On Út, 2015-02-24 at 13:46 +0100, Hubert Kario wrote: > On Tuesday 24 February 2015 13:08:46 Tomas Mraz wrote: > > On Út, 2015-02-24 at 12:32 +0100, Hubert Kario wrote: > > > On Monday 23 February 2015 18:22:44 Miloslav Trmač wrote: > > > > > On Mon, Feb 23, 2015 at 3:29 PM, Miloslav Trmač <mitr@xxxxxxxxxx> > wrote: > > > > > >> The point is, there should be a qualified alternative to the > > > > > >> password > > > > > >> policy change that Anaconda has already implemented; and also as a > > > > > >> short term stop gap to the request by Anaconda that FESCo should > > > > > >> come > > > > > >> up with a distribution wide password quality policy. > > > > > > > > > > > > Yes, such a policy would be good; I still think getting a good > > > > > > policy > > > > > > will > > > > > > involve writing significant amount of new code, not just tweaking > > > > > > the > > > > > > configuration options that have been available for the past $many > > > > > > years. > > > > > > > > > > Right. In that category of new code, is a guideline (instructions) > > > > > integrated into each UI that's going to significantly increase > > > > > enforced higher quality passwords. > > > > > > > > AFAICT a good rate limiting / denyhosts-like blacklist would make the > > > > higher password quality requirement mostly unnecessary. With rate > > > > limiting, strong password quality (beyond the “not obviously stupid” > > > > level of password quality) only matters against off-line attacks. (The > > > > off-line attacks scenario includes encryption passwords, without > > > > well-deployed TPM use at least, so it is still a problem that needs > > > > solving, OTOH.) Mirek> > > > rate limiting and denyhosts have no impact what so ever when the attacker > > > has a botnet to his disposal > > > > Large botnet means that the attack is targeted. I do not think we can > > prevent targeted attack against weak password in the default > > configuration. What we should aim at is prevention of non-targeted > > attacks such as attacks you can see when you open ssh port on a public > > IP almost immediately. These attacks usually come from single IP > > address. > > Not necessarily, I've seen both - where an IP did try just 2 or 3 > password/user combinations and ones that did try dozens. > > Having access to botnet is not uncommon or expensive, making it possible for > "bored student" kind of targeted attacks. You can do low level of such an > attack with just EC2. > > I'm not saying that we shouldn't have rate limiting, but it shouldn't be the > only thing above simple dictionary check. Except everything above simple dictionary and length check is unacceptable for default install unless there is a possibility to override. -- Tomas Mraz No matter how far down the wrong road you've gone, turn back. Turkish proverb (You'll never know whether the road is wrong though.) -- security mailing list security@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/security