Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 19 submissions in the queue.
posted by mrpg on Tuesday October 10 2017, @09:30PM   Printer-friendly
from the gud1dea dept.

Schneier on Security:

NIST recently published their four-volume SP800-63-3 Digital Identity Guidelines. Among other things, they make three important suggestions when it comes to passwords:

-Stop it with the annoying password complexity rules. They make passwords harder to remember. They increase errors because artificially complex passwords are harder to type in. And they don't help that much. It's better to allow people to use pass phrases.

-Stop it with password expiration. That was an old idea for an old way we used computers. Today, don't make people change their passwords unless there's indication of compromise.

-Let people use password managers. This is how we deal with all the passwords we need.

These password rules were failed attempts to fix the user. Better we fix the security systems.

Does this mean we can stop composing our passwords like Q*bert?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Informative) by frojack on Tuesday October 10 2017, @10:14PM (19 children)

    by frojack (1554) on Tuesday October 10 2017, @10:14PM (#580113) Journal

    This was news back in June when it came out, and in August [soylentnews.org] when it was first covered in SoylentNews. (in other words: Dup!)

    Schneier is one of the few that has been stating this long before the NIST decided to get on the bandwagon.
    The rest of the security parrots have been touting crapword and punctuation and expiration for literally decades.

    (Schneier's personal recommendation [schneier.com] isn't all that practical itself if you ask me. It tends to require you to re-use passwords simply because there aren't that many long phrases that immediately come to mind such that you can have one for each login).

    His general recommendation is:

    There's more to passwords than simply choosing a good one:

    1. Never reuse a password you care about. Even if you choose a secure password, the site it's for could leak it because of its own incompetence. You don't want someone who gets your password for one application or site to be able to use it for another.
    2. Don't bother updating your password regularly. Sites that require 90-day -- or whatever -- password upgrades do more harm than good. Unless you think your password might be compromised, don't change it.
    3. Beware the "secret question." You don't want a backup system for when you forget your password to be easier to break than your password. Really, it's smart to use a password manager. Or to write your passwords down on a piece of paper and secure that piece of paper.
    4. One more piece of advice: if a site offers two-factor authentication, seriously consider using it. It's almost certainly a security improvement.
    --
    No, you are mistaken. I've always had this sig.
    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 2, Informative) by davidjohnpaul on Tuesday October 10 2017, @10:22PM (7 children)

    by davidjohnpaul (5377) on Tuesday October 10 2017, @10:22PM (#580116) Homepage

    Schneier also suggests using a password manager. If you use the long phrase to protect it, with it auto-generating all your other passwords for you, then the lack of long phrases that immediately come to mind is less of a problem.

    • (Score: 3, Informative) by frojack on Tuesday October 10 2017, @10:38PM (6 children)

      by frojack (1554) on Tuesday October 10 2017, @10:38PM (#580127) Journal

      Yes, his point number 3 above.

      But if you use a long passphrase, then you need to type that long passphrase 100 times a day. That gets old.

      I use a shore-ish password to get into my password manager. It locks after three failed tries anyway.

      I have that password tattooed on the bottom of my left foot. I have "other foot" tattooed on the bottom of my right foot.

      --
      No, you are mistaken. I've always had this sig.
      • (Score: 5, Funny) by bzipitidoo on Wednesday October 11 2017, @12:44AM (1 child)

        by bzipitidoo (4388) on Wednesday October 11 2017, @12:44AM (#580188) Journal

        You could be in trouble if you ever need one foot amputated. If it's the left foot, you lose your master password. If it's the right, the surgeons might mistake that tattoo as a message for them and amputate your left and you still lose your password.

        • (Score: 1) by DECbot on Thursday October 12 2017, @12:41AM

          by DECbot (832) on Thursday October 12 2017, @12:41AM (#580878) Journal

          No, he'll be okay because he has "other foot" tattooed on the bottom of his feet.

          --
          cats~$ sudo chown -R us /home/base
      • (Score: 1, Informative) by Anonymous Coward on Wednesday October 11 2017, @12:56AM (1 child)

        by Anonymous Coward on Wednesday October 11 2017, @12:56AM (#580192)

        I use a shor[t]-ish password to get into my password manager. It locks after three failed tries anyway.

        What's your threat model? You walk away from the computer then an attacker walks up and tries to open the password manager? Couldn't that attacker make a copy of the password manager's database, then try guessing the master password at his leisure, resetting the counter when he guesses wrong?

        • (Score: 0) by Anonymous Coward on Wednesday October 11 2017, @12:40PM

          by Anonymous Coward on Wednesday October 11 2017, @12:40PM (#580429)

          resetting the counter when he guesses wrong?

          Password-guessing software doesn't bother to update the counter in the first place.

      • (Score: 2) by maxwell demon on Wednesday October 11 2017, @09:00AM

        by maxwell demon (1608) on Wednesday October 11 2017, @09:00AM (#580352) Journal

        I see, your password is "this foot".

        --
        The Tao of math: The numbers you can count are not the real numbers.
      • (Score: 2) by lgw on Wednesday October 11 2017, @06:25PM

        by lgw (2836) on Wednesday October 11 2017, @06:25PM (#580660)

        You don't fool me. "Other foot" is your actual password!

  • (Score: 3, Interesting) by richtopia on Tuesday October 10 2017, @11:19PM (8 children)

    by richtopia (3160) on Tuesday October 10 2017, @11:19PM (#580149) Homepage Journal

    How do you beware the secret question? It is mandatory for most applications to provide security questions, so I cannot opt-out of them. Is the recommendation to treat secret answers as passwords: unique ones per site? Even with a password manager that feels tedious.

    • (Score: 0) by Anonymous Coward on Wednesday October 11 2017, @12:25AM

      by Anonymous Coward on Wednesday October 11 2017, @12:25AM (#580180)

      That's my own practice. I am wary of giving true answers, because the true answers to some of those questions could be discovered by an attacker and because there's a tendency for various sites to use the same security questions. If one gives true answers, and one site is compromised, then the attacker has the answers for all sites that used the same question(s).

    • (Score: 2) by vux984 on Wednesday October 11 2017, @01:00AM (6 children)

      by vux984 (5045) on Wednesday October 11 2017, @01:00AM (#580195)

      How do you beware the secret question? It is mandatory for most applications to provide security questions, so I cannot opt-out of them. Is the recommendation to treat secret answers as passwords: unique ones per site?

      I just generate passwords for them; and save them in my password manager.

      What is your mother's maiden name?

      asdfakjfkjf32lkjf2439ergavakghg2h

      Who was your best friend when you were 12?

      zvnmmn224guagvbaf2thahgasdf3eg

      etc...

      Even with a password manager that feels tedious.

      If you use a password manager, your never going to need these recovery questions anyway. And if you lose your password manager, you lost these answers... so either way its moot. I opt out if I can, or stuff them with garbage. A few sites will ask you a security question on top of your password the first time you login from an new browser etc so for those its an extra step, but for the most part the most tedious thing about password recovery questions is that they exist at all.

      Step 1: choose a difficult password with 10 characters, 3 numbers, 2 special characters, 3 capitals, that also doesn't appear on some list we use etc etc etc...

      Step 2: to recover your password, choose 3 single english word answers to questions that half the people that know you could answer, and the rest could answer by stalking you on facebook... or if you were clever enough to not to have a facebook account, they can still probably get the answers to most of them by facebook stalking your sister instead. (mothers maiden name, city you grew up in, your favorite uncles first name, your first pet... etc, etc...). Oh... and I think my favorite was when the office decided to a know your fellow employee treasure hunt one year and had as all fill out a series of questions -- "favorite sport, city you grew up in, how many siblings etc..." the idea was that we'd then go around and try and find the employee whose favorite sport was curling, and who had 6 sisters, and who had been born in Tenessee... etc etc but it was basically a list of all the sorts of questions these password recovery sites use.

