On 5/13/24 05:18, Richard Miller wrote: > Jacob and Ori, thank you for filling in some more details. Without > the specifics I had been making some wrong assumptions about where > the exact threat was. > > I think I now have a clearer picture: > > It's not particularly p9sk1 which is vulnerable, but the protocol > for ticket request / response, which leaks enough information to > allow offline exploration of user keys. The contribution of p9sk1 > is that its handshake protocol helpfully reveals a valid user name - > ie the authid - which can be used by an attacker to make a legitimate > ticket request, without any need for eavesdropping or guessing at > user names.
Yes that is how I understand it. > > So, if you have an authentication service exposed to the ipv4 > internet (or to the ipv6 internet with a findable address), and > your authid or a known or guessable userid has a weak enough > password to succumb to a dictionary search, it's probably right > to say that a random attacker could make a cpu connection or > mount your file service with an afternoon's work on consumer > hardware. > > Nobody needs to have weak passwords, though. Using the !hex attribute > instead of !password with factotum, and/or using secstore(1), makes it > easy to have a randomly generated DES key with the full 56 bits of > entropy. This makes the attacker do more work ... but not all that > much more. I hadn't kept up with how powerful commodity GPUs have > become. (My most recent experience with High Performance Computing > involved transputer arrays and Cray T3Ds. Nowadays I specialise in > low performance computing.) It appears that investment of a few > thousand dollars and a few days compute time (maybe less if using > cloud services) is enough for a full brute-force exploration of the > single-DES keyspace. I'm very glad we were able to communicate this and thank you for taking the time to talk about this here in this thread. Thank you, Jacob Moody ------------------------------------------ 9fans: 9fans Permalink: https://9fans.topicbox.com/groups/9fans/T56397eff6269af27-Me0355c116b61ac991520ac58 Delivery options: https://9fans.topicbox.com/groups/9fans/subscription