Gentoo Archives: gentoo-user

From: Stanislav Nikolov <stanislav.ltb@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] OpenSSH upgrade warning
Date: Tue, 10 Nov 2015 19:37:13
Message-Id: 5642475E.9050404@gmail.com
In Reply to: Re: [gentoo-user] OpenSSH upgrade warning by Michael Orlitzky
1 On 11/10/2015 09:31 PM, Michael Orlitzky wrote:
2 > On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
3 >>
4 >> On 11/10/2015 09:17 PM, Michael Orlitzky wrote:
5 >>> On 11/10/2015 02:00 PM, Jeff Smelser wrote:
6 >>>> I guess from this your assuming that everyones passwords that
7 >>>> have been hacked are god, birthdays and such?
8 >>>>
9 >>> Again: assume that I'm not an idiot, and that I know how to choose
10 >>> a long, random password. It cannot be brute-forced. And if it
11 >>> could, adding an SSH key encrypted with a password of the same
12 >>> length would provide no extra security.
13 >>>
14 >>>
15 >> Are you sure you know how such keys work? An extremely 15 character
16 >> password (Upper case, lower case, numbers, 8 more symbols) gives you
17 >> ~4747561509943000000000000000 combinations
18 >
19 > And since no one seems to believe me, if you could try a million
20 > passwords a second (over the network!), it would take you about
21 > 75,272,093,955,210 years to try half of those combinations.
22 >
23 >
24 I know that brute forcing a password is hard. I'm not stating the opposite. But brute forcing a 2048 bit key is not 2 times slower, it's 2398748237489237489 times slower. And you don't need a password for a key! I think that's the right time to end this conversation, it won't lead to anything good.