      Step 2a: At least one of these questions will stump you 5 years from now even if you answered completely honestly. Seriously..."What is your favorite food" ... I have no idea what i'd put as my favorite food today.... let alone what I came up with 5 years ago when some site forced me to fill it out.

      So yeah, I use generated gibberish now, and its never been an issue... so far.

      • (Score: 2, Interesting) by Anonymous Coward on Wednesday October 11 2017, @04:11AM (2 children)

        by Anonymous Coward on Wednesday October 11 2017, @04:11AM (#580284)

        One alternative I've used in the past was normalizing and the hashing the question and a salt and using what that spits out as the answer. Easy to duplicate and nothing to remember.

        • (Score: 2) by rylyeh on Wednesday October 11 2017, @07:25AM (1 child)

          by rylyeh (6726) <kadathNO@SPAMgmail.com> on Wednesday October 11 2017, @07:25AM (#580330)

          Nice! Never thought of that!

          --
          "a vast crenulate shell wherein rode the grey and awful form of primal Nodens, Lord of the Great Abyss."
          • (Score: 2) by FatPhil on Wednesday October 11 2017, @09:27AM

            by FatPhil (863) <{pc-soylent} {at} {asdf.fi}> on Wednesday October 11 2017, @09:27AM (#580361) Homepage
            Until they slightly change the wording of a question.
            --
            Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
      • (Score: 0) by Anonymous Coward on Wednesday October 11 2017, @12:48PM

        by Anonymous Coward on Wednesday October 11 2017, @12:48PM (#580433)

        If you use a password manager, your never going to need these recovery questions anyway.

        That's what I used to think. Until I needed to change my e-mail address for Battle.NET. Nope, password is not enough, has to answer the security question. And apparently I don't know exactly how I spelled the answer.

        Now I generate a second password for those stupid security questions and put it in the "comment" field in my password manager. Wouldn't want it to be the same as my password as there is a higher likelihood that a support person will get the answer shown on their screen, as those "security" questions are generally thought to need to be less secure than the password they are often used to reset.

      • (Score: 2) by Osamabobama on Wednesday October 11 2017, @08:15PM (1 child)

        by Osamabobama (5842) on Wednesday October 11 2017, @08:15PM (#580768)

        What is your mother's maiden name?

        asdfakjfkjf32lkjf2439ergavakghg2h

        Those non-Latin alphabets never display quite right for me. It that a central Asian name?

        --
        Appended to the end of comments you post. Max: 120 chars.
        • (Score: 2) by Yog-Yogguth on Sunday October 15 2017, @11:14AM

          by Yog-Yogguth (1862) Subscriber Badge on Sunday October 15 2017, @11:14AM (#582601) Journal

          Indeed it is! If you squint you'll notice it's the ASCII-art version of UTF-8 Telugu (scroll down and look at the sample text here [omniglot.com] and how they compressed the alphabet into Unicode here [wikipedia.org]). Telugu is the world's 15th most spoken language with at least 75 million speakers (wiki link [wikipedia.org]).

          Her name is "Daisy" :P

          I can't speak Telugu, it's all Dravidian to me (another link [wikipedia.org]). (I don't speak Greek either).

          --
          Bite harder Ouroboros, bite! tails.boum.org/ linux USB CD secure desktop IRC *crypt tor (not endorsements (XKeyScore))
  • (Score: 2) by NewNic on Tuesday October 10 2017, @11:56PM (1 child)

    by NewNic (6420) on Tuesday October 10 2017, @11:56PM (#580166) Journal

    I would add one more:
    5. Make sure that the password to each of email accounts is never re-used anywhere else.

    --
    lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
    • (Score: 2) by FatPhil on Wednesday October 11 2017, @09:28AM

      by FatPhil (863) <{pc-soylent} {at} {asdf.fi}> on Wednesday October 11 2017, @09:28AM (#580362) Homepage
      BUt that's just "Never reuse a password you care about." - you clearly care about email accounts.
      --
      Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves