On Fri, 2005-08-26 at 09:45 +0000, Fernando Meira wrote:
> On 8/26/05, Frank Schafer <[EMAIL PROTECTED]> wrote:
>         IYpi3tbduwbfwm
>         
>         Such a password can't be cracked by brute force.
>         
>         ... and it's easy to remember.
>         
>         If Your password is 3 times better, don't use words brute
>         force won't
>         matter.
> 
> Well.. that just depends on how strong the password was! A brute-force
> attack would get there.. sooner or later!! For being sooner than
> later, the idea was to provide the attack with accurate
> characteristics of the password: number of chars, alphanumeric, upper
> and lower-case.. and such things.. 
> 

Hmmm, I think the example password should be strong enough but You are
right. Sooner or later it will come in (if sooner is something amongst
some hundreds of years and later something amongst some thousands ;)
BTW: There isn't only the password. There are log analyzers too.
Let such an analyzer catch auth failure - say 20 times within less than
half an hour - for root remote, then it can block access from this IP,
if it catches local auth failure for root - 20 times within less than
half an hour - it can logaut the user (kill his login shell) and block
the account. Mine does so. Well, in this case the sooner is something
amongst some millions of years and the later something amongst some
trillions.
... but this already goes into the direction of IDS.

-- 
gentoo-user@gentoo.org mailing list

Reply via email to