Gentoo Archives: gentoo-user

From: Jeff Smelser <tradergt@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] OpenSSH upgrade warning
Date: Tue, 10 Nov 2015 19:38:06
Message-Id: CAGymGEki_ZQ1YX6VUHZA6nwYXaCKYu7Uj1+77_YOMvywVt4tmg@mail.gmail.com
In Reply to: Re: [gentoo-user] OpenSSH upgrade warning by Michael Orlitzky
1 Again, your not understanding that brute force is not entirely how you
2 think it works. As a former employee of a large tech company. They are much
3 more cunning how they do it these days..
4
5 If you wanted to break into an account, would you really start with a and
6 work your way up?
7
8 Come on.
9
10 Accounts are broken into all the time and they claimed their passwords were
11 awesome..
12
13 Your not an idiot, you just need to do more research on how hackers get in.
14
15 On Tue, Nov 10, 2015 at 12:31 PM, Michael Orlitzky <mjo@g.o> wrote:
16
17 > On 11/10/2015 02:23 PM, Stanislav Nikolov wrote:
18 > >
19 > >
20 > > On 11/10/2015 09:17 PM, Michael Orlitzky wrote:
21 > >> On 11/10/2015 02:00 PM, Jeff Smelser wrote:
22 > >>> I guess from this your assuming that everyones passwords that
23 > >>> have been hacked are god, birthdays and such?
24 > >>>
25 > >> Again: assume that I'm not an idiot, and that I know how to choose
26 > >> a long, random password. It cannot be brute-forced. And if it
27 > >> could, adding an SSH key encrypted with a password of the same
28 > >> length would provide no extra security.
29 > >>
30 > >>
31 > > Are you sure you know how such keys work? An extremely 15 character
32 > > password (Upper case, lower case, numbers, 8 more symbols) gives you
33 > > ~4747561509943000000000000000 combinations
34 >
35 >
36 > And since no one seems to believe me, if you could try a million
37 > passwords a second (over the network!), it would take you about
38 > 75,272,093,955,210 years to try half of those combinations.
39 >
40 >
41 >