From owner-freebsd-questions@FreeBSD.ORG Tue Jun 18 01:52:20 2013 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 633196DF for ; Tue, 18 Jun 2013 01:52:20 +0000 (UTC) (envelope-from freebsd@edvax.de) Received: from mx02.qsc.de (mx02.qsc.de [213.148.130.14]) by mx1.freebsd.org (Postfix) with ESMTP id 2B0091E6B for ; Tue, 18 Jun 2013 01:52:19 +0000 (UTC) Received: from r56.edvax.de (port-92-195-15-122.dynamic.qsc.de [92.195.15.122]) by mx02.qsc.de (Postfix) with ESMTP id 131DD24A48; Tue, 18 Jun 2013 03:52:11 +0200 (CEST) Received: from r56.edvax.de (localhost [127.0.0.1]) by r56.edvax.de (8.14.5/8.14.5) with SMTP id r5I1qKqO004358; Tue, 18 Jun 2013 03:52:20 +0200 (CEST) (envelope-from freebsd@edvax.de) Date: Tue, 18 Jun 2013 03:52:20 +0200 From: Polytropon To: RW Subject: Re: FreeBSD maximum password length Message-Id: <20130618035220.2b01f4af.freebsd@edvax.de> In-Reply-To: <20130618005608.488c72a0@gumby.homeunix.com> References: <44li69diyv.fsf@be-well.ilk.org> <20130617164744.1c4e3d02e57de825d500e309@yahoo.es> <13CA24D6AB415D428143D44749F57D7201F936C4@ltcfiswmsgmb21> <13CA24D6AB415D428143D44749F57D7201F93897@ltcfiswmsgmb21> <20130618005608.488c72a0@gumby.homeunix.com> Organization: EDVAX X-Mailer: Sylpheed 3.1.1 (GTK+ 2.24.5; i386-portbld-freebsd8.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: Polytropon List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Jun 2013 01:52:20 -0000 One _little_ terminology detail: On Tue, 18 Jun 2013 00:56:08 +0100, RW wrote: > What's important is the > amount of work needed to evaluate a password in a bruteforce dictionary > attack. I'd say that bruteforce != dictionary. It's bruteforce _or_ dictionary attack instead. A dictionary attack is more sophisticated because it uses words from a dictionary, whereas a _real_ bruteforce will stupidly run through _all_ combinations of the given charsets and length ranges. It will _eventually_ be successful, even if our planet doesn't exist anymore at that time. Finite time, far far away. :-) -- Polytropon Magdeburg, Germany Happy FreeBSD user since 4.0 Andra moi ennepe, Mousa, ...