On Wed, Mar 26, 2025 at 09:23:58AM +0800, jeremy ardley wrote:
> 
> On 26/3/25 06:48, Jan Claeys wrote:
> > FWIW: at that rate it takes millions of years to guess an even halfway
> > semi-secure 8-character password, let alone the really secure longer
> > one you_should_ be using.
> 
> It's not the random password guess that's a problem. It's the passwords that
> have been compromised on some website where you re-use your username and
> password.

Don't do that, then.

Of the many recommendations "out there" regarding passwords, this is
the only one which really matters: never re-use one of your "important"
passwords elsewhere, the other being "use enough entropy".

The biggest weakness of a password scheme are leaks and guessing.

> The basic security policy should be to never expose a password protected
> service to the internet. First don't expose them at all. Second, if you do
> have to then use certificates or publc key backed up with MFA.

I obviously disagree on that one. That always depends. Where possible,
I use keys, where not, passwords.

And please, don't mix "certificates" in: that's another category (a
solution to the key distribution problem: how do you get the public
parts of allowed keys to the server) -- it has not much to do with 
our current topic (to illustrate: if you have only one key allowed
to access your server, a cert is practically useless).

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to