home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   PUBLIC_KEYS      Public-Key Discussion Echo      845 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 837 of 845   
   August Abolins to Wilfred van Velzen   
   self-managed passwords with gpg   
   04 Feb 26 22:26:00   
   
   MSGID: 2:221/1.58@fidonet 291e37d8   
   REPLY: 2:280/464 69820dbf   
   PID: OpenXP/5.0.64 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0500   
   Hello Wilfred!   
      
   ** On Tuesday 03.02.26 - 15:54, you wrote to me:   
      
    AA>> Nothing about the formula is predictable.  Only I know it.  It's only   
    AA>> in my head.  And.. depending on the circumstances for pw changes by   
    AA>> some sites, even the tweeking follows a pseudo "rule".   
      
    WvV> How long are your passwords? Do they have pronouncable words/parts?   
      
   Length can vary, depending on the formula output for each "part".      
   Pronouncable words are a choice. Pronouncable or not doesn't really matter if     
   the whole sum of parts makes no "sense".   
      
      
    AA>> So.. as an example, a random phrase that is only meaningful to you,   
      
    WvV> When it's meaningful it's not random! ;-)   
      
   It's random in the sense that it can't be associated/findable with anything     
   else in print.   
      
      
    AA>> add some other uniqueness in some other way that only you know, and   
    AA>> you have a pw that no one could guess,   
      
    WvV> "No one" isn't the problem. It's the automated password guessers that   
    WvV> are your adversaries. And they can try thousands or probably milions of   
    WvV> passwords in a second, and do that in a smart way.   
      
   The automation doesn't matter. The front-ends for password entry would slow     
   down rapid attempts anyway.  No site would allow any of those millions of     
   passwords in one second. Login attempts are limited per minute or max out     
   after a handful of tries.   
      
      
    AA>> and it's something you can recover with only the technology of your   
    AA>> brain.   ;)   
      
    WvV> Can you give an example for a ficticious website (without revealing your   
    WvV> formula of course)?   
      
   Sure.   
      
   Think of it in 4 or 5 parts:   [A] [B] [C] [D] [E]   
      
   Part [A] would be something meaningful to you for the particular site/    
   service: eg. for FictitiousWebsite.com, think of "formula" for it,   
   say.. FW, or ficweb, or just use the first 3 or 6 consonants, or the vowels,     
   or the consonants for the first word, and vowels for the second word. The     
   possibilities to encode that are limited to the imagination, but just stick     
   to an encoding scheme that you like - and that will make it easy to remember     
   when you need it.   
      
   Part [B] could be a string of 4 to 8 numbers that are only meaningful to you,     
   and you can even append a encoded number to that based on the string of chars     
   you used for part [A].  How you encode it is up to you. eg. a simple ROT     
   function, some part of pi, or a combo of 4 numbers from one credit card and     
   the 4 numbers of another credit card [the latter credit card example is     
   something you can always look up if you can't remember that].   
      
   Part [C] could be reserved for one or more special characters that most     
   systems often require.  So, pick some special char or sequence of chars that     
   you like and that would make sense to you. You could even pick the special     
   char based on the string of chars you ended up for part [A], so that [C] is     
   always different from site to site.   
      
   Part [D] could be reserved for a couple of short silly words that can also be     
   processed to make them look less like obvious words. How you process them or     
   not is up to you.   
      
   Parts [A] [B] [C] [D] could be in any order you like.   
      
   Figure out something else for part [E] which could be another function of any     
   of the other parts.   
      
   As a whole, the result will be a pretty fine pw string that only you knew how     
   to construct, and can reconstruct when you need it.   
      
   --    
     ../|ug   
      
   --- OpenXP 5.0.64   
    * Origin: What do you call an excavated pyramid? Unencrypted. (2:221/1.58)   
   SEEN-BY: 50/22 103/705 105/81 106/201 124/5016 128/187 153/757 7715   
   SEEN-BY: 154/10 30 110 203/0 218/700 221/1 6 226/30 227/114 229/110   
   SEEN-BY: 229/112 134 206 317 400 426 428 470 664 700 705 240/1120   
   SEEN-BY: 240/5832 266/512 280/464 5003 5006 291/111 292/854 8125 301/1   
   SEEN-BY: 310/31 320/219 322/757 341/66 234 342/200 396/45 423/81 120   
   SEEN-BY: 460/58 256 1124 633/280 712/848 770/1 902/26 5020/400 8912   
   SEEN-BY: 5054/30 5075/35   
   PATH: 221/1 280/464 460/58 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca