Urban Terror Forums: [4.2] Update 4.2.012 - Urban Terror Forums

Jump to content

 Login | Register 
Advertisement
  • (16 Pages)
  • +
  • « First
  • 10
  • 11
  • 12
  • 13
  • 14
  • Last »
  • You cannot start a new topic
  • You cannot reply to this topic

[4.2] Update 4.2.012 Rate Topic: -----

#111 User is offline   JRandomNoob Icon

  •   moderator   
    Community Moderator

Posted 29 April 2013 - 04:02 AM

Yeah, I guess we can skip the part where various people post their solutions for “how long would it take to find one valid key if the haxx0r could harness every single connected device in the world” and just conclude that even the most resourceful and determined attempt would amount to nothing more than a needlessly elaborate DoS attack.
dswp.de
Beginner’s Guide to Urban Terror (woefully out of date)
Daily Deadnade (Last updated September 9, 2016)

#112 User is offline   x3r Icon

  • Account: x3r
  • Main tag: 24/7.
  • Country:
  • Joined: 04-December 12
  • Posts: 122

Posted 29 April 2013 - 04:23 AM

View PostJRandomNoob, on 29 April 2013 - 04:02 AM, said:

Yeah, I guess we can skip the part where various people post their solutions for “how long would it take to find one valid key if the haxx0r could harness every single connected device in the world” and just conclude that even the most resourceful and determined attempt would amount to nothing more than a needlessly elaborate DoS attack.


Exactly, but that takes the fun out of it all haha

#113 User is offline   H0i Icon

  •   former FS member   
    Modeler
  • Account: h0i
  • Country:
  • Joined: 30-January 10
  • Posts: 941

Posted 29 April 2013 - 02:42 PM

If we assume there are 7 billion accounts (one for everyone), then every attempt would have a (7*10^9 / 3.403*10^38) * 100% = 2.057x10^-27 % chance of succeeding.

In other words, ignoring the luck factor, and assuming we have 7 billion accounts (we don't) it would take 200 octillion (= billion billion billion) attempts to get one key.

#114 User is offline   Divinity Icon

  • Account: divinity
  • Main tag: /eVo/
  • Joined: 01-March 10
  • Posts: 252

Posted 29 April 2013 - 04:58 PM

The key isn't the weak spot in the auth scheme. It's the passwords to their website account via any number of attacks.

#115 User is offline   beautifulNihilist Icon

  •   verified user   

Posted 30 April 2013 - 01:37 AM

View PostDivinity, on 29 April 2013 - 04:58 PM, said:

The key isn't the weak spot in the auth scheme. It's the passwords to their website account via any number of attacks.


Bull's-eye.

bullet_loaderAdvertisement

#116 User is offline   garcassgrinder Icon

Posted 01 May 2013 - 03:36 AM

Well I guess we have to use the same quality of pwd for the webside account as the reg key. Maybe us the reg key also as pwd to access here ;-)

#117 User is offline   Divinity Icon

  • Account: divinity
  • Main tag: /eVo/
  • Joined: 01-March 10
  • Posts: 252

Posted 01 May 2013 - 01:18 PM

It's long been known that the weak spot in any security scheme is ALWAYS the end user assuming no fundamental design flaws and/or security bugs. People are the weak link for a variety of reasons -- they write down their passwords because they have a hard time remembering them, they choose passwords based on family names, etc. You cannot introduce password length or complexity requirements stringent enough to offset this. In fact, it will likely only make some of the factors worse.

As an interesting side note -- current token password schemes (including two-factor auth) are invariably broken long term as the computing power available to the average person continues to increase. Inevitably, biometrics will be the last stop on the authentication tour with a combination of biometrics and tokens being the final two-factor solution or a two-factor biometrics (i.e. fingerprint and voice or fingerprint and retina). The encryption scheme built on top of biometrics will be some impossibly long bit algorithm.

I know this is a bit of a digression, but I dig this stuff :)

#118 User is offline   phd Icon

  • Account: phd
  • Country:
  • Joined: 02-April 11
  • Posts: 131

Posted 01 May 2013 - 01:20 PM

Basic password rules can be enforced (alpha-numeric-CAPS-|!"/$%?&*()), but that has limits.

One trick is to propose a series of images to the "registering" user.
The user selects 3 of them and assigns a password for each (with the password rules).
Each time the user connects to the website, you ask for the username first (and the user has to hit the submit button).
Then you show one image and the user has to enter the corresponding password.

When the user comes from an IP different from the last time, you show him 2 images in a row and he as to provide the right password for both.

This is not that complicated, yet it raises the security significantly.

Furthermore, I just thought about that and I don't think it has ever been implemented anywhere.

Feel free to steal my idea !!!

#119 User is offline   Divinity Icon

  • Account: divinity
  • Main tag: /eVo/
  • Joined: 01-March 10
  • Posts: 252

Posted 01 May 2013 - 03:24 PM

For a subset of people and situations, that would be fine, but in the larger grand scheme of things not so much. For example that doesn't scale to visually impaired people very well. It also raises the likelihood of someone writing down their passwords since now they have three to remember instead of just one.

#120 User is offline   hellraiser Icon

  • Account: hellraiser
  • Country:
  • Joined: 08-March 11
  • Posts: 481

Posted 01 May 2013 - 06:53 PM

Oooopsss...demo visualizating bug :wacko: :



  • (16 Pages)
  • +
  • « First
  • 10
  • 11
  • 12
  • 13
  • 14
  • Last »
  • You cannot start a new topic
  • You cannot reply to this topic

1 User(s) are reading this topic
0 members, 1 guests, 0 anonymous users

Advertisement


Copyright © 1999-2024 Frozensand Games Limited  |  All rights reserved  |  Urban Terror™ and FrozenSand™ are trademarks of Frozensand Games Limited

Frozensand Games is a Limited company registered in England and Wales. Company Reg No: 10343942