Why are we talking about using password managers instead of just memorizing them ? Am i missing something here, or you are all actually willingly sacrificing your security for convenience ?Why are we talking about remembering / writing passwords, instead of using password managers ? Am i missing something here, or you are all actually willingly sacrificing your security for convenience ?
Most people can remember 7 (plus or minus a couple) different passwords by heart. Any more than that, and an app becomes a necessary tool. I have over 100 different passwords to manage, and they were accumulated from 30+ years of living on the Internet like the rest of us here on the Forums.Why are we talking about using password managers instead of just memorizing them ? Am i missing something here, or you are all actually willingly sacrificing your security for convenience ?
This is true. But in the "only landline days", before smartphones and contact lists, it was amazing how many phone numbers one had memorized. Mom at work, dad at work, home, aunt suzie, grandma, best friend 1-20, etc. Think about entering a PIN on a keypad (ATM, building entry, etc): if you are standing in front of it, your mind knows the pattern of movement. If you are standing in front of the ATM and someone asks about "PIN to get into the lab at work" and you freeze, but if you imagine you are standing in front of the lab door your fingers know.Most people can remember 7 (plus or minus a couple) different passwords by heart. Any more than that, and an app becomes a necessary tool. I have over 100 different passwords to manage, and they were accumulated from 30+ years of living on the Internet like the rest of us here on the Forums.
Thats what the hardware usb keys are for. Comon people.+Password managers. You need to remember at least one "key" in order to decrypt all the keys.
Is that really different from you typing credentials into a text doc and then using GPG to encrypt the file?
Both mean "I need to remember only one (Highlander reference)", one simply needs to pick your poison.
Heck, writing credentials on paper, sticking paper in a fireproof safe that you have the only key to is the analog equivalent to password managers.
Obtain the key to any of them (password manager, GPG encrypted file, fireproof safe) and you have the data.
"...willingly sacrificing your security for convenience ?"
That is the eternal tradeoff; going back to securing one's cave. Everyone has a different tolerance for the tradeoff.
What I am comfortable with may be overkill to you or may be underkill to you.
Present the information, the tradeoffs, the consequences fall solely on the individual.
Not everybody uses them, even among the big guys. I'd know, at one of my $JOBs they were actually prohibited.Thats what the hardware usb keys are for. Comon people.
Point taken.(Sorry I hope I'm not using as many words as Maturin That's a joke for the record)
Personally I don't trust pw managers.password managers
Yep been there. Government/classified systems typically disable USB stuff.Not everybody uses them, even among the big guys. I'd know, at one of my $JOBs they were actually prohibited.
I use it.Not everybody uses them, even among the big guys. I'd know, at one of my $JOBs they were actually prohibited.
Can you tell me why would you not trust 100% open source software that works offline and its available in freebsd repo ?Personally I don't trust pw managers.
So you are telling me that if i lock my database with 48 character strong password paired with yubikey, thats less secure than memorizing 20 different passwords which are variation of the same password combined with finger muscle memory.And even if they are 100% trustworthy they don't provide more security at all.
You are completely out of touch.All they do is, you don't need to remember all passwords.
Again, you do not know what you are talking about. You can literally set the most retarded and easy to remember password as your master password, and pair that with the encryption key, or in my case, a hardware yubikey. With this key combo, i can send you my encrypted passwords database, including my master password, and niether you or anyone else wont be able to do anything with it. This is very simple stuff to understand, but to me it seems that you guys are either trolling, or just completely out of touch when it comes to security. Im not sure which is worse.But for that you have to protect you pw manager with a real strong one; as I said above: if that one's gone, all are gone. If I were a hacker, my primary target were password manager's passwords.
Let me apply mer `s logic here. Someone can break into your home, blow your safe with a bundle of dynamite and steal your book where you have your password written. Am i doing this right ?Anyway, before I start to explain I don't see a real risk in writing passwords down, I like to flag up the difference of a machine in a private home with only one user access, or if the machine is in a more public place, like office at work.
Well... aliens can atack tomorow, and all is lost anyway. I mean, seriously man. Can we get back to reality now? Im not talking about government issued equipement with locked down USB ports, no one is going to drug me or cut my fingers. Im talking about simple open source password manager that works offline and can be secured with password, software, or hardware keys. Dont have a yubikey, no problem. Generate a software key, store it on USB drive, and use that. Or simply store it on your drive somewhere, obfuscate the file name, and viola. This is all simple stuff, why are you making this so complicated with all these what if scenarios ?Yep been there. Government/classified systems typically disable USB stuff.
Yubi keys, good stuff, but again, need to have chain of custody. If someone manages to abscond with your Yubi key that is tied to everything else, does that give them 100% access?
Your phone is set to finger/face locked: someone steals your phone, drugs you then can cut off your fingers or use your face to unlock the phone and then reset to their face/finger. Starts to give them access to everything on your phone like banking apps.
Remember how people used to 'steal' ballpoint pens and pencils? Today somebody can mindlessly pick up a USB stick off your desk (instead of a ballpoint pen) and walk away with it. You'd pretty much have to have that stick on a lanyard on you at all times, like your work ID card that you use to unlock the door to your workplace. If you lose that, you're in trouble. I've seen people forget their ID at home, and then realize they can't get into the office to report to work.Well... aliens can atack tomorow, and all is lost anyway. I mean, seriously man. Can we get back to reality now? Im not talking about government issued equipement with locked down USB ports, no one is going to drug me or cut my fingers.
What the hell are you talking about ?Remember how people used to 'steal' ballpoint pens and pencils? Today somebody can mindlessly pick up a USB stick off your desk (instead of a ballpoint pen) and walk away with it. You'd pretty much have to have that stick on a lanyard on you at all times, like your work ID card that you use to unlock the door to your workplace. If you lose that, you're in trouble. I've seen people forget their ID at home, and then realize they can't get into the office to report to work.
You dont need yubikey. Just generate key file. Or dont. Just use master password.Being mindless is kind of the real problem. Mindlessly losing track of your favorite ballpoint pen is one thing. Mindlessly losing track of the Yubikey the same way... that is a disaster, esp. if someone else finds it. Because regaining access to the database that you locked with that 48-character password that is paired with the specific Yubikey. Yubikeys still have a chain of custody. Even if the Yubikey is replaced, someone will still need to override the specific Yubikey ID so that you regain access to that database.
You know how some XBox accounts were tied to the console's serial number? If the console with the correct serial number is irrecoverably lost, that XBox account is good as gone. Yubikey works the same way.
No, the only sane person here is not you, but me. Hopefully sarcasm comes across.Am i the only sane person here ?
Yes I realize my examples are a bit over the top but they are realistic. The basic premise is someone has thought a step ahead of you.Well... aliens can atack tomorow, and all is lost anyway. I mean, seriously man. Can we get back to reality now? Im not talking about government issued equipement with locked down USB ports, no one is going to drug me or cut my fingers. Im talking about simple open source password manager that works offline and can be secured with p
This is exactly what the person with no arguments would say. Please spare me.No, the only sane person here is not you, but me. Hopefully sarcasm comes across.
But frankly, sometimes you just have to see the forest for the trees. Trees alone don't make up a forest.
Oh. Ok. That makes sense. Because i dont hang out with hard-core criminals that chop peoples fingers that makes everything i said completely invalid. I get it now.MrBSD, I can't argue about IT security with you since I'm just a hobbyist user, but looks like you never hung out with actual hard-core criminals, just based on your assessment what's possible/probable. You have no idea how (and what about) those fellas think.
Can we please stop. Please.Yes I realize my exaples are a bit over the top but they are realistic. The basic premise is someone has thought a step ahead of you.
Faces and fingers? I think there are actual examples of that. Your spouse thinks you're cheating, then while asleep uses your finger/face to unlock your phone to find all your deleted texts to the mistress.
Now extend that to how you may be protecting a cache of passwords/passkeys for your banking......
Unfortunately, I'm not trolling. I met people who will not drop a drop of sweat to do (to you unimaginable) things just to for a scoreOh. Ok. That makes sense. Because i dont hang out with hard-core criminals that chop peoples fingers that makes everything i said completely invalid. I get it now.
Please tell me you guys are trolling me. Because, if you dont...my god...
We can. They will not.Can we please stop. Please.
Sorry, that does not survive dictionary attacks.Im done.
Eh, I trust mathI said above: if that one's gone, all are gone. If I were a hacker, my primary target were password manager's passwords.
#!/bin/sh
# pa.sh
# this script saves salted md5 hashes of the trigrams of the password in
# /tmp/db.txt
mk_pat() {
str="$1"
n=${#str}
n=$(($n-3))
pat=""
while [ $n -ne 0 ]
do
pat="${pat}?"
n=$(($n-1))
done
echo "$pat"
}
rm -f /tmp/pwdb.txt
echo "Enter a password that will act as previous password"
read opass
opass="__${opass}__"
SALT="ab22xy"
while [ ${#opass} -gt 2 ]
do
pat=$(mk_pat "$opass")
frag=${opass%$pat}
# echo $frag
echo $SALT$frag|md5 >>/tmp/pwdb.txt
opass=${opass#?}
done
echo "password hashes stored in /tmp/pwdb.txt"
cat /tmp/pwdb.txt
# end of pa.sh
#!/bin/sh
# ra.sh
# this script generates md5 hashes and compare how many match with the saved
# ones
mk_pat() {
str="$1"
n=${#str}
n=$(($n-3))
pat=""
while [ $n -ne 0 ]
do
pat="${pat}?"
n=$(($n-1))
done
echo "$pat"
}
while true
do
egr="bollocks"
echo "Enter a password to check if similar to the older one"
read npass
npass="__${npass}__"
SALT="ab22xy"
while [ ${#npass} -gt 2 ]
do
pat=$(mk_pat "$npass")
frag=${npass%$pat}
# echo $frag
md5=$(echo $SALT$frag|md5)
egr="${egr}|$md5"
npass=${npass#?}
done
cnt=$(egrep -c "$egr" /tmp/pwdb.txt)
[ $cnt -ge 4 ] && echo "to similar" || echo "not similar"
done
# end of ra.sh
[09:38:52] [ns!covacat]~ $sh pa.sh
Enter a password that will act as previous password
bigfatcat
password hashes stored in /tmp/pwdb.txt
14d29e33f92fc415ad59fa306929e5c0
9fbe4900d36df2128cac72146ae198e2
a63cfcba82db39006c435b46ebff2509
1a4e23c143dc77071e321798902b7341
7a26fd75bdb510834b51406915a59f11
4b7279722fe889ed931b0654c27c9f0f
fb7af98b1085862610a0cbac97fcf844
56a7717fe3ba37e7f0264bdb7641d4b8
b26e1913cc4b08dd80b084360fce7ab2
af8a7665d9221f0520fa967f1889b22a
52d69086f573b93e75447e6230a9e952
[09:39:03] [ns!covacat]~ $sh ra.sh
Enter a password to check if similar to the older one
bigfatdog
to similar
Enter a password to check if similar to the older one
secret99
not similar
Enter a password to check if similar to the older one
fatbigcow
not similar
Enter a password to check if similar to the older one
bigcatfat22
to similar
Enter a password to check if similar to the older one
catbigfat
to similar
Enter a password to check if similar to the older one
No. I'm saying protecting your passwords with a password does not increase the strength of those passwords.So you are telling me that if i lock my database with 48 character strong password paired with yubikey, thats less secure than memorizing 20 different passwords which are variation of the same password combined with finger muscle memory.
No.Can you tell me why would you not trust 100% open source software that works offline and its available in freebsd repo ?
those can become a security gap instead.YOU are the problem.
I am neither capable, nor willing to answer that question.Am i the only sane person here ?
There are people using a password manager with a password like "1234" You don't need no brute force software or exploit RAM, or such for to get it. You only need to know that person uses trivial passwords ("social hacking" if you want to name that this way) and try a few.Eh, I trust math