--
You received this message because you are subscribed to the Google Groups "cap-talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cap-talk+unsubscribe@googlegroups.com.
To post to this group, send email to cap-...@googlegroups.com.
Visit this group at https://groups.google.com/group/cap-talk.
To view this discussion on the web visit https://groups.google.com/d/msgid/cap-talk/098a4d4f-197a-4c0a-94b1-c09a1cc600a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
To get myself from the insecure password hell of sometimes using unique passwords for whole classes of websites without having to resortto the other hell of password vaults, I wrote myself a tiny bit of python and javaScript in order to help me out that I think might be useful andan interesting use case for BLAKE2 for creating a directional tree of sparse capabilities, usernames and passwords.
Looks analagous to supergenpass, which has been around in various
forms at least as far back as 2014.
PwdHash has two problems. There’s no way to deal with funky password rules. More importantly, it uses the domain name in the hash, so there’s no way to change just one password.
SitePassword only keeps state of minor security value, basically your userID, nickname for the site, and parameters needed for the password rules. I was working on a version that synchronized this state across machines until Facebook decided to kill Parse. Meanwhile, I keep this information on my web site in case I need to log in from a new machine.
My site info is not encrypted. I’m assuming that a bad guy can guess my userID and nickname for a given site. What I’m hoping the bad guy can’t guess is my master password.
> Tony Arcieri <bas...@gmail.com> wrote:
> I'm saying the threat is equivalent to the encrypted state of most password managers (an attacker has to be able to guess your password for it to be useful), so why not just use an encrypted vault?
>
> The benefit of an encrypted password vault is you can store much richer information about a particular site. Many sites have more than one password, might have security questions, those security questions might be multiple choice so if you want to get around the stupidity of security questions you have to pick random answers, etc e.g. https://twitter.com/bcrypt/status/698265259962822656
>
> A stateful deterministic password manager cuts you out of this sort of utility. You also can't use it to store things like encryption keys which aren't similarly derived deterministically from a password.
>
> And the coup de grace: you can't easily change your master password.
All true, but there’s an offline attack if the bad guy gets your encrypted file, which happened when LastPass got hacked. You’d have to use your stateful deterministic password manager to log into the bad guy’s site before facing the same risk. Besides, there’s nothing to say that you can’t use one master password for high value sites, such as banking, and another one for low value sites, such as newspaper subscriptions.
pass = pk2pass(PK,repository->getsitepwtweaks(domain))
On Wed, Nov 16, 2016 at 12:53 AM, Rob Meijer <pib...@gmail.com> wrote:To get myself from the insecure password hell of sometimes using unique passwords for whole classes of websites without having to resortto the other hell of password vaults, I wrote myself a tiny bit of python and javaScript in order to help me out that I think might be useful andan interesting use case for BLAKE2 for creating a directional tree of sparse capabilities, usernames and passwords.This is probably the 10th deterministic password generator I've seen someone announce this year.They have three fatal flaws:1) If the generated password doesn't conform to the site's password policy, you have to "tweak" the generated password to comply
2) If a password is ever exposed (e.g. accidentally pasted into IRC/Slack/Twitter or what have you) you need at least some sort of per-site counter you can bump to get a new password
3) You can't change your master password without changing every other password