Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Dylan16807
May 12, 2010

Khablam posted:

Right.
And because the only way you or I are getting attacked is by a system compromise (evil men in black clothes aren't coming in through your skylight), its a moot point where the keyfile is saved. If the malware is after keypass, it'd be something like
- monitor for launch of keepass.exe
- observe keystrokes
- observe file access, copy recent access
- done

It literally does not matter if you pulled that file off the desktop or fort knox. Also, no one gaining physical access to your machine is going to care to hunt for your keyfile manually, because they need your password as well. And because physical access = complete access = admin level malware = the exact scenario above.

I'd even argue that if the attacker is say, an abusive spouse, then they're going to be more likely to know where the keyfile is if it's in a safe than just an arbitrary file on the disk and be able to socially engineer access to that easier than they'd find the right file without specialist IT knowledge.

KP's best practices are not wrong, they're just speaking about a threat model that's not applicable here and it also assumes other mitigation strategies are being used before where the file physically is kept, matters at all. In such cases its also not a keyfile you want to use, because mitigation against having that file copied on-read is always insufficient or prohibitively invasive. You would use something where the physical location of the item does matter, e.g. a Yubikey.

e: I'd point out as much as they do talk about how to use a keyfile, they also don't even go so far as to suggest it as a default option. They know it's security theatre that's orders of magnitude more likely to get someone locked out of a vault than keep someone out.

We started off talking about storing the database on dropbox, right? There's a good chance a cloud storage company or my cloud storage account gets compromised without my desktop getting compromised.

So while there's no need to separate the database and keyfile on my desktop, there's a good reason not to put the keyfile in dropbox. And I shouldn't use one of 20k photos sitting in my google photos backup either.

(Side note, don't use something on google photos anyway because they recompress files and change metadata and do other things that will make it suddenly stop working as a key file.)

Adbot
ADBOT LOVES YOU

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Storm One posted:

Sure, but the point stands, unless you're confident that:

1) you'll never get confused about what and where the punctuation is, and

2) you'll never type your passphrase in a different locale than your current one (do you know where the comma and question mark keys are in a french keyboard layout?)

are both true, then you're better off rejecting any characters other than lowercase ASCII letters in your master password.

Re: #2 that is quite the self-threat model.

VictualSquid
Feb 29, 2012

Gently enveloping the target with indiscriminate love.

Ynglaur posted:

Re: #2 that is quite the self-threat model.

It is more likely then you think.
Having to google where the various symbols are on an us layout to login after you screwed up your keymaps in some update is seriously annoying. Especially if you have problems remembering your password without the muscle memory.
Hasn't happened to me again since I stopped using gentoo, at least.

RFC2324
Jun 7, 2012

http 418

Storm One posted:

Sure, but the point stands, unless you're confident that:

1) you'll never get confused about what and where the punctuation is, and

2) you'll never type your passphrase in a different locale than your current one (do you know where the comma and question mark keys are in a french keyboard layout?)

are both true, then you're better off rejecting any characters other than lowercase ASCII letters in your master password.

I'm going to say that 2 applies to basically every password, unless you are advocating against the use of special characters.

And point 1 is an argument against strong passwords of any type.

"But what if your are a blind quadruple amputee, what then? :smug:"

Storm One
Jan 12, 2011

RFC2324 posted:

unless you are advocating against the use of special characters.
I definitely am.

It's OK to use them in web logins that are kept in a password manager and never typed by a human but for a master password and any other really important ones, the ones that should be written down on paper and never updated, lowercase ASCII letters only is the way to go.

Encryption is a fantastic way of locking oneself out of important data when it's most needed.

RFC2324 posted:

And point 1 is an argument against strong passwords of any type.
What? You don't need punctuation or any special characters for strong passwords, you need high entropy.

If an entropy estimator has a ceiling for strictly alphabetic passwords, it's plainly broken. But enough bike-shedding from me.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


VictualSquid posted:

using gentoo

This may be more of a contribution to your difficulties than anything you do to set up your password :P

Saukkis
May 16, 2003

Unless I'm on the inside curve pointing straight at oncoming traffic the high beams stay on and I laugh at your puny protest flashes.
I am Most Important Man. Most Important Man in the World.
If punctuation is required, then "." seems to be the safest choice. But they are to be avoided unless you can be sure you will never end up in unusual situation.

Just this week my coworker was in trouble inside VMware console where he was unable to produce "=". At the same time my own hell was IPMI and IP-KVM consoles where it was impossible to type "$" using finnish keyboard layout. So I decided to fallback to US layout. Funny thing is, that IP-KVM also occasionally has a problem where key gets stuck and repeats dozen or couple times. So I type 'setkmap', press enter and it gets stuck. And setkmap selects the first choice. After the enter got unstuck I find out my keyboard is now producing completely random characters. After a lot of trial and error I figure out I can run the setkmap command again by typing "ödkvmar". Turns out I was using ANSI-dvorak.

RFC2324
Jun 7, 2012

http 418

I would never be typing my passphrase in that situation anyway. Passphrases are for opening the vault with the real passwords, and so will never be subject to console wonkyness.

Consoles use passwords out of pwgen or similar that actually are random, in accordance with company policy.

Also helps to be in america where only idiots fiddle with they keymaps, and if its wonky on your production server then you have a bit of a problem

Carbon dioxide
Oct 9, 2012

RFC2324 posted:

Also helps to be in america where only idiots fiddle with they keymaps, and if its wonky on your production server then you have a bit of a problem

If you work in tech and you don't have at least one idiot coworker who insists in changing everything to dvorak at every available opportunity you haven't lived.

Evis
Feb 28, 2007
Flying Spaghetti Monster

Why are you typing in your passwords on other people’s computers?

Rooted Vegetable
Jun 1, 2002
We're spiraling towards "Dicewear passwords would be more secure if you use ten d20 dice on word lists in a language you alone can speak. Literally a new fully functional language no other soul knows."

alexandriao
Jul 20, 2019


this thread is so off track it's currently halfway to the earth's mantle

RFC2324
Jun 7, 2012

http 418

alexandriao posted:

this thread is so off track it's currently halfway to the earth's mantle

Whee!

We gonna ride this thing straight to hell, y'all!

Rooted Vegetable
Jun 1, 2002
What did people use for passwords for The Core?

DerekSmartymans
Feb 14, 2005

The
Copacetic
Ascetic

Rooted Vegetable posted:

We're spiraling towards "Dicewear passwords would be more secure if you use ten d20 dice on word lists in a language you alone can speak. Literally a new fully functional language no other soul knows."

This has already happened Agee years ago. Some private server for Trek site (so probably child pornography) was compromised in a hack. The hacker got in and simply guessed the pwd because it was a relatively “common” phrase in Klingon. Used to wait to see a GoT site about E. Clarke’s boobs get hacked in High Valyrian. Much less chances to name/protect your stuff in Or’zet (the fictional ork/troll language in the fictional future in Shadowrun that has been alluded to but never fleshed out).

RFC2324
Jun 7, 2012

http 418

DerekSmartymans posted:

This has already happened Agee years ago. Some private server for Trek site (so probably child pornography) was compromised in a hack. The hacker got in and simply guessed the pwd because it was a relatively “common” phrase in Klingon. Used to wait to see a GoT site about E. Clarke’s boobs get hacked in High Valyrian. Much less chances to name/protect your stuff in Or’zet (the fictional ork/troll language in the fictional future in Shadowrun that has been alluded to but never fleshed out).

well, none of these examples actually took the step of "a completely new language no one else knows" so are obviously not strong enough

also, maybe don't use klingon for your trek site password, thats just obvious. use loving Khuzdul

DerekSmartymans
Feb 14, 2005

The
Copacetic
Ascetic

RFC2324 posted:

well, none of these examples actually took the step of "a completely new language no one else knows" so are obviously not strong enough

also, maybe don't use klingon for your trek site password, thats just obvious. use loving Khuzdul

Agreed. Or’zet is only a “named” alt language right now, though. I’m sure someone could make up an alphabet for it and slowly build words and grammar rules based on that. Then share with Trolls and Orks—-like the Army did with Navajo.

doctorfrog
Mar 14, 2007

Great.

Here's your runic password generator https://watabou.itch.io/rune-generator
To use it, scratch your password into your skin with a fingernail, and hold it up to the webcam. Your unique skin texture and password will open your computer-thing.
Please use the disposable sloughing pad to remove the password from your skin after use, for added security.

Saukkis
May 16, 2003

Unless I'm on the inside curve pointing straight at oncoming traffic the high beams stay on and I laugh at your puny protest flashes.
I am Most Important Man. Most Important Man in the World.

Rooted Vegetable posted:

We're spiraling towards "Dicewear passwords would be more secure if you use ten d20 dice on word lists in a language you alone can speak. Literally a new fully functional language no other soul knows."

Surprisingly this sort of has been done. "pwgen" that RFC mentioned creates random password, but you will notice patterns in them. The passwords sem to be based on words, but these are made up words designed so they are bit easier to remember and type. You would be amazed how easy it is to remember these completely nonsensical passwords.

Oysters Autobio
Mar 13, 2017
I've been enjoying the debate about threat models and levels, and lots of discussions here about risk models, threat models, measuring cost/benefit and likliehood etc. but other than just a walk-through rule of thumb, is there an actual documented methodology one could use to actually properly threat model your stuff?

also, is anyone familiar with Pushbullet? I've been using it after randomly searching for an easy way to Right Click -> Send to Phone dumb memes I want to share on my whatsapp, signal or instagram groups but I recently realized I was seeing my messages pop up and thought "Wait, isn't the point of signal/whatsapp for E2E encryption but this is sending it over clear?". It has apparently an E2E setting which I've setup with a password, but it just doesn't work (I only receive a "encrypted data received" pop up which is fine).

Literally my only use is the dumb meme push thing (I don't care about monitoring my phone or replying using my computer, I can just use my phone). Is there a more secure option for this?

tuyop
Sep 15, 2006

Every second that we're not growing BASIL is a second wasted

Fun Shoe

Oysters Autobio posted:

I've been enjoying the debate about threat models and levels, and lots of discussions here about risk models, threat models, measuring cost/benefit and likliehood etc. but other than just a walk-through rule of thumb, is there an actual documented methodology one could use to actually properly threat model your stuff?

also, is anyone familiar with Pushbullet? I've been using it after randomly searching for an easy way to Right Click -> Send to Phone dumb memes I want to share on my whatsapp, signal or instagram groups but I recently realized I was seeing my messages pop up and thought "Wait, isn't the point of signal/whatsapp for E2E encryption but this is sending it over clear?". It has apparently an E2E setting which I've setup with a password, but it just doesn't work (I only receive a "encrypted data received" pop up which is fine).

Literally my only use is the dumb meme push thing (I don't care about monitoring my phone or replying using my computer, I can just use my phone). Is there a more secure option for this?

I guess, uh, why do you need to protect this?

I think this could be more secure but I’m not sure: People frequently use cloud folders for this, like a synced Dropbox folder on PC where you put the memes and the Dropbox app on your phone from which you share them.

RFC2324
Jun 7, 2012

http 418

I'm going to second the question of why you need your memes secured. Are you afraid of people stealing them?

Oysters Autobio
Mar 13, 2017

RFC2324 posted:

I'm going to second the question of why you need your memes secured. Are you afraid of people stealing them?


tuyop posted:

I guess, uh, why do you need to protect this?

I think this could be more secure but I’m not sure: People frequently use cloud folders for this, like a synced Dropbox folder on PC where you put the memes and the Dropbox app on your phone from which you share them.

Sorry I didn't explain my use-case well here.

I'm not worried about my memes security (though maybe I should consider that...:ninja:), it's the fact that I only use pushbullet for sending memes or funny/interesting articles I find on my computer back to my phone or vice versa (and I like the integration because after I "push" something between devices it's one click away from the share button on my smartphone) but that Pushbullet also fully mirrors all of my conversations/SMS etc. onto my desktop which is a feature I don't need and I wonder if I'm unnecessarily exposing really basic security risks (doesn't it defeat the purposes of E2E on whatsapp/signal if my convos are being forwarded in the clear through Pushbullet's servers then to mine?).

My question is (1) Is there a better/more secure method I should consider for my use-case (sending non-sensitive links/images between my computer and phone with an integrated app that doesn't fully mirror my messaging apps)). I feel like there must be an obvious app here that doesn't add unnecessary and potential harmful features.

RFC2324
Jun 7, 2012

http 418

Is there a PC app for the messenger? Signal has one, iirc

Oysters Autobio
Mar 13, 2017

RFC2324 posted:

Is there a PC app for the messenger? Signal has one, iirc

I'd preferrably like one that can push it direct to my phone that I can then just share to my Google Pixel's share function (which then opens up all the other messenger apps) instead of needing multiple PC apps for multiple Android apps (I sort of have a number of different groups split between Signal, whatsapp and Instagram). I also do like the history function in Pushbullet so I can go back and see previously "pushed" links and images and re-share them.

I've enabled the E2E Encryption option in Pushbullet but I'm not sure if it works because even after entering in the same password for both sides (PC and phone) if it works because when I've set it up it's not actually opening up my messages (it just shows me I have a new encrypted message on my phone and to enter my password, and when I click on it it opens up my settings where the password goes and even after entering it multiple times it keeps on doing the same thing).

Khablam
Mar 29, 2012

RFC2324 posted:

Is there a PC app for the messenger? Signal has one, iirc
Google chat/messages does, so does whatsapp, signal and telegram

Oysters Autobio
Mar 13, 2017
Curious to know if this is actually dumb or I'm overinflating the existing security of e transfers to begin with, or I'm clutching pearls over nothing.

My bank started doing 2FA for confirming etransfers (which is good, right?), but instead of just sending a code on SMS they send the entire details of the transfer in the message "Enter code XXXXX now to send $3333 via e-transfer to Jimmy BEANS".

I mean, I guess they want to do this so you can confirm that its a legitimate 2FA SMS, but isnt sending the details of the whole transfer over SMS sort of problematic because its all in plain text? I know this is a sort of generic pearl clutching over privacy and without a real threat model or anything but I recall hearing lots of issues with SMS security these days.

Less Fat Luke
May 23, 2003

Exciting Lemon
The biggest thread around SMS is how easy it is for someone else to walk into Rogers or whatever, pretend they're you and walk out with a SIM so I don't think the details in the SMS are that bad.

Fruits of the sea
Dec 1, 2010

Oysters Autobio posted:

Curious to know if this is actually dumb or I'm overinflating the existing security of e transfers to begin with, or I'm clutching pearls over nothing.

My bank started doing 2FA for confirming etransfers (which is good, right?), but instead of just sending a code on SMS they send the entire details of the transfer in the message "Enter code XXXXX now to send $3333 via e-transfer to Jimmy BEANS".

I mean, I guess they want to do this so you can confirm that its a legitimate 2FA SMS, but isnt sending the details of the whole transfer over SMS sort of problematic because its all in plain text? I know this is a sort of generic pearl clutching over privacy and without a real threat model or anything but I recall hearing lots of issues with SMS security these days.

It's not great but if somebody has access to your phone number (usually via SIM swapping), you have bigger problems.

In my country you can choose to use physical one-time pads supplied by the government for online transactions and transfers. Good in a scenario like this because it requires SIM swapping and stealing the one-time pad. Of course this is still regularly defeated by social engineering, lots of gullible folks end up sending pictures of their one-time pads to scammers.

RFC2324
Jun 7, 2012

http 418

You trust the government with access to your money? *GASP*

Space Gopher
Jul 31, 2006

BLITHERING IDIOT AND HARDCORE DURIAN APOLOGIST. LET ME TELL YOU WHY THIS SHIT DON'T STINK EVEN THOUGH WE ALL KNOW IT DOES BECAUSE I'M SUPER CULTURED.

Oysters Autobio posted:

Curious to know if this is actually dumb or I'm overinflating the existing security of e transfers to begin with, or I'm clutching pearls over nothing.

My bank started doing 2FA for confirming etransfers (which is good, right?), but instead of just sending a code on SMS they send the entire details of the transfer in the message "Enter code XXXXX now to send $3333 via e-transfer to Jimmy BEANS".

I mean, I guess they want to do this so you can confirm that its a legitimate 2FA SMS, but isnt sending the details of the whole transfer over SMS sort of problematic because its all in plain text? I know this is a sort of generic pearl clutching over privacy and without a real threat model or anything but I recall hearing lots of issues with SMS security these days.

This is trying to stop a specific threat where the scammer gets access to someone's login info and phone number, but isn't able to easily spoof SMS 2FA. They call the victim, say "I'm from the bank, we need to verify your account and I'm going to send you a code. Could you please read it to me?" and then kick off the drain-yo-funds transfer. Victim gets the code, reads it to the scammer, and now the scammer is able to provide the second factor. If the SMS says "this is going to authorize a transfer" instead of just "enter this code to authorize access" it helps mitigate that threat.

There are still a bunch of potential avenues for attack, and SMS 2FA isn't great overall, but it at least shuts down that common one.

Khablam
Mar 29, 2012

That's not a failure of SMS, that's just social engineering. You can replace SMS with signal, Google auth, etc in that scenario and it still works.
The problem with SMS is it's not too difficult to call a cell company and convince them you're the account owner, and therefore you can intercept SMS. There's no mitigation really, beyond "don't use SMS" since you won't be a part of the attack.

For the especially vulnerable and monitored, SMS also lets LEA intercept 2FA codes over the air.

Fruits of the sea
Dec 1, 2010

RFC2324 posted:

You trust the government with access to your money? *GASP*

Marginally more than a bank, I can vote elected officials out, but not bank directors :v:

I've had banks fight me over obvious credit fraud, they see it as a cost of doing business and would prefer to pass the risk on to the customer.

RFC2324
Jun 7, 2012

http 418

Fruits of the sea posted:

Marginally more than a bank, I can vote elected officials out, but not bank directors :v:

I've had banks fight me over obvious credit fraud, they see it as a cost of doing business and would prefer to pass the risk on to the customer.

I was making a joke about America, tbh. We would never trust an otp issued by the government

B-Nasty
May 25, 2005

RFC2324 posted:

I was making a joke about America, tbh. We would never trust an otp issued by the government

Why would you? Even back in the Clipper Chip days, trusting the Gov to handle secret management was viewed as the dumb idea it is.

RFC2324
Jun 7, 2012

http 418

B-Nasty posted:

Why would you? Even back in the Clipper Chip days, trusting the Gov to handle secret management was viewed as the dumb idea it is.

I generally "trust" our government at the bureaucracy level, but by its very nature its going to be bad at that sort of thing. can you imagine getting locked out of your identity because some paper pusher spilled his coffee and didn't want to admit it?

Rooted Vegetable
Jun 1, 2002
Any banks use Yubikeys yet?



RFC2324 posted:

I was making a joke about America, tbh. We would never trust an otp issued by the government

You know that Login.gov supports TOPT, SMS Auth and Hardware Authentication, right?

(How does a resident of Canada know? Nexus Card application!)

TheParadigm
Dec 10, 2009

RFC2324 posted:

I generally "trust" our government at the bureaucracy level, but by its very nature its going to be bad at that sort of thing. can you imagine getting locked out of your identity because some paper pusher spilled his coffee and didn't want to admit it?

https://www.theverge.com/2021/4/23/22399721/uk-post-office-software-bug-criminal-convictions-overturned


worse things have happened. Imagine being so crude as to defend your bug as legitimate to the point people go to jail over it.

RFC2324
Jun 7, 2012

http 418

Rooted Vegetable posted:

You know that Login.gov supports TOPT, SMS Auth and Hardware Authentication, right?

(How does a resident of Canada know? Nexus Card application!)

I've never even heard of login.gov, lol

TheParadigm posted:

https://www.theverge.com/2021/4/23/22399721/uk-post-office-software-bug-criminal-convictions-overturned


worse things have happened. Imagine being so crude as to defend your bug as legitimate to the point people go to jail over it.

I don't understand a refusal to admit fault. just say 'oh, I know what happened' and fix it. presto, you managed to not even have to admit you are admitting it

Adbot
ADBOT LOVES YOU

DerekSmartymans
Feb 14, 2005

The
Copacetic
Ascetic

RFC2324 posted:

I generally "trust" our government at the bureaucracy level, but by its very nature its going to be bad at that sort of thing. can you imagine getting locked out of your identity because some paper pusher spilled his coffee and didn't want to admit it?

My adult son didn’t get his first stimulus check because it fell out inside a truck and nobody cared enough to pick it up. He got it almost the same day of his $600 stimulus check was direct deposited. 🙄

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply