What have you considered as a password management process/program?
What password manager do you use?
--
Russ Crawford
615/506-4070
--
You received this message because you are subscribed to the Google Groups "NLUG" group.
To post to this group, send email to nlug...@googlegroups.com
To unsubscribe from this group, send email to nlug-talk+...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/nlug-talk?hl=en
* 8 - 16 chars
* The password must contain characters from ALL of the following character sets:
1. abcdefghijklmnopqrstuvwxyz
2. ABCDEFGHIJKLMNOPQRSTUVWXYZ
3. 0123456789
4. ~!@#$%^&*()_+-=;./[]{}><,./?
* must change the password every 365 days
* If you already have a password, when you go to change it, it cannot
match any of your 10 previous passwords
* password cannot contain 3 consecutive letters from your login
* password cannot contain your login in reverse
>
> What have you considered as a password management process/program?
gpg symmetrically encrypted file with a really long passphrase >= 20 chars.
> --
> You received this message because you are subscribed to the Google Groups "NLUG" group.
> To post to this group, send email to nlug...@googlegroups.com
> To unsubscribe from this group, send email to nlug-talk+...@googlegroups.com
> For more options, visit this group at http://groups.google.com/group/nlug-talk?hl=en
>
--
" ' With the first link, the chain is forged. The first speech
censured, the first thought forbidden, the first freedom denied,
chains us all irrevocably.' Those words were uttered by Judge Aaron
Satie as wisdom and warning... The first time any man's freedom is
trodden on we’re all damaged." - Jean-Luc Picard, quoting Judge Aaron
Satie, Star Trek: TNG episode "The Drumhead"
- Alex Smith (K4RNT)
- Sterling, Virginia USA
What password manager do you use?
We required 10 to 20 character names with at least one upper case, and
lower case, one number, and one special symbol. We also used the
online system spell check dictionary to make sure no direct dictionary
attack would work.
We also didn't allow 'keyboard strings' like asdf or poiu and
recognized them as 'words'.
But we also had LOTS of complaints from customers. =;0) [yes, we had
to loosen up once management made it a requirement and we made our
point about them not wanting security... some of us never stop tilting
at windmills...]
For reasonable passwords, I normally suggest as minimums, one upper,
one lower, one number and least 7 characters long, and allow non-space
special characters.
The password checker we used was effectively a bourne shell with using
grep where we checked the paswords before sending them to crypt to
turn them into passwords.
I am sure that is NOT how things are done today, but then again
dinosaur's roamed the halls of data centers 'back when'.
><> ... Jack
Whatever you do, work at it with all your heart... Colossians 3:23
On Tue, Apr 26, 2011 at 9:29 AM, Russ Crawford
<russ.m....@gmail.com> wrote:
Our systems group had 3 people in it, so we used our license tags.
After a few years none of us had those car tags anymore, but we kept
the passwords. Only 6 characters of 3 numbers and 3 upper case
characters each. But we never had a breach. :)
My was 182AWQ (read), others were SGN905 (write)
--
I always use password safe.
http://passwordsafe.sourceforge.net
I have used it for 5 years now and have even put the encrypted password file in my dropbox so I can use it with the passwdsafe android app on my phone as well, being able to access it no matter where I go has been very useful. There are also compatible ports for many Linux distros too.
Our password security requirements, since we're dealing with students, faculty and administration folks:Must contain at least one upper case, lower case and numberMust be at least 6 characters in length.It doesn't sound all that impressive, but I can recount the tale of a former highly placed administrative person who, until the imposition of new password security measures, used the password "blouse". Jack the Ripper would simply yawn.Our passwords must be changed approximately twice a year, and the change system automatically rejects unacceptable passwords, including checking for similarity to first name, last name, user name and the most recent password. Passwords may not be reused for at least a year.Curt
that's the one I posted earlier, the difference I added that I would
use would be to require all 4 classes of characters rather than three.
Like pretty much all of you, I have a scadgillion
accounts/usernames/passwords. Well, maybe not quite that many.
NOTE: scadgillion is greater than the US national debt times the number
of stars in the Milky Way. Yes, I made that up.
I should have asked what software to use to track and maintain accounts
and their associated usernames and passwords.
