Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Changes in Password Best Practices
Crypro-Gram ^ | 10/15/2017 | Bruce Schneier

Posted on 10/15/2017 3:16:37 PM PDT by zeugma

NIST recently published its four-volume SP800-63-3 Digital Identity Guidelines. Among other things, it makes three important suggestions when it comes to passwords:

These password rules were failed attempts to fix the user. Better we fix the security systems.

http://nvlpubs.nist.gov/nistpubs/...

Why password complexity rules are bad:
https://www.wsj.com/articles/... (link behind paywall)

Why password expiration is bad:
https://securingthehuman.sans.org/blog/2017/03/23/...

Stop trying to fix the user:
http://ieeexplore.ieee.org/document/7676198/


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: passwords; passwordssuck
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-84 next last
To: Blue Highway

Lol, I was expecting that :)
That one PW is not written down, and it is a 28 character combination of numbers, cap and lower alpha, and of course numbers :D

(PITA once a day)


61 posted on 10/15/2017 9:17:55 PM PDT by Bikkuri
[ Post Reply | Private Reply | To 58 | View Replies]

To: Blue Highway

oops, replace one of the ‘numbers’ with punctuation marks ;^)


62 posted on 10/15/2017 9:19:17 PM PDT by Bikkuri
[ Post Reply | Private Reply | To 58 | View Replies]

To: Vendome
Why is there a penguin on the helipad?

What helipad? :)

63 posted on 10/15/2017 9:23:38 PM PDT by Family Guy (A society's first line of defense is not the law but customs, traditions and moral values. -Williams)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Blue Highway
Then there are those with a grid of thumbnail pictures: "Click all pictures showing a car" and as they are clicked another one pops up somewhere else.
64 posted on 10/15/2017 9:54:49 PM PDT by pigsmith
[ Post Reply | Private Reply | To 59 | View Replies]

To: Blue Highway
Yeah, I remember early in the internet when I had multiple email accounts and they required security questions, which I also found way too personal, I would purposely use bogus answers whicch only I would know, but after say 10 years and not using certain email accounts regularly, I had to abandon a few accounts for not knowing certain answers as I never wrote them down. Questions like mother’s maiden name or first pet or first school attended, I would make up bogus names and just try to commit to memory but they would always be fictitious.

Blue, the key to these security questions is, first, they don’t have to be responsive to the question at all, and second, they usually don’t have to be different. So be consistent on every website that asks security questions and you’ll never forget the answers. Finally, for security of your data, they should never be truthful. For example:

As long as you ALWAYS USE THE SAME CONSISTENTLY FALSE ANSWERS for every security questions on every site that uses them regardless of the actual specifics of the questions, you,ll never forget them, never wonder if you typed upper or lower case, and always get access using them, and most importantly no crook can get into your data by researching you to learn what your answers should be.
65 posted on 10/16/2017 3:17:31 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 48 | View Replies]

To: CodeToad

Prying eyes could see a crypto dongle device or security card just the same as prying eyes looking at a cell phone.


66 posted on 10/16/2017 5:17:33 AM PDT by fulltlt
[ Post Reply | Private Reply | To 37 | View Replies]

To: CodeToad

I read the article. However I did not read all 4 volumes of NIST.SP.800.63b. I was hoping you could cut and paste what you referenced since you obviously did read all 4 volumes.


67 posted on 10/16/2017 5:21:05 AM PDT by fulltlt
[ Post Reply | Private Reply | To 38 | View Replies]

To: zeugma

More things we knew 40 years ago. Glad to see the bureaucracy catching up to common sense.


68 posted on 10/16/2017 5:28:10 AM PDT by AustinBill (consequence is what makes our choices real)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bikkuri
I keep all of mine in a PW encrypted .7z file.

I'd strongly recommend Password Safe. It is a great program for keeping track of passwords, (or any data like that) It uses strong encryption on the file. I use a Linux version of that called "keepass2". My strongest password is used there, since it is a big secret that protects many more.

69 posted on 10/16/2017 6:36:45 AM PDT by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 56 | View Replies]

To: zeugma

“Stop it with the annoying password complexity rules. They make passwords harder to remember. “

Not true. Your password should be based on something you remember like your address or phone number when you were a child.
Example : Fone919-275-7334
or Lincoln_Road_917


70 posted on 10/16/2017 6:39:57 AM PDT by AppyPappy (Don't mistake your dorm political discussions with the desires of the nation)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

That works until you forget the password to KeyPass or until KeyPass isn’t available.


71 posted on 10/16/2017 6:41:50 AM PDT by AppyPappy (Don't mistake your dorm political discussions with the desires of the nation)
[ Post Reply | Private Reply | To 69 | View Replies]

To: zeugma

My home list of passwords includes my home list of security questions, since my answers are fake. But with passwords for a hundred websites...I write them down.

There are government websites I use a couple of times a year. The password requirements turn them into a ‘one use and done’ scenario.

For a while, I worked at a place that assigned us passwords, 16 characters, and changed them every 2 weeks. They gave up when they realized EVERY employee kept the password written on their desk.


72 posted on 10/16/2017 7:06:24 AM PDT by Mr Rogers (Professing themselves to be wise, they became fools)
[ Post Reply | Private Reply | To 44 | View Replies]

To: AppyPappy
That works until you forget the password to KeyPass or until KeyPass isn’t available.

I'm not sure why keypass wouldn't be available. There are versions for linux, windows, osx, android, and IOS.

As for forgetting the password being a problem, the post I was responding to mentioned they were using an encrypted 7zip file. Same issue would apply. Also, there are known attacks against the crypto used by 7zip. Better off using PGP or a program with known built-in crypto. Keepass/PasswordSafe can use 3-des, AES, blowfish or twofish, all of which are reasonably strong for any personal use.

As an aside, in the past I've seen folks bitching that you shouldn't let your browser store your passwords. That's true to an extent as not all browsers are created equal. Sometime last year I read a paper on an analysis browser password implementation. Firefox's password encryption implementation seemed to be well designed and implemented, if you choose a good master passphrase. IE, not so much, but then, we don't generally expect actual security from Microsoft products. If I recall correctly, Chrome had some issues as well, though it was generally better than IE.

73 posted on 10/16/2017 7:51:35 AM PDT by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 71 | View Replies]

To: Mr Rogers
For a while, I worked at a place that assigned us passwords, 16 characters, and changed them every 2 weeks. They gave up when they realized EVERY employee kept the password written on their desk.

OMG! Two weeks???? I've never worked any place that stupid before. Thank God. 30 days was the worst for me, and they eventually gave up and went to 60, which is still way too often.

74 posted on 10/16/2017 7:55:56 AM PDT by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 72 | View Replies]

To: zeugma

“I’m not sure why keypass wouldn’t be available.”

Because you are using a different computer. Or your hard drive fails. Or KeyPass gets PWN3D.

We had a guy at work get hit with an Encryption Blackmail. His backups were too old and he used KeyPass for everything. It was a mess.
I keep mine in a MySQL database that gets exported and backed up.


75 posted on 10/16/2017 7:56:09 AM PDT by AppyPappy (Don't mistake your dorm political discussions with the desires of the nation)
[ Post Reply | Private Reply | To 73 | View Replies]

To: AppyPappy
Because you are using a different computer. Or your hard drive fails. Or KeyPass gets PWN3D.

That's why you have backups.

We had a guy at work get hit with an Encryption Blackmail. His backups were too old and he used KeyPass for everything. It was a mess.

Sounds self-inflicted to me. If your backups are old, what's the point of them. Daily backups with regular offsite rotations will protect you from just about anything.

I keep mine in a MySQL database that gets exported and backed up.

Exported as what? Plain text? keepass is a database as well, but the DB itself is encrypted. If your data is lying around in plain text, or even as an unencrypted record in a DB, it can be read.

76 posted on 10/16/2017 8:05:01 AM PDT by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 75 | View Replies]

To: zeugma

Backups??? No one does those. :)

7-Zip-encrypted. The least of my worries. If someone breaks into that machine, I have much worse problems than someone finding an encrypted file that looks like garbage.

We were at a meeting the other day and some guy tried to demo a system but didn’t realize the computer at the client didn’t have his Keypass on it. The company didn’t allow outside computer connections to the network so he didn’t bring a laptop.
Being a programmer, I am not comfortable relying on technology.


77 posted on 10/16/2017 8:13:31 AM PDT by AppyPappy (Don't mistake your dorm political discussions with the desires of the nation)
[ Post Reply | Private Reply | To 76 | View Replies]

To: zeugma; All

Everyone here has some good ideas and stories about remembering passwords and password pain, but I’ve found an easy way to do it. For most sites, I only login every so often, so I go for two or three attempts, then just reset my password. Works pretty consistently!


78 posted on 10/16/2017 11:33:35 AM PDT by Svartalfiar
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Thank you for the info... I’ll look up keepass2 (hopefully available for KDE ;^))


79 posted on 10/16/2017 5:27:28 PM PDT by Bikkuri
[ Post Reply | Private Reply | To 69 | View Replies]

To: Bikkuri

Yup. Works well with KDE. That’s my preferred window manager.


80 posted on 10/16/2017 5:49:31 PM PDT by zeugma (I always wear my lucky red shirt on away missions!)
[ Post Reply | Private Reply | To 79 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-84 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson