[Info-vax] VMS humor
John Reagan
xyzzy1959 at gmail.com
Thu Dec 31 01:29:31 EST 2020
On Wednesday, December 30, 2020 at 10:23:33 PM UTC-5, Craig A. Berry wrote:
> On 12/30/20 7:53 PM, John Reagan wrote:
> > On Wednesday, December 30, 2020 at 11:21:28 AM UTC-5, Craig A. Berry wrote:
> >> On 12/30/20 7:25 AM, VAX... at SendSpamHere.ORG wrote:
> >>> In article <74ad5ee7-5ee4-4aac... at googlegroups.com>, John Reagan <xyzz... at gmail.com> writes:
> >>>> On Tuesday, December 29, 2020 at 5:49:23 PM UTC-5, Michael Moroney wrote:
> >>>>> Does anyone else wonder if the drug manufacturers use the VMS password
> >>>>> generator to name new drugs? :-)
> >>>> On x86, it will be harder to pronounce:
> >>>>
> >>>> $ set password/generate=16/algo=mixed
> >>>> Old password:
> >>>>
> >>>> knE~yAZ7dv=K]+Ui
> >>>> 3t;yh58-6T1[Oa7;
> >>>> 40Ie652I[6xlW3Yl
> >>>> ud58{>!1&R17h7uo
> >>>> dRcp7Se{'8^1<mK0
> >>>>
> >>>> Choose a password from this list, or press RETURN to get a new list
> >>>
> >>> And harder to remember! That'll insure that the user records their
> >>> password somewhere besides in their memory.
>
> >> And goes against current NIST guidelines for long, easy-to-remember
> >> passwords that do not routinely expire. Of course most auditors go by
> >> what NIST said a decade or two ago, so a lot of folks won't have any
> >> choice about following older practices.
>
> > Easy-to-remember and high entropy don't mix.
> Yes, they most certainly do. "King Philip fried a pheasant on Friday!"
> is much easier to remember than "ud58{>!1&R17h7uo" and has 189 bits of
> entropy compared to 72 bits. You seem to have missed some of the most
> salient bits of the section you quoted, notably:
> "Verifiers SHOULD NOT impose other composition rules (e.g., requiring
> mixtures of different character types or prohibiting consecutively
> repeated characters) for memorized secrets. Verifiers SHOULD NOT require
> memorized secrets to be changed arbitrarily (e.g., periodically)."
> and:
> "Length and complexity requirements beyond those recommended here
> significantly increase the difficulty of memorized secrets and increase
> user frustration. As a result, users often work around these
> restrictions in a way that is counterproductive."
> So, as I said, the "harder to pronounce" generated passwords that we'll
> apparently get with x86 VMS are pretty much what everyone else has been
> doing but directly contradict current NIST recommendations.
> >
The phrase "King Philip fried a pheasant on Friday!" is 7 words out of a dictionary full of words.
The distribution is quite predictable as each English word (yes, there are a few exceptions known
to Scrabble players) contains at least one vowel. How did you determine 189?
I'm not in the XKCD camp and fall in with Steve Gibson.
https://www.explainxkcd.com/wiki/index.php/936:_Password_Strength
You can pick the old style as well.
$ set pass /generate=16 /algorithm=alphabetic
Old password:
heabneyssiontenvok
gatotormedickings
housesupsystraste
alietesciabatter
satubmunhastonal
Choose a password from this list, or press RETURN to get a new list
New password:
And "correcthorsebatterystaple" now has an entropy of 1 bit.
More information about the Info-vax
mailing list