Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Cryptography isn't a strong point of mine, so thought I'd get an opinion here. For an AES truecrypt volume, would this be considered a secure password?
Code:
januarY--99***
(note that this is not the actual password to be used, but rather an equivelant pw that has the same structure and use of special chars, etc)
Basically, would this be enough to foil any dedicated cracking efforts? I don't mean like if the NSA decided they wanted to break my password, but if some script kiddie with a powerful computer and lots of time tried, would it be secure?
This one's debatable. Try tinkering with John sometime to see how he cracks passwords. It's very enlightening. My thoughts on januarY--99***:
A substantial part of it is a common dictionary word.
The case change for 'january' is not as clever as it seems. (I believe there are several default John rules that tweak case in exactly that way.)
The special characters and digits are all repeating.
It's not a bad password, IMO. Technically you are observing good practices by choosing from different character classes. I would still be more inclined to use (the similarly memorable): jan*99-RAPIDO-
----
P.S. If anyone reading this thread decides to actually use any of these passwords, please have your noggin examined. (Password dictionaries.)
Basically, would this be enough to foil any dedicated cracking efforts? I don't mean like if the NSA decided they wanted to break my password, but if some script kiddie with a powerful computer and lots of time tried, would it be secure?
Again, that part is debatable. I'd argue that your key selection is woefully inadequate if you need to be able to defend against a dedicated offline attack.
Look into something like pwgen(1), and shoot for something with good character class diversity and 20+ bytes in length. That should create enough difficulty that they'll just smack you with a rubber-hose cryptanalysis instead.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.