Password Security Not Easy 674
mekkab writes "The Wall Street Journal reports (yet again) that despite knowing better, users do dumb things to compromise security. Is seven different 8 character passwords (with numbers and mixed cases) really too much to ask? Do people need training on how to make well known phrase (to them) into a perfect password acronym, or other memory boosting techniques? Or is it that the entire business culture needs to change from within to take digital security seriously?" If you require unmemorizable passwords, you've effectively changed the security requirement from "something you know" to "something you have", and if the required dongle is a note under your keyboard...
Integrate the pin with securid (Score:5, Interesting)
There are more advanced security schemas. I know some places I have worked use securids where if you get possession of the key chain and know their userid, then you can become them. This isn't any good.
A little bit better solution is having a securid login with a pin code - still not quite there as I only have to get your login name, secuid key chain and guess what your 4 digit pin is.
The best password schema I have seen so far is where the securid and pin are integrated so that the seed in the random number generator for synced securids is the pin - the securids are just random numbers where the next number is based on some fixed patter and the number is only good for 60 seconds. But this still this has a few holes, I could figure out the pattern in securid and brute force the pin then re-add the pin as the seed. But for nowadays, this is best I have.
Re:Integrate the pin with securid (Score:5, Interesting)
The (embedded) chip is tamper-resistant (quite possibly erases the secrets inside when opened) and only lets you try 3 pins. The challenge/response scheme can then be as convoluted as you like, perhaps based on public/private key.
My bank uses the chip embedded on my regular ATM card, and a card reader with a keypad and integrated LCD readout. When logging on to e-banking, I enter a PIN, enter a challenge on-screen, and then enter the response from the LCD readout into my browser.
Card reader can be hostile - put PIN-pad on card (Score:3, Informative)
Also works against hostile ATMs.
A solution like this exists, see Cypak PIN-on-Card [cypak.com]
Or just use a Palm Pilot (Score:4, Interesting)
Lots easier to work with multiple places (home, work, web, etc.)
Re:Integrate the pin with securid (Score:3, Informative)
SecurID's are not limited to a 4 digit PIN. I have to use them to log into various client machines and my PINs are always 7+ chars that are alpha/numeric. You type in the PIN - which is really a password at this point - and follow it with the 6 digit number on the SecurID.
Re:Integrate the pin with securid (Score:3, Informative)
The whole point to SecurIDs is that they provide you with easily manageable two-factor security, including for legacy applications without needing a hardware re-outfit of biometrics, smart cards, redesigning custom prompts, readers, etc. They have agents for most popular things you'll i
Stupidity finds a way (Score:5, Interesting)
We did everything right, got the clock sync working, got all the managers to buy lots of pricey SecurID cards, found and forcibly removed insecure dial-in boxes scattered around, did all the right audit and test of firewalls, etc.
But the sales group had a bunch of pooled laptops, which sales people used to take out to customer sites. So they would store a SecurID card in the bag, along with a yellow PostIt note showing the PIN code for that SecurID.
That way, not only was the SecurID compromised, but since they were effectively using shared SecurIDs and PINs, we wouldn't even know which idjit sales droid had compromised it.
Doooo, ya stupid idjit rabbit! [barbneal.com]
State-of-the art tech is no match for the apparently limitless stupidity of users.
In the end, we did the only sensible thing, and revoked offsite dial-in for that group.
Re:Science Tables and Lookup Values (Score:3, Interesting)
Pass phrases are at least easier to remember than long passwords (compare "I am the walrus, koo-koo-kachoo!" to your example) and are long enough to be more problematic for passowrd cracking programs.
Re:Science Tables and Lookup Values (Score:3, Insightful)
I only have 2 passwords (Score:3, Interesting)
Re:I only have 2 passwords (Score:3, Insightful)
Re:I only have 2 passwords (Score:5, Insightful)
Re:I only have 2 passwords (Score:2, Funny)
Re:I only have 2 passwords (Score:3, Informative)
Since our dev environment is on a Windows platform, I use Password Safe [sourceforge.net] and have it generate/store new passwords for me for all of the production machines.
