Viewing 40 posts - 41 through 80 (of 88 total)
  • Man who wrote password guidelines says he got it all wrong….
  • DezB
    Free Member

    43 million user accounts – Lastfm

    360 million accounts – MySpace

    So, yes, chances are mine were there! Not cos it was a plain word password though, surely?!

    ‘Have I been pwned?’ is great for checking this kind of thing.
    This is not news to some of our mods 😉

    Cougar
    Full Member

    So, yes, chances are mine were there! Not cos it was a plain word password though, surely?!

    Well, no, though that’s an entirely different problem.

    The issue here is one of reuse. A simple way of hacking a secure site is to hack an insecure one and hope that people have used the same credentials elsewhere.

    The email address and password pair you’ve used everywhere for the last 20 years is in the hands of criminals. Do you use the same one for this site? Amazon? Paypal? Your bank?

    plyphon
    Free Member

    Interesting to see if the suggested passwords from Safari and 1Password etc start to change.

    Had a moment earlier this week with the Mrs over this – she used Safari to generate a password, forgot to click “remember me” and instantly forgot the password. She had to click forgotten password within seconds of completing the signup process. What a future we live in!

    I think anyone who doesn’t use a password manager these days is really not doing themselves any favours.

    Something about these don’t sit right with me. Eggs in one basket.

    TBH, I just have 2 factor on anything actually important. It wouldn’t be the end of the world if my STW account was hacked.

    soundninjauk
    Full Member

    Something about these don’t sit right with me. Eggs in one basket.

    Yeah true. As mentioned above almost everything has an email based password reset these days anyway, so if you lose your password manager then you’re probably not totally screwed.

    That just makes it all the more important to protect your primary email though, which is where things like 2 factor come in.

    Cougar
    Full Member

    Something about these don’t sit right with me. Eggs in one basket.

    I have a friend who is an Infosec specialist, coming from a hacker background dating back to the 80s. He’s forgotten more about computer security than I could possibly hope to learn, and I’m not silly. He advocates using a password manager. I’d humbly suggest that you should consider it too.

    Cougar
    Full Member

    That just makes it all the more important to protect your primary email though

    Yeah. I can’t stress this enough TBH. If someone gains access to your email account, they can go to town with “I forgot my password” on all manner of websites. I’d think rather have my bank account compromised than my email account.

    I use two different accounts (well, several actually) on different providers; one I use for day-to-day emails and the other is where all my accounts are registered to.

    zilog6128
    Full Member

    Something about these don’t sit right with me. Eggs in one basket.

    When that basket is Apple, personally I’m satisfied my eggs are safe. YMMV.

    If someone gains access to your email account, they can go to town with “I forgot my password” on all manner of websites. I’d think rather have my bank account compromised than my email account.

    2FA should make this impossible, although I’d guess a lot of (most?) people don’t use it.

    Drac
    Full Member

    So, yes, chances are mine were there! Not cos it was a plain word password though, surely?!

    No but as you’ve now told the internet you use the same password on every one of you accounts the last 20 years you’ve just created a bit of problem for yourself.

    ‘Have I been pwned?’ is great for checking this kind of thing.. This is not news to some of our mods

    There are more than that one.

    jimmy
    Full Member

    In the good old days when we could ask folk their password to fix Lotus Notes, one guy was sweating over giving his password. Eventually did – it was ‘analrape’. Still don’t know why he didn’t change it first, much lolage in the team.

    Cougar
    Full Member

    2FA should make this impossible, although I’d guess a lot of (most?) people don’t use it.

    Moreover, most sites don’t even offer it yet.

    The problem here is that it’s always a trade-off between security and convenience, and faced with that choice many people would lean towards convenience. Using 2FA is an extra step. Using password managers is an extra step. Using longer passwords takes longer to type. People can’t be bothered with all that.

    I think for the longest time people just trusted that if you set a password somewhere, it was safe. This as it turns out was (and is) incredibly naive. I’ve done password reset requests on websites before now and been sent an email containing my password. This shouldn’t be possible – it means that they’re storing your password completely unencrypted, so if their database gets hacked then the hackers can simply read off your password. And it still happens –
    see http://plaintextoffenders.com/

    (The examples of compromised sites previously, last.fm and myspace, were using MD5 encryption which is fast enough to be decrypted by brute force. So better but still not ideal.)

    Times are changing though. The more that high profile sites like Adobe get breached, the more people might start to realise that they might have to start compromising a little convenience in favour of better security practices. (Probably not, but one can hope.)

    Cougar
    Full Member

    In the good old days when we could ask folk their password to fix Lotus Notes, one guy was sweating over giving his password.

    I once did a password audit at a previous employer (back in NT4 days when you could crack password data with a broken biscuit). That was eye opening. As well as many variations on “dave123,” one lass in the office had a password of “bondage69.”

    docrobster
    Free Member

    Lol at the NHS IT security stuff.
    For 12 years we had 4 different windows logins at my practice. One for docs, one for nurses, one for admin, one for reception. Same password for everyone that never changed. (Prior to that we had no passwords to log in to windows)
    Earlier this year the IT guys decided we needed individual logins so we all had our desktops reconfigured and were given individual logins. Each person’s username was firstnamelastname and we all have the same password which is Surgeryname123. Absolutely no way I could pretend to be someone else.
    Now I think we are past 90 days we’ve all had to change our passwords but I notice that there is now a generic login for use by anyone who wants to use the laptop in the meeting room. 2 sets of usernames and passwords written on a piece of paper sellotaped to the desk next to it. This login seems to have been given to the medical students and new registrars that started this week rather than them getting their own ones.
    Luckily we do need either a smart card or another individual username and password to access the clinical system.
    And during the period later when they replaced 23 computers the username and password that the IT guys were using to access all the PCs in the building with full admin rights was written down on the white board in the manager’s office. I took a photo of it in case I needed to change anything after they had gone.
    It’s not great security that’s for sure.

    DezB
    Free Member

    Amazon? Paypal? Your bank?
    I know I’m pretty stupid, but not that… anyway, I didnt say I used it on everything!

    slowoldgit
    Free Member

    Has anyone used Bruce Schneier’s Password Safe? I’d appreciate comments from fellow IT numpties about how demanding it might be.

    km79
    Free Member

    My password is easy to remember as it’s my PIN number for my bank card. Good luck trying to hack that, it’s four numbers, there are literally thousands of combinations, would take for ever sitting typing them in one by one.

    It must be the most secure method because all the best bike locks use the same.

    Harry_the_Spider
    Full Member

    Is it pissgibbon?

    It is now.

    P-Jay
    Free Member

    We use lastpass it’s a total pain in the arse.

    Certain sites will block it auto logging in and make it very difficult to get in.

    Dare use the same password twice and it gets the arsehole.

    Truthfully cyber security is pretty brilliant these days, but the weak point it always the password and there has to be a better way! Someone will always tell you “you should never use the same password for multiple sites” yeah great – my lastpass account has more than 70 sites on it. That’s not gong to happen. So I use the same one over and over (because whilst lastpass is great on PCs it’s terrible on devices).

    Biometrics, god dam we need biometrics.

    CountZero
    Full Member

    I don’t use a password manager, I use a number of different passwords for different places, my bank and building society accounts use a ‘memorable word’ system where you have to tap in three random characters from whatever that ‘memorable word’ happens to be.
    One system I use is an old car registration that I used to have, along with the car model, which gives a pretty random selection of letters and numbers. For others I use words from some ethnic mythology or other mixing letters and numbers; American First Nations mythology is a good source of really quite extraordinary names, and there are a lot of different tribal mythologies to choose from!
    I also use two factor on my phone and pad, fingerprint unlocking and six-digit passcode, so good luck getting into either of those any time this century.

    Cougar
    Full Member

    I do similar to CZ (except I don’t admit my password sources on the Internet…)

    Everything I care about has unique passwords. Everything else has a password created from one of a handful of roots but amended based on the site URL. Eg, if my root was “bobbins” then the password here might be “bobstwbins.” (This is a massive oversimplification, I’d also do some text manipulation on “stw” to turn it into something else so it’s not immediately obvious.)

    retro83
    Free Member

    This is great until you are forced to change one, then you have to remember which site doesn’t fit your pattern. 😡

    I’m reluctantly using Lastpass which is actually pretty good, it autofills in apps on Android as well as websites.
    I tend to click Edit Site and use the notes field to store all the other data you need. Not sure if there’s a better way of doing that.

    DezB
    Free Member

    Most of my passwords are based on bikes and bands. Plenty of random-type words there.

    funkmasterp
    Full Member

    My passwords are either lyrics or whatever I can see at the time of creating the password. I’ve had some interesting ones over the years. Pi55Gibb0n is tempting me.

    Jamie
    Free Member

    Most of my passwords are based on bikes and bands.

    That reminds me. I must pick up the latest Piss Gibbon CD.

    Sandwich
    Full Member

    one lass in the office had a password of “bondage69.”

    Did you marry her?

    mickyfinn
    Free Member

    Three jobs ago (about 2001) I was asked write the company’s password policy. It was three pages of documentation guidelines and then the words ‘length is strength’ followed by a short paragraph on choosing a phrase you could remember. No enforced change policy or complexity policy except it must be longer than 12 chars.

    Cougar
    Full Member

    Did you marry her?

    I considered it “a good lead.”

    Cougar
    Full Member

    Incidentally,

    Does anyone have the original article? It’s behind a paywall.

    deadkenny
    Free Member

    From the OP article:

    “The result is that people create odd-looking passwords and then have to write them down, which is of course less secure than something you can memorize”

    Balls.

    Writing down complex unmemorable passwords for users at home is one of the most secure solutions as it’s extremely less likely you’ll get someone breaking into your house and looking for a list of passwords than it is to have your password hashes stolen online by hackers and then run through a cracker.

    On going for long memorable phrases, tools that check for strength based on the same algorithms and dictionary checks a cracker would use, suggest a shorter random password is as strong or better than a long phrase. Though both may take years to crack, but with quantum computing round the corner that could all change.

    It sounds like the advice change is based more on the fact people don’t do the best thing and take the easiest option, rather than what is a strong password. i.e. suggest making it easier to remember (weaker) but very long (stronger, but a pain in the arse to type).

    Problem I can see is with different passwords for each site, which is still a must in my book. Otherwise, one compromised site means changing it on 1000s of sites. Long phrases even if memorable are going to be tricky unless you make them relevant to the site, then people are going to make them easy to guess.

    Anyway, more stuff on it here:

    NIST’s new password rules – what you need to know

    atlaz
    Free Member

    I’ve done password reset requests on websites before now and been sent an email containing my password. This shouldn’t be possible – it means that they’re storing your password completely unencrypted,

    Maybe, maybe not. We used to confirm the password as part of the process of saving it into our DB. The only time we had it in clear was during that transition from the form submission into the database. You couldn’t, for example, ask for your password to be sent to you after that as we didn’t have it unencrypted or in an easily decrypted form.

    We don’t even do that any more.

    poly
    Free Member

    Deadkenny – how do you know how good the tools that show how hackable a password is? E.g. One site I use says my 18 character password made up from words in a Horse Staple etc style, is WEAK (their worst rating – equivalent to password) even if I use TitleCase or add a single symbol to the end. Only when I add a number does it move up. If I used 6 characters but with caps,lower,symbol,number it says it is GOOD – their second best. and P455w0rd! Gets its best rating. I am sceptical.

    Cougar – password managers make my nervous. If there is a vulnerability all your passwords are hacked – I doubt the average user has any hope of understanding the risk associated with any particular password manager, so other than going with a popular one (all the more reason to try and find an exploit) it might be blind faith. I have a system for remembering them which works well, until either I am forced to update. Each site has a unique password and it wouldn’t be obvious how you get my Facebook password if you saw my Twitter one etc. But I have been considering hashing them for added securit – it makes using them on a mobile a PiTA though. Typing real words on a keyboard is actually ok, but a hash or other nonsense is tough.

    atlaz
    Free Member

    “The result is that people create odd-looking passwords and then have to write them down, which is of course less secure than something you can memorize”

    Balls.

    Of course it is, but 90% of password security advice is based on corporate culture not home use. So, if you write down passwords at work, it’s far more likely that someone will take the post-it off your monitor or keyboard. Shoving them into your address book stored in the drawer next to the spare batteries etc is pretty secure in a security-by-obscurity sort of way. That said though, it’s bloody useless if you forget the password when you’re on holiday or at the shops.

    EVERYTHING you have should be secured with two-factor authentication where possible, it’s as close as you can get to impossible to hack (ignoring the system itself being compromised). I have a yubikey that generates Google Authenticator codes for some stuff, GA codes on my phone for other stuff, texts for some stuff that doesn’t support GA and, of course, bank code generators.

    deadkenny
    Free Member

    Written down can of course be (in a secure way) online, but that’s a single point of vulnerability, but store it in a way custom and only known to you and it’s not an obvious target. Unlike password managers.

    Corporates (lack of) security is very alarming, especially the way default passwords are emailed out in some places and no one changes them, then they’re used as the same password for lots of systems.

    Interestingly NIST are also saying SMS for two-factor auth is also out.

    FuzzyWuzzy
    Full Member

    One of our rules specifies 25+ char randomised passwords for admin accounts (in certain ‘special’ environments) and although we use password DBs copy and paste is also disabled in these environments as part of the standard lockdown – I can frequently be heard swearing trying to type in some of these passwords (especially on Monday mornings or Friday afternoons). I’m sure 2-factor authentication would have paid for itself many times over already in saving on wasted time…

    atlaz
    Free Member

    Interestingly NIST are also saying SMS for two-factor auth is also out.

    SMS is a funny one. In theory, like email, it’s insecure. In practice, short of a targeted attack it’s safe. I assume nobody wants access that urgently to my spamtrap email account so that it’s safe.

    DezB
    Free Member

    I usually print off a little pic and leave it with my laptop to remind me of my new password when I change it. After a day or 2 they become automatic.
    This was the last password reminder pic

    Pic left on desk. If anyone guesses from that, I’ll.. well I’ll.. flippin change it won’t I! 🙂

    GrahamS
    Full Member

    Gizzard, Lizard, Wizard?

    DezB
    Free Member

    .. or maybe a combination of those. We have some bizarre policies in place here. It’s a right pain when you have to change them.

    binners
    Full Member

    Is it mingebiscuit?

    maxtorque
    Full Member

    I think they’ve messed up there security analysis tbh.

    The reason “HORSE” is less secure than “HOR5E” is because you can complete the rest of the word from the starting few letters, because the words architecture is set by the English language layout.

    ie,

    5 letter word starting in HOR

    I bet most people would guess “HORSE” pretty quickly.

    So they claim CorrectHorseStapleBattery is 44 bits of entropy, but it isn’t, because our language has fixed rules as to what letters follow which other ones.

    Anyway, that’s really beside the point, as password security is not linear imo.

    Once you move away from a simple password “1234” or your mums names or whatever, the practical level of security means the following:

    1) You are more likely to get “hacked” by some backdoor (key logger etc) or software flaw. ie, the hackers won’t “Crack” your password they’ll crack the system for entering & validating that password, over which you have no control.

    2) If someone really wants it (your password), they’ll just hold a gun to your head and ask for it.

    3) It’s not like in the films where you can brute force a password any longer. Pretty much all systems will not allow repeated and rapid password entries without flagging an attack attempt, so even say 100 possible combinations of password are pretty secure in reality

    4) Writing passwords down on a piece of paper kept in your home is actually, imo, pretty secure. To get that list requires physical interaction, ie the attacker must be in your home, that immediately rules out 99.9999% of all attack vectors, and once they are in your home, then see point 2) above….

    5) The most likely attacker on a singlular basis is going to be someone you know, someone who can watch you enter your password, steal your bank card etc. They are also therefore easiest to trace and catch.

    zilog6128
    Full Member

    The most likely attacker on a singlular basis is going to be someone you know,

    you mean like a friend of family member with e.g. money worries?

    Writing passwords down on a piece of paper kept in your home is actually, imo, pretty secure.

    you mean super easy to steal by someone who in your opinion is “the most likely attacker”. 🙂

Viewing 40 posts - 41 through 80 (of 88 total)

The topic ‘Man who wrote password guidelines says he got it all wrong….’ is closed to new replies.