How about doing what Mt.Gox did? If, when you enter your password at the claim stage and analyser detects it is "weak", you get put in the "needs far more strenuous verfication" pile. For those of us with strong passwords, why are we being punished for the weak passwords of others?
Obviously you are right but it's still in Bitcoinica's best interests that these people don't get f*cked because they would still be ultimately responsible for it.
As for the point about MtGox, sure, but Bitcoinica don't do this do they.
Note I said that the weak password would put them in the "needs more verification" pile, not the "you're fucked" pile.
I think you misunderstood my suggestion... The strength check is done at "claim time", so Bitcoinica could quite easily do this right now. The password is the same so if it was weak when the user set it, it's weak now. If it's strong, then mark the claim "finished" and move on.
Given that it's not a secret, it really doesn't matter if the attacker knows it or not. It doesn't change the difficulty of the brute forcing; it simply makes rainbow tables useless.
Yes and no. Salt is not secret but it's also not public or fixed, simply because you then give more time for bruteforcing.
There are two different types of bruteforcing. There is bruteforcing the login dialog and bruteforcing the password hashes. The salt is always stored plain-text with the hashes, and it is the hashes that the salt protects. The salt, for these purposes, is known, and changing it doesn't change the difficulty of the brute force because it would always be known if you can see the hash.
I don't trivialise it, I know how long does it take since I do have a mining rig capable of bruteforcing passwords at a respectable rate even in bcrypt. There are people out there in Bitcoinica's DB with 4 and 5 letter passwords. How much would you bet about that? With time you can bruteforce longer passwords, which is what they may be doing right now.
Quite so; my question is still
why those of us with strong passwords are being punished for the few with weak passwords? That's not even the question really; because the password hasn't been used at all as part of the claim.
Your email may be compromised since long ago. Obviously if you already are well secured then no problem, but periodically changing passwords does reduce the chances of an opportunistic intrusion.
That is nothing to do with the Bitcoinica hack then, is it? So certainly shouldn't form part of Bitcoinica's claim policy.
Surely not, I reckon I added that just a suggestion in case you had not changed passwords in a long time? Hope you didn't take it personally, huh.
As it happens, I haven't. I don't believe in changing passwords regularly. There is plenty of evidence to suggest that it actually weakens security. You are better off picking (a) a strong password and (b) a different password for each site.
I certainly didn't take your suggestion personally though; I don't think we actually fundamentally disagree -- but I do think our discussion here is useful and might be interesting for others (and hopefully someone at Bitcoinica is watching too).