Sure, it is a pain because I have to fire it up and put in my one secure password to get to the other passwords. But, at least it limits my security exposure to one bastion host (the shared drive on the LAN, so my encrypted password da
Re:I only have 2 passwords (Score:3, Interesting)
the IT gurus that pide themselves at security at the HQ were bragging that most of our company users were using good passwords.
I suggested they let me have a crack at it.
I broke over 40% of the passwords by simply adding the YYMM as in last 2 digits of the year and the month as digits to the end of every password tried from the dictionary.
they were suprised and I said, "your fault for forcing 30 day password expiration on the domain."
this was 1 year ago.
they still have not changed their
Daily password changes (Score:3, Funny)
The cool thing was that they never implemented any restriction on what the passwords could be.
I think the most common passwords that resulted were Monday, Tuesday, Wednesday etc.
Re:I only have 2 passwords (Score:3, Insightful)
Of course it's a good idea. But like everything else in life, it, too, is subject to the "Too Much of a Good Thing" syndrome. The trick is to change passwords often enough to maintain security and protect against those who will, inevitably, give-away there passwords in exchange for trin
Re:I only have 2 passwords (Score:4, Insightful)
The problem is caused by a complete and utter lack of grip on reality. A total inability to understand human nature, and worse, expect people to bend to the system, rather than designing the system to facilitate its use by people.
Ill say this in capital letters so you get it this time.
CHANGING PASSWORDS EVERY 60 DAYS IS TOO HARD YOU DICKFUCK!
And if you arsehole IT fucks cant get your brains around that, and design a system the recognises that fact then you shoudl really get a job shovelling manure or something.
If you really think that something is easy, merely because its easy to write an algorithm to solve it, you need help. People are not computers, and something as trivial as generating a password becomes an onerously difficult task when asked to perform repeatedly.
Rather than cursing the l-users, get off your fat arse, and start doign your Job - provide them with the tools to do their jobs.
Re:I only have 2 passwords (Score:4, Insightful)
When I read this, I seriously started thinking this was great sarcasm.
Unfortunately I've since changed my mind.
There has been a lot of research in the area of password usability here is a short summary:
Fact 1: human memory is fallible
Fact 2: people cannot forget on demand
Fact 3: non meaningful things (i.e. random) are amongst the hardest things to remember
Fact 4: items in human memory interfere with each other making 100% recall very hard
Fact 5: unaided (no prompts) recall is much harder than providing prompts (which becomes a recognition exercise - passfaces is an interesting technology for example)
Fact 6: ambushing a user to change their passwords stops them from doing their work (which they get paid for) and encourages them to bypass the system as quickly as possible - i.e. write the password down
CONGRATULATIONS you are following rules which were laid out in the original FIPS guidelines (1985) for password management... Maybe you ought to revisit their document, they have updated it and it makes a LOT more sense now (check out FIPSPUB112)... I just wanted to let you know that pretty much everything you describe decreases the security of your organisation.
Re:I only have 2 passwords (Score:2, Interesting)
I have two different sets. One specifically for online site like PayPal, my bank, etc. The other is for generic internet thing.
The important stuff set is then further split into one of two passwords, chosen depending upon how "important" the site is. So my Amazon account won't use the same as my bank, and such.
The generic set is split into three, or occassionally four, also based on importance.
The rare fourth is my root password, the third my normal login, second for general web usage, and las
Re:I only have 2 passwords (Score:2, Funny)
Actually, I have my luggage combination written in sharpie on the outsize, right next to the lock. It's 0-0-0-0. That's so the TSA can open it up if the numbers happen to get bumped away from 0-0-0-0.
Online I have an easy password, which is used everywhere unimportant; a medium password, which is used on sites that I would not want to lose the account for; a hard password used on sites with sensitive and personal information; and a secure password whi
Re:I only have 2 passwords (Score:4, Interesting)
anyone else have a few standard passwords?
For low security operations, like your online accounts, using a standard password is not too unreasonable. With just a hair more effort, however, you can use a standard password scheme. For example, instead of using "8dogs8food" as your password for all of the random online accounts you have, prepend or append the first letter of the web site you are accessing. For Amazon.com you can have "a8dogs8food" and for slashdot you can have "s8dogs8food." This gives you a better idea if your password is leaked, and keeps insiders from using your userid/passwd on other consumer sites. I think that a password scheme like this strikes a good balance of security and ease of use.
Re:I only have 2 passwords (Score:2)
Just get rid of them... (Score:4, Insightful)
Using SecureID or another similar solution is the "no-brainer" solution that todays users need. This way they don't have to remember anything other than a simple pin - which, luckily, is just about the limit of most peoples' powers in this arena.
Re:Just get rid of them... (Score:3, Insightful)
John: 0000
If there is a easy way they will take it.
Re:Just get rid of them... (Score:2)
Using SecureID or another similar solution is the "no-brainer" solution that todays users need. This way they don't have to remember anything other than a simple pin - which, luckily, is just about the limit of most peoples' powers in this arena.
Biometric identification is the way to go. No passwords. The only time you need administrative support is if you've been in a horrible accident and lost your eyes/fingers/vocal cords/etc.
As an admin... (Score:5, Funny)
Re:As an admin... (Score:4, Funny)
I change it every week. This week it is 'Pencil'. Don't tell anyone though.
Re:As an admin... (Score:2, Funny)
We all know "real" men just kick down the door after they lock themselves outside.
And real geeks lock themselves inside.
Known for quite some time... (Score:4, Insightful)
Re:Known for quite some time... (Score:3, Funny)
Yeah. Bunch of idiots. That's why I drop the last initial.
Special Characters != More Secure (Score:3, Insightful)
Re:Special Characters != More Secure (Score:3, Insightful)
Also note that requiring special characters does far more than add "an extra 12 hours". In most cases the brute force attack would be m
If the required dongle is a note under your kb... (Score:5, Insightful)
It isn't as good as memorizing the password, but it's a hell of a lot better than having a weak password that is trivial to guess and compromise via the Internet.
Re:If the required dongle is a note under your kb. (Score:5, Interesting)
Hard to guess, easy for me to "remember". If someone gets my paper (say I lose my wallet), it is still not simple to figure out what my passwords are, or even what the heck that little paper is. Shoulder surfing doesn't work too well either, unless you can memorize the whole card and then figure out which word I am using (it would be easier to try to watch me type the password on the keyboard then get it off the paper. Luckily I type fast and get annoyed when people stand over me while I type a password
Re:If the required dongle is a note under your kb. (Score:4, Funny)
>d 6K e aY f eP
>g !S h gn i D=
>j Hd k vw l Cb
>m W5 n 4$ o R3
>p x% q 7M r NF
>s +2 t s* u Ay
>v fL w zG x Zu
>y cX z Qr
So what does the output of that Perl script look like?
-- TheMadRedHatter
Yes. (Score:2, Insightful)
Absolutely it is. This is one of those examples of culture clash: the tech-inclined, and not. Absolutely it's too much to ask, just like asking mom or dad to "just open the command line.. it's so easy!" Yeah, it is too much.
Re:Yes. (Score:2)
Re:Yes. (Score:2)
Computing's biggest hurdle in the coming years is going to be disappearing entirely. By which I mean, if computers really are a magical black box that makes our lives easier, then things like security shouldn't be taking up chunks of my life. They should take care of th
Re:Yes. (Score:2)
Re:Yes. (Score:3, Insightful)
Absolutely it is. Just like asking mom or dad to "just open the command line.."
I've got to agree with you there. It is the non-techies that have the most problems with this, but how old is the internet culture among non-techies? Five years? Maybe less? The point is that until the internet made everything accessible from a single computer, you didn't need a dozen different passwords. Before that, the only peop
Change 'password'..... (Score:2, Informative)
Then tell your users to think of a phrase like 'my son's name is Jim', and get them to use it as their password.
Putting in pucntuation makes it harder to crack too. Although it still won't stop social engineering.
My Password (Score:4, Funny)
No one has ever guessed it.
Re:My Password (Score:5, Funny)
My dog is called Pchg65Lb, but he changes his name every few weeks.
Re:My Password (Score:3, Funny)
Re:My Password (Score:2)
Re:My Password (Score:2, Funny)
Biometrics (Score:2)
Re:Biometrics (Score:4, Insightful)
Yeah. Unlike password biometrics are resistant to, what, 10 replay attacks? Unless you're using iris-scans, then you've got 2 passwords, maximum.
You are aware that most fingerprinting gear is resistant to the dreaded Gummy Bear attack? (That's where they us a copy of your prints - lifted off of a glass you used for example - mad out of Gummy Bear candies).
Biometrics are useless unless the biometric-taking hardware is physically secured by human guards checking to make sure you're not palming any Gummy Bears.
(As a cost-cutting measure, notice how human guards are much better at facial recognition than computers, and just issue photo-IDs..)
Re:Biometrics (Score:5, Insightful)
There should be some feature in slashcode to remind people who inevitably try to post this that as soon as someone can fake your fingerprint or retinal scan, you are forked for life because you can never change those things.
Re:Biometrics (Score:3, Insightful)
Fingers can be cut off (ok, new ones are supposed to detect if there's blood circulating), or you could leave your fingerprint on something, then someone comes along and takes it, wouldn't be too hard to make fake fingertips which you could use. Your retina 'metrics' would be harder to steal, maybe contact lenses, I dunno. But whatever technology we can come up with, crackers can find a way to break or exploit it. Biometrics by themselves are probably
Picking a strong password.... (Score:2, Informative)
Spaceballs Password (Score:3, Funny)
[King Roland has given in to Dark Helmet's threats, and is telling him the combination to the "air shield"]
King Roland: One.
Dark Helmet: One.
Colonel Sandurz: One.
King Roland: Two.
Dark Helmet: Two.
Colonel Sandurz: Two.
King Roland: Three.
Dark Helmet: Three.
Colonel Sandurz: Three.
King Roland: Four.
Dark Helmet: Four.
Colonel Sandurz: Four.
King Roland: Five.
Dark Helmet: Five.
Colonel Sandurz: Five.
Dark Helmet: So the combination is one, two, three, four, five? That's the stupidest combination I've ever heard! That's the kind of combination an idiot would put on his luggage!
The SlashDot Password Guessin' Game (Score:3, Funny)
1) Take the following five passwords:
- password
- slashdot
- 123456
- password123
- [Username]
2) Attempt to login to as many slashdotters accounts as possible.
3) Post incriminating/stupid/slanderous/troll comments on behalf of users you now 0wn.
4) While the FBI are busy smashing down your door: Take a hammer to your hard-drive's plateaus, and run like a screaming idiot while you think about how stupid you where to follow my instructions.
(Disclaimer: Please don't play this game!)
P.S. If your password was listed above: Change it!
I noticed that the article mentions... (Score:2, Insightful)
Whether they do or not, the FDIC auditors emphasize this policy strongly. If it's not written in stone yet, it will be.
To be honest, I approve such a measure. It disturbs me to think that our local bank's security policy might be more lax than Yahoo's.
Re:I noticed that the article mentions... (Score:2)
Re:I noticed that the article mentions... (Score:2)
That being said, as the article pointed out, the password requirements are not legislated, they are merely developed by consultants as a "show of controls". In other words, they are there so a company can say, "See - we try and protect our data from fraud."
Also, the FDIC does not audit ban
Is it hard to make complexe passwords? (Score:2)
It is hard.
When you work in an organization when you have 5-10 passwords for different applications such as the network domain (email), web apps, etc; each requiring complexe passwords that expire every 3 months it become VERY hard to keep track of all these passwords and think of something else to replace them all with.
Re:Is it hard to make complexe passwords? (Score:2)
Password Expired (Score:2)
yes. when you're forced to change them every 30 days, and you can't repeat any of the last five, you quickly run out of things you can easily remember early in the morning.
Why should the users be conserned about security. (Score:2)
Password expiration (Score:3, Interesting)
My password is written on my whiteboard.
For serious security, passwords shouldn't expire. They shouldn't even have to be that obscure. The security effort should go into making a brute force attempt impractical.
And the IT department needs to recognize that once someone has physicall access to the network, there's not much left to secure, anyway.
Re:Password expiration (Score:2)
Every organization other then the absolute smallest places should be expiring
seven different 8 character passwords (Score:2)
Yes. It is. I'm supposed to remember which password goes with which account/username on which one of 4 systems I may have to access at work, plus root and regular user on the home box? Then there are the user/pass combos for here, k5, husi, tnr, the atlantic, wash post, ny times, salon.com, and a couple of other ones.
That's something like 16-20 user/password combos. Fortunately I can use the same username across multiple sites. But I use differ
PasswordSafe (Score:2)
My take : three zones (Score:5, Interesting)
Low: content sites like slashdot. I don't care if you get this passphrase, I will never change it.
Medium: logins for machine accounts, email and online shopping sites. I care somewhat if this is known, and I will change it yearly.
High: financial sites - bank and brokerage. I care deeply that this phrase is secure, and it is changed once a month no matter what.
Re:My take : three zones (Score:2)
I don't really understand the noise with memorizable passwords. A random 8 characters password with mixed cased and numbers takes me about 4-5 times (number of time I have to enter it) to memorize it.
For those I don't use very often... then my little Palm app will help me remember them.
Re:My take : three zones (Score:3, Insightful)
Look at it as a backup password, in case the original broke into bits by some strange mishap.
Re:My take : three zones (Score:3, Funny)
Of course, then you call up your bank and all they want is your SSN and mailing address... Sheesh.
Well, from the WSJ article it wasn't stupid users (Score:2)
Frankly if my work was so dumb - I'd write them down too - or come up with a script that would do all of the logging in after the initial password. This is an IT staff problem, not a user problem... Please, one password is
Failings of Two-Factor Authentication (Score:2)
In case you forget them.... (Score:3, Funny)
I gave my two weeks' notice and this was the first thing my bosses wanted me to do: write down all the passwords for them so they could keep everything on file.
Fantastic.
Security (Score:2)
Something you have, something you know, something you are.
The best systems incorporate a little of each.
For a phone banking application:
A unique transaction number out of a booklet your bank sent you. (something you have)
A voice sample of you saying the numbers (something you are)
Your birthday (something you know)
Even though each of these individually is 95-97% secure at best, the combination is highly secure.
Easy trick... (Score:5, Funny)
You'll be surprised by how dramatically your capacity to remember passwords will improve once this becomes a regular feature of your workday.
For added effect, construct horribly complex and impossible to remember passwords a few times every day. Over time, basic survival instincts and the urge to avoid the inevitable kick in the balls will overcome the limitations posed by your poor memory.
Re:Easy trick... (Score:2)
It sounds like you have personal knowledge of this? Hope you've had all the kids you want!
Re:Easy trick... The *REAL* BOFH (Score:3, Funny)
[Suddenly the phone rings, disturbing the BOFH's game of Half-Life]
[random_user]Hello Help Desk? I forgot my password. I have to print a powerpoint document for a briefing I am giving in 5 minutes so I need my password reset right now!
[BOFH] Oh....let me check...we can only reset passwords once a day between 6AM & 7AM because it affects the user settings and w
Strong Password Algorithms are a Myth (Score:2)
Re:Strong Password Algorithms are a Myth (Score:2)
The problem isn't so simple (Score:3, Insightful)
Even "good" passwords are bad (Score:3, Interesting)
Between Moore's Law and modern cracking techniques (dictionary attacks, hybrid attacks using both dictionary and brute force, and hash precalculation), nearly any 7-8 character password that will be easy for Joe User to remember is crackable in a very short period of time. Rather than blaming the users for security failure, we should be looking to improving the overall system.
There are a number of things that can be done. First, and most importantly, eliminate the use of protocols that pass usable credentials (password, reversable password hashes, etc.) across the network in the clear. This means no longer using telnet and FTP (except for kerberized versions), doing something with/about Microsoft's NTLM/LanMan hashes, and probably using client certificates as well as server certs for encrypted web traffic.
Beyond that, there are proven techniques that aren't too hard for users to understand. Time sequence tokens (i.e. RSA's SecurID) have been around for a long time and have yet to be broken except for when the attacker has access to the critical seed records. There was an article a while back (sorry, can't remember where) about a bank using a short list of PINs that they mail to the customers. Each time the customer logs in, they use one and cross it off. The system keeps track of it and automatically send a new list before the old one is exhausted.
The point here is that unless we get rid of the users, we will never be able to educate all users all the time. The best way to get the security levels that appear to be needed is to take the human element out of the process as much as possible.
Spaceballs (Score:2)
1 2 3 4
Q W E R T Y
A S D F G
Passwords are passe (Score:2)
I think the best approach is something like a Sun Microsystems Sunray environment where you can stick your SmartCard into any Sunray and instantly pull up your session from the server. Instead of having to "log
Obligatory... (Score:2)
Obligatory Spaceballs [imdb.com] reference goes here...
Automatic Human pronouncable password generators. (Score:2)
Picture Passwords (Score:5, Interesting)
It's a no win scenario (Score:2)
Finally we said ok, this is going to have to change in some way and we instituted some basic requirements. Minimum number of characters, must contain at least one capital letter and at least one lower case letter. Very simple righ
Security Focus (Score:2)
One cannot turn something into something it was never designed to be. One can only bend and twist the system so far... and the Internet, with all of its on-line commerece and banking, has been bent and twisted to the breaking point. Perhaps a total redesign is in orde
Forgotten passwords (Score:2)
Repeat after me... (Score:2)
Security is a process, not a product.
Passphrases vs. passwords (Score:2)
Bookshelf Steganography (Score:3, Interesting)
Monitoring better than Rules (Score:2)
Predictably, passwords were scrawled on post-it's and under keyboards. It had become a mess, and the users we
PasswordSafe (Score:2)
The program saves all your passwords in an encrypted file, which you then keep on your USB keychain. You only have to remember one password to open the safe, and then you can copy/paste your different username/passwords to the site that needs them. As long as you keep the data file on your keychain (and keep that with you) then yo
Stupid Policies, Not Stupid Users. (Score:5, Informative)
What I've noticed lately is that it's stupid policies rather than stupid users that cause the problems.
For example, my current employer requires a monthly password change, minimum of 8 characters, one must be in caps, at least one number and one punctuation mark. 13 months worth of history is also kept.
I have 4 strong passwords that I use regularly (and I come up with new ones every year or so), each consisting of 16-25 random characters, numbers and punctuation (think pound the keyboard and select a bunch of characters from the result). I can't use them because they repeat too often.
The policies also prohibit using the same password multiple services like email, NT Domain logins, *nix servers, web applications and the like. The result is that I have to generate some 20 passwords per month.
What this does is force me to use stuff like "WebApp-01!", "NTLogin-01!" just to be able to remember everything.
I wish we'd switch to RADIUS.
Re:Stupid Policies, Not Stupid Users. (Score:3, Interesting)
No shit! (Score:3, Interesting)
But nooooooo that was not acceptable. It needed a capital letter and a special character. By the time I was done fighting with the password change program, my password was 'Abcdef-1'. Take a wild guess what my password will be when I have to change it next month?
Totally insecure, but at least I can fucking remember it. And if I ever for
Does anybody crack passwords any more? (Score:3, Insightful)
My password is Pi (Score:3, Interesting)
I always imagined that Pi or one of the other irrational numbers would be a great encryption hash. Easy to gererate, remember etc, but hard to hack, since we don't know the starting offset.
It could be a nonrepeating hash or even a repeating one. All you would need to know is the starting offset, you could encrypt a very long document, with a singular and easy to remember hash point, ie Pi x 259313 r1024 would mean Pi hash starting at 259313 repeating 1024 numbers.
I am sure that some pointy head math wizard will explain why this will not work.
Oceans 11 Password (Score:2)
That's pretty damn secure! I have been trying own root on your box all morning with "oceans12"....
Re:Another problem (Score:2)
INDEED.
I don't worry about spam e-mail. The e-mail boxes are all cluttered with kazillions of forgotten password request forms. I even have multiple instances of requests for the same password. Maybe the rest of the world likes to let their web browser remember all of their passwords--I'm not convinced that those mechanisms are secure enough that they can't be mined. Heck. Malware can install itself. What prevents it from minin