and recovering all the keys built from it is simple.
ECC specifies various parameters, and the official standard ECC
parameters were discovered to contain a flaw. Was that an intentional
back door? It's thought it was an accident.
But I think cryptographers have abandoned crackable ciphers now - if
it's crackable then it's easily crackable. And all other ciphers simply
rely on the asymmetric effort taken to create a key or solve a key.
Cheers,
Wol
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-23 14:00 ` Wol
@ 2023-09-23 15:05 ` Dale
2023-09-23 16:08 ` Rich Freeman
0 siblings, 1 reply; 35+ messages in thread
From: Dale @ 2023-09-23 15:05 UTC (permalink / raw
To: gentoo-user
Wol wrote:
> On 23/09/2023 14:35, Dale wrote:
>> Another question. Are people trying to work on better encryption
>> given current encryption can be cracked? I read some things changed
>> after Snowden. I'm just not sure what and if more changes are needed
>> even today.
>
>> If you wanted the most secure and hard to crack encryption, what
>> would you use? How does one tell cryptsetup to use it? I have
>> several encryption options here but no idea what is the best or even
>> just good.
>
> If you want encryption that can't be cracked, go for RSA. It's
> uncrackable.
>
> Now you might be wondering why I say that, given that is a simple,
> well-known attack, but it's true. You can trick me into encoding as
> much plain text as you like, where you can intercept the cipher text,
> and you will not be able to crack the cipher itself. What you need to
> do is get hold of ONE of my key-pairs. The public one of course is
> usually freely available, and if you get hold of the private one it's
> game over.
>
> You can then mathematically solve "the puzzle of the keys" from my
> public pair and recover the private key. This is why RSA keys keep
> getting bigger - it takes more and more brute force to solve.
>
> I don't know enough about ECC - do you crack it or solve it?
>
> Both these ciphers however have a massive weakness - make a mistake
> setting them up and the solution becomes easy. RSA relies on
> multiplying two huge primes together. Dunno what ECC relies on. If one
> of your RSA primes is not, in fact, prime then factoring the huge
> product becomes easy, and recovering all the keys built from it is
> simple.
>
> ECC specifies various parameters, and the official standard ECC
> parameters were discovered to contain a flaw. Was that an intentional
> back door? It's thought it was an accident.
>
> But I think cryptographers have abandoned crackable ciphers now - if
> it's crackable then it's easily crackable. And all other ciphers
> simply rely on the asymmetric effort taken to create a key or solve a
> key.
>
> Cheers,
> Wol
>
>
When I run cryptsetup to encrypt my drives, I have no idea what it is
using. I assumed the defaults would be the most secure. This is the
luksDump info, some may be changed or snipped, not sure if it is
something I should make public. ;-)
root@fireball / # cryptsetup luksDump /dev/sdo1
LUKS header information
Version: 2
Epoch: 3
Metadata area: 16384 [bytes]
Keyslots area: 16744448 [bytes]
UUID: 967257e5-ccc8-48ab-8f46-c6b05dc3bf37
Label: (no label)
Subsystem: (no subsystem)
Flags: (no flags)
Data segments:
0: crypt
offset: 16777216 [bytes]
length: (whole device)
cipher: aes-xts-plain64
sector: 4096 [bytes]
<<<< SNIP >>>>
Digests:
0: pbkdf2
Hash: sha256
Iterations: 83062
Salt: 20 d5 f5 3b 51 43 31 29 8a b0 31 dc ad 56 0c 15
50 18 aa f8 df a0 4e 9e 8e e1 b2 bb f1 04 67 01
Digest: 96 18 90 9e 89 7a 16 71 72 d0 97 ec 84 e1 b5 38
fc cb ea 97 93 29 19 4c 83 a6 fb 4e e9 ba 79 7b
root@fireball / #
I'm not to clear on this but it looks like it is using 'aes-xts-plain64'
to me. If so, is that good enough? Is there better?
While I'm mostly worried about someone maybe stealing my rig, I also
don't want someone with some skills getting in there either. Some
crooks may know someone. ;-)
Dale
:-) :-)
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-23 13:42 ` Dale
@ 2023-09-23 15:44 ` Håkon Alstadheim
0 siblings, 0 replies; 35+ messages in thread
From: Håkon Alstadheim @ 2023-09-23 15:44 UTC (permalink / raw
To: gentoo-user
Den 23.09.2023 15:42, skrev Dale:
> Wols Lists wrote:
>> On 19/09/2023 10:13, Dale wrote:
>>> That's a interesting way to come up with passwords tho. I've seen that
>>> is a few whodunit type shows. Way back in the old days, they had some
>>> interesting ways of coding messages. Passwords are sort of similar.
>> Back when we were busy conquering India ...
>>
>> The story goes of a General trying to send a message back of his
>> latest conquest, but he didn't want to use codes because he had a
>> suspicion the Indians could read them if his messenger was captured.
>>
>> It appears the story is apocryphal, but the message he sent read
>> "peccavi".
>>
>> https://www.ft.com/content/49036e66-ac48-11e8-94bd-cba20d67390c
>>
>> Cheers,
>> Wol
>>
>>
>
> It seems that requires a subscription. Oh well.
Try
https://www.euronews.com/culture/2023/02/17/culture-re-view-peccavi-a-misattributed-quote-and-the-british-raj
Probably ripped off from FT, but I was curious :-) .