Or is a web-based solution your preferred approach?
Obviously I want an open-source solution that can be used on a Linux
computer. Cross-platform would be real nice.
I hope that is a better specification of what I seek.
--
Russ Crawford
615/506-4070
Chris
> --
> You received this message because you are subscribed to the Google Groups "NLUG" group.
> To post to this group, send email to nlug...@googlegroups.com
> To unsubscribe from this group, send email to nlug-talk+...@googlegroups.com
> For more options, visit this group at http://groups.google.com/group/nlug-talk?hl=en
>
--
Chris
Password rules are a balance in trying to be complex enough to challenge automated password breakers, but not so complex as to require the end use to write it down, simply to remember it.
But hey to each there own.
http://www.webupd8.org/2010/07/best-linux-password-manager.html
Comments, analyses or critiques?
--
Russ Crawford
615/506-4070
Chris
Sent from my iPhone
Rich
I second this. Actual security will rise along with password
complexity to a certain point, after which security drops off
precipitously as complexity rises. That drop off point corresponds to
the place where people start leaving the password on a sticky note
attached to their monitor.
People who use the very complex password schemes mistakenly think that
their only enemy is someone with a password cracking program, when in
fact the vast majority of intrusions are social in nature.
Michael
--
Michael Darrin Chaney, Sr.
mdch...@michaelchaney.com
http://www.michaelchaney.com/
This part doesn't make sense any more. Time limits were originally
instituted at a time when password hashing was not nearly as advanced,
and the time limit was half of the time that it would take to brute force a
password. Now that a brute force attack will require decades for MD5-based
hashes, and millennia for SHA-based hashes, a password time limit simply
isn't an effective means to security. The only time when you should force a
change to a password is when you suspect it may have been compromised.
--
Tilghman
there's an osx version too:
features : never talks on the network . there's even a mobile version .
and you can aes encrypt the db file on disk . builtin passwd generator .
--timball
--
GPG key available on pgpkeys.mit.edu
pub 1024D/511FBD54 2001-07-23 Timothy Lu Hu Ball <tim...@tux.org>
Key fingerprint = B579 29B0 F6C8 C7AA 3840 E053 FE02 BB97 511F BD54
I think this is why the OP asked about encrypted password managers such as keepass and password safe. These programs allow you to use very complex passwords by maintaining an encrypted datanbase that only you have access to. In all truthfullness, even writing down passwords on paper is far more secure than using a "secure" password like "*Koobface01" on your Facebook account what with the GPU password cracking techniques out there... IF you can keep the paper physically secure.
If you're using Mac OS X, you can use the keychain to do this well
(Keychain Access in Utilities).
howtogeek posted and article today that is basically the same question! ...
And they came up with basically the same answers. ... Imagine that.
><> ... Jack
Whatever you do, work at it with all your heart... Colossians 3:23
"You don't manage people; you manage things. You lead people."
"It’s easier to ask forgiveness than it is to get permission" — Grace
Hopper, US Navy Admiral
... because.... ???
:-)
JMJ
Well, the default setup for Keychain Access doesn't force you to reenter
the keychain password on a regular basis, but that default can be modified.
Another possible problem is that Keychain Access uses 3DES as its
encryption algorithm, which, at 112-bit strength, isn't as secure as other
algorithms available today. Of course, if your passphrase protecting the
keychain is less than 16 characters long, it's likely that it's even less
secure.
Of course, the other side of security is how willing you are to give up
your password to a big guy with a cigar cutter threatening to cut off your
fingers (or worse). All the strength of an algorithm doesn't amount to a
hill of beans if you can be convinced to give up your password.
--
Tilghman
The fact that it's encrypted with fairly strong encryption. But,
frankly, you're the one who made the simple unsubstantiated claim that
it's "insecure", so the burden of proof is on you to show us why it's
insecure. Good luck.
Michael
--
Michael Darrin Chaney, Sr.
I have no experience with the keychain on ANY OS. I was neither
agreeing nor disagreeing with you. My intention was to provide you with
an opportunity to explain why you feel that it is insecure.
JMJ
hahahahaha
yeah keepassx FTW !!!
Lol this is why I will stick with dropbox and passwordsafe!