On 25 Jul 2012, at 10:09, Ansgar Wiechers wrote:

> Mark,
> 
> 
> Please re-read what I wrote, particularly the second half of it. Is
> "Joseph Zebediah Average 4/1/1999" really a strong password?

It is a strong password, unless you believe attackers would regard that 
format as a promising format to exploit. I think that's unlikely to
be a promising format to exploit at the moment.

> If not: how
> do you prevent users/customers from using a password like that?

Well, if you really believe that format is likely, you test for it.

> And how
> do you prevent a customer's system from being compromised with, say, a
> keylogger?

Keyloggers are a completely separate question from passwords and operate
on a different level.

> 
>> Obviously there's more to it than that, but I didn't think there was
>> much disagreement about the ideal form of a memorable and strong
>> password. It's a given that your attacker will have an idea what form
>> of password to test for, if not the actual password.
> 
> Indeed there isn't much disagreement on what forms a strong password (in
> principle). I do fail to see how this could be enforced on a technical
> level, though.

You can readily enforce minimum length of say 12-16 characters which is a 
great place to start and of course that says nothing about keyloggers
or other infiltrations.

If you're assuming that keyloggers are omnipresent, then you've already
given up on security.

Mark

Reply via email to