^ permalink raw reply [flat|nested] 35+ messages in thread
* Re: [gentoo-user] Password questions, looking for opinions. cryptsetup question too.
2023-09-23 15:05 ` Dale
@ 2023-09-23 16:08 ` Rich Freeman
0 siblings, 0 replies; 35+ messages in thread
From: Rich Freeman @ 2023-09-23 16:08 UTC (permalink / raw
To: gentoo-user
On Sat, Sep 23, 2023 at 11:05 AM Dale <rdalek1967@gmail.com> wrote:
>
> I'm not to clear on this but it looks like it is using 'aes-xts-plain64'
> to me. If so, is that good enough? Is there better?
You are using the defaults, which is what you should be using, as
they're very secure. As far as I'm aware there is no known attack on
AES that is faster than a brute force attack, and a brute-force attack
on AES itself is not practical. I think it is unlikely that anybody
knows of an attack on the cipher, but of course that cannot be ruled
out. Current estimates of the time required to brute-force AES are in
the billions of years.
If somebody wanted to decrypt the drive without your knowledge, the
only practical attacks would be to evesdrop on you somehow to capture
your passphrase, or to brute force your passphrase. LUKS is designed
to make a brute-force attack on a passphrase impractical as long as it
is reasonably long. On typical hardware it should take a full second
or two to make one decryption attempt on the passphrase - obviously an
attacker could have more sophisticated hardware available but to even
be able to attempt tens of thousands of guesses per second would
require a very large expense, and your passphrase should be long
enough to make that search very long.
The most likely attack would be evesdropping. Stopping that requires
good physical security, and also keeping any malware out of your
bootloader. Unfortunately, the latter is generally not something
linux distros do much to prevent. Corporate laptops running windows
are typically set up to protect against this using a TPM and secure
boot. I'm not sure if any linux distros support a fully signed boot
processes up to disk decryption - doing that on Gentoo would be tricky
since the OS is being modified so often. A release-based distro could
do it a bit more easily - just stick the essential bits in a squashfs
and sign everything up to that point, and use secure boot.
Then of course if an attacker didn't mind you knowing about their
intrusion, they could use the rubber hose method. The only way to
defeat that sort of thing is to have some trusted external agent
involved in the process who could revoke your own access to your
device (think TPM and remote attestation to secure the boot chain plus
online authentication required for the device to obtain the session
key - though at that point you'd probably also just run a thin client
and keep the bulk of the data someplace more secure).
--
Rich
^ permalink raw reply [flat|nested] 35+ messages in thread
* [gentoo-user] Re: Password questions, looking for opinions. cryptsetup question too.
2023-09-19 5:36 [gentoo-user] Password questions, looking for opinions. cryptsetup question too Dale
` (2 preceding siblings ...)
2023-09-20 16:18 ` Hoël Bézier
@ 2023-09-27 9:43 ` Nikos Chantziaras
3 siblings, 0 replies; 35+ messages in thread
From: Nikos Chantziaras @ 2023-09-27 9:43 UTC (permalink / raw
To: gentoo-user
On 19/09/2023 08:36, Dale wrote:
> In the real world tho, how do people reading this make passwords that no
> one could ever guess?
I use nonsensical phrases that also contain symbols instead of words.
For example "all stars and cats for pies":
all*s&cats4pies
I can memorize those.
^ permalink raw reply [flat|nested] 35+ messages in thread
end of thread, other threads:[~2023-09-27 9:43 UTC | newest]
Thread overview: 35+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-09-19 5:36 [gentoo-user] Password questions, looking for opinions. cryptsetup question too Dale
2023-09-19 8:26 ` Michael
2023-09-19 9:10 ` Jude DaShiell
2023-09-20 2:41 ` Dale
2023-09-20 2:59 ` [gentoo-user] " Grant Edwards
2023-09-20 4:49 ` Dale
2023-09-20 20:22 ` Frank Steinmetzger
2023-09-20 20:51 ` Rich Freeman
2023-09-20 21:56 ` Frank Steinmetzger
2023-09-20 6:47 ` [gentoo-user] " hitachi303
2023-09-23 10:57 ` Wols Lists
2023-09-19 10:00 ` Rich Freeman
2023-09-19 11:13 ` Dale
2023-09-19 11:47 ` Michael
2023-09-19 13:30 ` hitachi303
2023-09-20 2:52 ` Dale
2023-09-20 4:19 ` Dale
2023-09-20 12:28 ` Michael
2023-09-20 18:05 ` Frank Steinmetzger
2023-09-23 12:39 ` Wols Lists
2023-09-23 13:35 ` Dale
2023-09-23 14:00 ` Wol
2023-09-23 15:05 ` Dale
2023-09-23 16:08 ` Rich Freeman
2023-09-19 9:03 ` hitachi303
2023-09-19 9:13 ` Dale
2023-09-23 12:47 ` Wols Lists
2023-09-23 13:42 ` Dale
2023-09-23 15:44 ` Håkon Alstadheim
2023-09-19 9:16 ` Jude DaShiell
2023-09-19 11:22 ` Dale
2023-09-20 16:18 ` Hoël Bézier
2023-09-20 16:39 ` Jack
2023-09-20 17:54 ` Jude DaShiell
2023-09-27 9:43 ` [gentoo-user] " Nikos Chantziaras
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox