Windows laggards still using the vulnerable hashing function: Your days are numbered.
See full article...
See full article...
Since then you can only bring it back by the means of an extended one-year security support on NTLMv1 for $499 only !!Microsoft only announced plans to deprecate NTLMv1 last August.
Thankfully no. This has mostly to deal with enterprise environments. Possibly super-ancient small business or retro-home networks. Although I'm willing to bet that Pro could have its settings adjusted to make it relevant, Home won't let you touch those.Once again this is beyond my technical expertise so I have to ask, does this have any implications for choosing passwords for logging into Windows 10/11 Home?
Once again this is beyond my technical expertise so I have to ask, does this have any implications for choosing passwords for logging into Windows 10/11 Home?
As for rainbow tables, do they deal with using a character not from the 96-character standard ASCII set (using ALT+###)? I've thought of doing this before, but was reluctant because it might break something in some case and it never seemed to be worth the risk.
edit: clarification of question
MSCHAPv2 is definitely a problem. The worst part, IMO, is how it's presented to users. If you navigate to an HTTPS site with an invalid certificate, the browser makes it very hard to bypass the scary warnings and continue on. If you try to connect to a wireless access point that asks for MSCHAPv2 but doesn't have a valid cert, you get that prompt that says "Do you expect to find this wireless network in this location?" which users will almost always click through. One click in a very non-threatening dialog never should have been enough to send what's practically equivalent to your password to some random WAP with no credentials.That would be grand except there's places where NTLMv1 is the only option - the primary example is RADIUS. I mean, MS-CHAP and MS-CHAP2 are both madly insecure anyway precisely because they use NTLMv1 (rainbow tables aside - as mentioned by another commenter the DES can be brute-forced by a modern smart watch probably) ... but the authentication protocols supported in RADIUS are cleartext (PAP), CHAP (requires cleartext of the password on the server), MS-CHAP, MS-CHAP2 (require the NTLMv1 hash, or cleartext of the password on the server). Brilliant stuff huh?
Up until recently, MS-CHAP2 was pretty much required for WPA enterprise/PEAP. You have to use TLS/X509 based authentication to avoid it.
And the final ingredient to the wonderful shit sandwich this already is not every use of RADIUS allows the authentication protocol to be interchangeable. Some will only accept if it's "secure" (MS-CHAPv2). I've got devices that will accept RADIUS PAP for VPN termination (great! the only place it's cleartext is over the encrypted channels!) but MS-CHAPv2 for other identity uses (what? you mean I effectively have to have the password in cleartext on the server?)
Edit: The reason for me needing cleartext on the server (and not the NTLMv1 hash) is because it's MFA - the "password" is actually the password + TOTP code, so it has to use the NTLMv1 hash of the combined password + code (and the previous code too just to allow time delays). There is a whole "challenge/response" thing for RADIUS you can use instead but that's not reliably supported so it's better to offer a pseudo-password option.
Typically tools including Responder, PetitPotam, and DFSCoerce are involved in attacks against Net-NTLM. Typically tools including Responder, PetitPotam, and DFSCoerce are involved.
“Typically tools including Responder, PetitPotam, and DFSCoerce are involved in attacks against Net-NTLM. Typically tools including Responder, PetitPotam, and DFSCoerceare involved.”Typo: repeated line about Responder et al
While I get your point. Nobody who cares should be using password auth with radius anyway. PAP and CHAP are even worse options v MS-CHAPv2 so there are no good options for it. WPA2-PSK is actually much stronger (and WPA3 really strong) and many business targeted (e.g. Unifi) Wifi setups allow per device WPA secrets to avoid the one key to rule them all problem of WPA.That would be grand except there's places where NTLMv1 is the only option - the primary example is RADIUS. I mean, MS-CHAP and MS-CHAP2 are both madly insecure anyway precisely because they use NTLMv1 (rainbow tables aside - as mentioned by another commenter the DES can be brute-forced by a modern smart watch probably) ... but the authentication protocols supported in RADIUS are cleartext (PAP), CHAP (requires cleartext of the password on the server), MS-CHAP, MS-CHAP2 (require the NTLMv1 hash, or cleartext of the password on the server). Brilliant stuff huh?
Up until recently, MS-CHAP2 was pretty much required for WPA enterprise/PEAP. You have to use TLS/X509 based authentication to avoid it.
And the final ingredient to the wonderful shit sandwich this already is not every use of RADIUS allows the authentication protocol to be interchangeable. Some will only accept if it's "secure" (MS-CHAPv2). I've got devices that will accept RADIUS PAP for VPN termination (great! the only place it's cleartext is over the encrypted channels!) but MS-CHAPv2 for other identity uses (what? you mean I effectively have to have the password in cleartext on the server?)
Edit: The reason for me needing cleartext on the server (and not the NTLMv1 hash) is because it's MFA - the "password" is actually the password + TOTP code, so it has to use the NTLMv1 hash of the combined password + code (and the previous code too just to allow time delays). There is a whole "challenge/response" thing for RADIUS you can use instead but that's not reliably supported so it's better to offer a pseudo-password option.
While I get your point. Nobody who cares should be using password auth with radius anyway. PAP and CHAP are even worse options v MS-CHAPv2 so there are no good options for it. WPA2-PSK is actually much stronger (and WPA3 really strong) and many business targeted (e.g. Unifi) Wifi setups allow per device WPA secrets to avoid the one key to rule them all problem of WPA.
X509 is surprisingly not that hard to manage in an enterprise setting (e.g. with an Active Directory integrated Certificate Authority) and has the advantage of allowing machine certs so your devices can connect to Wifi/VPN without a user logging in first avoiding the bootstrap problem or just allowing device sharing
Ninth paragraph needs re-edit. Duplicated cut and pasted text and misspelled word. “Accont”Typo: repeated line about Responder et al
They could just ask for the password twice, first for the actual password, then for the 2fa code. (For example by pretending the first password was wrong even if it wasn't).That would be grand except there's places where NTLMv1 is the only option - the primary example is RADIUS. I mean, MS-CHAP and MS-CHAP2 are both madly insecure anyway precisely because they use NTLMv1 (rainbow tables aside - as mentioned by another commenter the DES can be brute-forced by a modern smart watch probably) ... but the authentication protocols supported in RADIUS are cleartext (PAP), CHAP (requires cleartext of the password on the server), MS-CHAP, MS-CHAP2 (require the NTLMv1 hash, or cleartext of the password on the server). Brilliant stuff huh?
Up until recently, MS-CHAP2 was pretty much required for WPA enterprise/PEAP. You have to use TLS/X509 based authentication to avoid it.
And the final ingredient to the wonderful shit sandwich this already is not every use of RADIUS allows the authentication protocol to be interchangeable. Some will only accept if it's "secure" (MS-CHAPv2). I've got devices that will accept RADIUS PAP for VPN termination (great! the only place it's cleartext is over the encrypted channels!) but MS-CHAPv2 for other identity uses (what? you mean I effectively have to have the password in cleartext on the server?)
Edit: The reason for me needing cleartext on the server (and not the NTLMv1 hash) is because it's MFA - the "password" is actually the password + TOTP code, so it has to use the NTLMv1 hash of the combined password + code (and the previous code too just to allow time delays). There is a whole "challenge/response" thing for RADIUS you can use instead but that's not reliably supported so it's better to offer a pseudo-password option.
They could just ask for the password twice, first for the actual password, then for the 2fa code. (For example by pretending the first password was wrong even if it wasn't).
Or switch to something more secure than ssh tunnels.
How do you know there's no porn on your unsecured computer? Just because you didn't put it there doesn't mean somebody else, anywhere in the world, hasn't hacked your machine and is now using it to run a kiddie porn server (or fentanyl store, etc.). You won't know anything about it until the police come knocking on your door with a search/arrest warrant.While I'm aware this issue doesn't have consequences for me as a private user (thanks for clearing this up, fellow posters) I want to remark that excessive security's mostly annoying to me if not driving me crazy.
I'm not a secret agent or a crook and do not run a company. I have zero sensitive, personal and/or steal-worthy things on my machines - and no nudity or porn. Internet banking requires a separate security device provided by my bank.
When it comes up in discussion I advice people to do the same: if you have ANY kind of sensitive data, store it in an air-gapped place/device.
I use Win10. My 3 boxes boot without pw. Burglars can look at my data. Please don't steal my swords.
Linux is wáy worse and after typing my password for the n-th time I quit that annoying OS (several distributions).
sigh - I feel OK now. Thanks/sorry.
I can’t tell, what year was NTLMv2 introduced? Think it might be 1998With the 1998 release of Windows NT SP4 in 1998, Microsoft introduced NTLMv2, which fixed the weakness.
RIght??How do you know there's no porn on your unsecured computer? Just because you didn't put it there doesn't mean somebody else, anywhere in the world, hasn't hacked your machine and is now using it to run a kiddie porn server (or fentanyl store, etc.). You won't know anything about it until the police come knocking on your door with a search/arrest warrant.
Hackers aren't just after your data. The computer itself is a valuable ressource for any number of criminal activities. It's a bit like thinking you don't need to lock your car doors because there's nothing worth stealing in the glove compartment.