|
Message-ID: <056301ce8c02$0b9db070$22d91150$@edu> Date: Sun, 28 Jul 2013 22:19:23 -0400 From: "Matt Weir" <cweir@...edu> To: <john-users@...ts.openwall.com> Subject: RE: Joseph Bonneau- The Science of Guessing Luckily you'll get the short version since I'm frantically getting ready, (aka panicking), for Passwords^13 and Defcon ;p Basically Bonneau's team worked with Yahoo to set up proxy servers in front of several Yahoo authentication servers so they could observe real user passwords. There was a lot of work to properly anonymize the data and protect the users. The plus side is his group was able to see real password usage in the wild. The downside is he was looking at how "common" passwords were, but he didn't have access to the real passwords. So he could see that 10001 users picked a particular password but he couldn't see what that password was. That's why when reading the paper you'll see stuff about overlap between different groups, or how effective a perfect attack is, but not about how the actual attack is structured. The high points: The most common password occurred 1.08% of the time Users who voluntarily change their passwords more often tend to have stronger passwords Users who use e-mail resets for forgotten passwords tend to have weaker passwords RockYou is still a pretty good training set for online passwords Tailoring attacks to the target, (gender, language, etc), when you are aiming for the weakest passwords doesn't help that much. It does matter though as you try to crack a higher percentage of passwords though. A good chunk of the paper was trying to estimate "guessing entropy". That would require a lot more time to explain than I have, and quite honestly there's still some parts of his work that I still don't fully understand. Long story short though, the idea of "password strength" is still a fairly nebulous concept that people are trying to define since it depends so much on the attacker's strategies. I'm really hoping he shows up as Password^13 so I can ask him questions in person ;p Matt -----Original Message----- From: kzug [mailto:kzug10@...il.com] Sent: Sunday, July 28, 2013 4:24 PM To: john-users@...ts.openwall.com Subject: Re: [john-users] Joseph Bonneau- The Science of Guessing Shall we ask Matt W. for a translation in plain english? (for us mortals) :) On SundayJul 28, 2013, at 4:13 PM, Patrick Mylund Nielsen wrote: > On Sun, Jul 28, 2013 at 1:03 PM, Rich Rumble <richrumble@...il.com> wrote: > >> I have no idea what I just "read", but it won an RSA Science of >> Security Competition >> >> http://www.jbonneau.com/doc/B12-IEEESP-analyzing_70M_anonymized_passw >> ords.pdf It outlined a wide range of attacks, even gender based ones! >> Hadn't thought of that one... however I didn't see any mention of >> di/trigraphs. But in my defense if they were, my eyes were bleeding >> and my brain hemorrhaged, I'm feeling much better now :) -rich >> > > It also won an NSA award for best academic cybersecurity paper: > http://www.lightbluetouchpaper.org/2013/07/19/nsa-award-for-best-scien > tific-cybersecurity-paper/
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.