I have to wonder... It _should_ be possible to do "passphrase" attacks just like "dictionary" attacks? How is a "phrase" any different to the character set you can type? Sure there are more possible "words" (at least) in the English language, but I'm not convinced.
I have to wonder... It _should_ be possible to do "passphrase" attacks just like "dictionary" attacks? How is a "phrase" any different to the character set you can type? Sure there are more possible "words" (at least) in the English language, but I'm not convinced.
I have to wonder... It _should_ be possible to do "passphrase" attacks just like "dictionary" attacks? How is a "phrase" any different to the character set you can type? Sure there are more possible "words" (at least) in the English language, but I'm not convinced.
The main benefit of a passphrase is the relative ease at which it is memorized. A good, long passphrase with a couple of special characters thrown in is quite secure. The list of words that you made your passphrase out of might be public, but the attacker probably doesn't know which one you used unless you tell him.
passwords for the most part are dead. high-entropy bit mnemonics are the way.
have a look at the bip-39 spec. theoretically unbreakable given a proper implementation. the caveat is many services don't allow for a
charset > 50
which forces the consumer to reduce entropy bits by way of varchar constraints. while a passphrase or mnemonic with a length of 8 words ie:
red glue seven wifi belief bacon zebra pipe
is rather strong, it's also the sequence of the words that contribute to the breakage. if you were to set prologic builds software that needs some maintainers today
this would be simpler in theory to crack since the progression of words forms a common speech pattern which can be brute forced easier. this would make a good friday call
ultimately they hold nowhere near the benefit of passphrase + MFA
ultimately they hold nowhere near the benefit of passphrase + MFA
A regular passphrase, like taking a random quote from a book is not ideal, perhaps the equivalent to using 'password123'
I switched from using long random passwords like
qayxTW7rr8T95V8b8ZHV4QMHcaTssVqDwEEr3Hzr
to
Ream4-Cope-Daringly-Waving-Likeness-Urchin-Arise
They are easier to type, and have similar entropy (if used correctly)
As @retrocrash says, the real problem is with
allowed_chars <= 50
even for long passwords or simpler passphrases, which is stupid since the hashed password uses the same amount of chars. Perhaps allowing up to 100 or 200 chars is good enough, and maybe rejecting some special characters like emojis, no idea.
dog1234
).and if you have issues with typing, some form of password manager is helpful. unless of course it's your luks partition or something else then you should burn this into the cortex.