Register Guidelines E-Books Search Today's Posts Mark Forums Read

Go Back   MobileRead Forums > Miscellaneous > Lounge

Notices

Reply
 
Thread Tools Search this Thread
Old 03-12-2025, 12:18 PM   #2656
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by ratinox View Post
Once they identify how the salts are generated they can use this to generate custom tables, which is orders of magnitude faster than brute force and doesn't require infinite storage.
It's still the same effort to build the custom table as it is to brute-force a single password - you still have to compute the hashes of all the possible passwords if you want the table to be complete.

Even for a short-ish (10 characters or so) password that takes a lot of compute, particularly if a deliberately compute-intensive hash algorithm (nested hashes, bcrypt etc.) is used.

The point of rainbow tables is that you only have to do that once to attack many passwords with the same hash - you still need to generate a separate table for each salt.

Last edited by jbjb; 03-12-2025 at 12:23 PM.
jbjb is offline   Reply With Quote
Old 03-12-2025, 12:22 PM   #2657
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by ratinox View Post
Once they identify how the salts are generated they can use this to generate custom tables, which is orders of magnitude faster than brute force and doesn't require infinite storage.
I've just reread this, and don't get the point you're trying to make. If you've got hold of the passwd file, or whatever, with the salted hashes, you already know all the salts - they're sitting right there in plain text. What would knowing the salt generation algorithm gain you? (Genuine question!)
jbjb is offline   Reply With Quote
Advert
Old 03-12-2025, 12:27 PM   #2658
ratinox
Guru
ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.
 
Posts: 733
Karma: 10000000
Join Date: Oct 2016
Location: Somewhere in Time
Device: Forma, iPad Mini
Quote:
Originally Posted by jbjb View Post
In any sane environment the salts are generated properly randomly, using a high quality source of entropy. Not something that can be reverse engineered, unless you can spy on the source of entropy.
This is past to the edges of my expertise and experience so I'm not going to say yay or nay to the point (I have implemented hash-based auth but that was a very simplistic system for a POP3 client). But given that hardly a day goes by without another major breach being announced, it appears that doing things correctly is the exception, not the rule.

Quote:
It's always just a matter of time, but if that time is many lifetimes of the universe, we're probably OK.
"If". Attacks always get better, and there are no takesies-backsies.
ratinox is offline   Reply With Quote
Old 03-12-2025, 12:33 PM   #2659
ratinox
Guru
ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.
 
Posts: 733
Karma: 10000000
Join Date: Oct 2016
Location: Somewhere in Time
Device: Forma, iPad Mini
Quote:
Originally Posted by jbjb View Post
I've just reread this, and don't get the point you're trying to make. If you've got hold of the passwd file, or whatever, with the salted hashes, you already know all the salts - they're sitting right there in plain text. What would knowing the salt generation algorithm gain you? (Genuine question!)
Unix password files are well-documented, but any given site like mobileread can do things differently, so an attacker would need to identify that in order to generate usable hash tables. Or to identify a more efficient attack if one exists.
ratinox is offline   Reply With Quote
Old 03-12-2025, 12:36 PM   #2660
Renate
Onyx-maniac
Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.
 
Posts: 3,628
Karma: 15553653
Join Date: Feb 2012
Device: Nook NST, Glow2, 3, 4, '21, Kobo Aura2, Poke3, Poke5, Go6
MD5 itself is not the most brilliant algorithm and it's probably possible to find clashes pretty easily. But the Linux password algorithm MD5Crypt uses 1000 rounds of it, both to hide weaknesses and to make it 1000 times harder to calculate a "rainbow table". Of course time has caught up with this and a million would be a better number.
Renate is offline   Reply With Quote
Advert
Old 03-12-2025, 12:40 PM   #2661
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by ratinox View Post
This is past to the edges of my expertise and experience so I'm not going to say yay or nay to the point (I have implemented hash-based auth but that was a very simplistic system for a POP3 client).
That's more expertise than most! Thanks for the interesting discussion. I hope I haven't come across as too pedantic - I've got a few decades of experience in related fields, and admit I have a tendency to get too picky (as my wife will confirm).

Quote:
But given that hardly a day goes by without another major breach being announced, it appears that doing things correctly is the exception, not the rule.
Nail meet head . By far the most significant issue is weakness in implementation.

Quote:
"If". Attacks always get better, and there are no takesies-backsies.
Agreed.
jbjb is offline   Reply With Quote
Old 03-12-2025, 12:42 PM   #2662
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by ratinox View Post
Unix password files are well-documented, but any given site like mobileread can do things differently, so an attacker would need to identify that in order to generate usable hash tables. Or to identify a more efficient attack if one exists.
That's true, but in most real-world implementations I'm aware of (admittedly, most of which are at the more secure end in terms of requirements) the hashes are not generated solely by an algorithm, but use local (unreproducible) entropy.
jbjb is offline   Reply With Quote
Old 03-12-2025, 12:43 PM   #2663
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by Renate View Post
MD5 itself is not the most brilliant algorithm and it's probably possible to find clashes pretty easily. But the Linux password algorithm MD5Crypt uses 1000 rounds of it, both to hide weaknesses and to make it 1000 times harder to calculate a "rainbow table". Of course time has caught up with this and a million would be a better number.


Bcrypt is your friend.
jbjb is offline   Reply With Quote
Old 03-12-2025, 12:54 PM   #2664
ratinox
Guru
ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.
 
Posts: 733
Karma: 10000000
Join Date: Oct 2016
Location: Somewhere in Time
Device: Forma, iPad Mini
Quote:
Originally Posted by jbjb View Post
That's more expertise than most! Thanks for the interesting discussion. I hope I haven't come across as too pedantic - I've got a few decades of experience in related fields, and admit I have a tendency to get too picky (as my wife will confirm).
Oh, no. Not at all. Security can be messy and complicated and weirdly counter-intuitive.
ratinox is offline   Reply With Quote
Old 03-12-2025, 12:56 PM   #2665
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by ratinox View Post
Security can be messy and complicated and weirdly counter-intuitive.
That is most certainly true!
jbjb is offline   Reply With Quote
Old 03-12-2025, 01:08 PM   #2666
Renate
Onyx-maniac
Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.
 
Posts: 3,628
Karma: 15553653
Join Date: Feb 2012
Device: Nook NST, Glow2, 3, 4, '21, Kobo Aura2, Poke3, Poke5, Go6
Quote:
Originally Posted by ratinox View Post
Security can be messy and complicated and weirdly counter-intuitive.
The experts have finally decided that forcing people to change their passwords periodically is counterproductive.
Renate is offline   Reply With Quote
Old 03-12-2025, 01:10 PM   #2667
ratinox
Guru
ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.
 
Posts: 733
Karma: 10000000
Join Date: Oct 2016
Location: Somewhere in Time
Device: Forma, iPad Mini
Quote:
Originally Posted by Renate View Post
MD5 itself is not the most brilliant algorithm and it's probably possible to find clashes pretty easily. But the Linux password algorithm MD5Crypt uses 1000 rounds of it, both to hide weaknesses and to make it 1000 times harder to calculate a "rainbow table". Of course time has caught up with this and a million would be a better number.
Hash collisions are a problem for general use, but much less so for authentication systems. For example, hardly anyone is going to care if a 10-character password collides with a 100K word novel in their auth system (except for the admin who has to clean up after someone pastes an entire novel into the password field and their system chokes).

And certainly, MD5Crypt has its weaknesses but so did 3DES which it replaced. And so, as expected, MD5Crypt is supplemented or entirely supplanted by stronger algorithms including Blowfish, SHA-256 and SHA-512. These in turn will be supplemented or supplanted by newer algorithms as time and tech progress.

And then the rise in use of multi-step verification (those authenticator apps, often mistakenly called multi-factor authentication). These don't fix the problems with passwords but they do make it more difficult for attackers to compromise. Though this in turn has lead to a rise in MFA/MSV fatigue attacks where an attacker spams the system until the victim hits "yes" or whatever on their app to get it to stop.

TOTP/HOTP apps are not multi-factor. A factor is a unique thing, commonly "something you know" such as your ATM PIN and "something you have" such as your ATM debit card. You cannot access your account without having both factors in your possession. These apps seem like something you have: your phone. But really, they're a variant of something you know since the seeds for these are entirely independent of the device -- they're information rather than the device itself. While multi-step is marginally weaker than multi-factor, it's still a big step up from plain login/password auth.
ratinox is offline   Reply With Quote
Old 03-12-2025, 01:12 PM   #2668
jbjb
Somewhat clueless
jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.jbjb ought to be getting tired of karma fortunes by now.
 
Posts: 770
Karma: 9545975
Join Date: Nov 2008
Location: UK
Device: Kindle Oasis
Quote:
Originally Posted by ratinox View Post
Unix password files are well-documented, but any given site like mobileread can do things differently, so an attacker would need to identify that in order to generate usable hash tables. Or to identify a more efficient attack if one exists.
Sorry for reopening this, but it's clear I haven't made my point well.

The point is that:
  • generating the rainbow table for a particular salt is about the same effort as brute-forcing one password
  • hence, the point of rainbow tables is that the table can be used against multiple passwords if they use the same salt (i.e., in the real world, if they're unsalted)
  • whether you know the salt through reverse-engineering the salt-generating algorithm or from reading it from a hacked file, you still need a table specific to that salt
  • based on all the above, for a properly salted system you're basically back to brute-forcing each password

Last edited by jbjb; 03-12-2025 at 01:15 PM.
jbjb is offline   Reply With Quote
Old 03-12-2025, 01:13 PM   #2669
ratinox
Guru
ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.
 
Posts: 733
Karma: 10000000
Join Date: Oct 2016
Location: Somewhere in Time
Device: Forma, iPad Mini
Quote:
Originally Posted by Renate View Post
The experts have finally decided that forcing people to change their passwords periodically is counterproductive.
To be fair, security experts have know and advocated this for decades. It's just taken that long for the NIST to catch up.
ratinox is offline   Reply With Quote
Old 03-12-2025, 01:26 PM   #2670
ratinox
Guru
ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.ratinox ought to be getting tired of karma fortunes by now.
 
Posts: 733
Karma: 10000000
Join Date: Oct 2016
Location: Somewhere in Time
Device: Forma, iPad Mini
Quote:
Originally Posted by jbjb View Post
Sorry for reopening this, but it's clear I haven't made my point well.

The point is that:[LIST][*]generating the rainbow table for a particular salt is about the same effort as brute-forcing one password[*]hence, the point of rainbow tables is that the table can be used against multiple passwords if they use the same salt (i.e., in the real world, if they're unsalted)
No, I get it. If salts are random/unique for each hash then there's no practical difference between direct brute force and generating a unique rainbow table for that hash, except that brute force should be faster. Rainbow tables are useful against unsalted hashes or when salts are reused. Then you get two or more for the price of one.
ratinox is offline   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
The Vent and Rant Thread TadW Lounge 38118 Today 09:19 AM
Query about moderation in the Vent & Rant Thread. Hitch Feedback 14 07-16-2016 05:05 PM
Seriously thoughtful why did the vent and rant thread get moved? kindlekitten Lounge 10 04-05-2011 04:47 PM


All times are GMT -4. The time now is 10:06 AM.


MobileRead.com is a privately owned, operated and funded community.