Something I learned a long time ago is that one person's inefficiency is someone else's bottom line. This simple observation explains a lot of the big problems we're facing worldwide. Rather than getting into a discussion of those thorny political topics, however, I want to use this observation as a starting point for discussing something that plagues us all: password policies.
This is absolutely right, and paradoxically, I'm sure the more restrictive the password rules the more risk there is of it being hacked. Weird and wonderful rules dramtaically increase the necessity to write your password down somewhere, and of course, because every site has some different rule associated with it, often enough the password will have a helpful indication of what it's for alongside.
I refuse to ever write my password down, the result is that a number of sites, including one of my credit card sites, necessitates me requesting a password reset each time. That particular company can probably hear my screams of frustration everytime I need to do some on-line accounts.
Keepass (http://keepass.info/) will generate this password for you, but the non-repeating element marks it as less secure.
The rule is: ulds[ulds]{4} - the explanation is at: http://keepass.info/help/base/pwgenerator.html#pattern
Well put, just like CAPTHA's are perfectly computer readable.. but no sane person can read it .. so this comment will probably never be posted :)
The fun part is all the measures in that specific password policy make the password actually weaker than stronger, as they provide an series of rules all the passwords follow, reducing the search space for a password cracker. Oh joy.
Thanks Jason, for the interesting and true comments.
As you say: someone's inefficiency is someone else's bottomline.
Here we have the conflict of security versus ease-of -use for end-users; but also versus the productivity of the Service Desk.
Introducing a piece of technology and setting end-user processes in place then it is possible for organizations to achieve the security requirements formulated by IT-security and at the same time avoiding the troubles when users forget the password - which is the true cost of complex password policies.
Depending on your organization's requirements you can find different commercially available packages which will fit. We have developed the solution FastPass, which helps more than 500.000 users in large organizations to have advanced password policies without being a burden to users and the Service Desk.
Regards
Finn Jensen
FastPassCorp.com
A password policy that strict will result in passwords so difficult to remember the user will simply write it down and keep it near the keyboard. All security advantage is lost at that point.
The only restriction I would enforce in a password policy would be the minimum number of characters (no less than 12). This is all you need to do to ensure stronger passwords, while making it easier for the users to remember them. Think sentences.
If policy don't allow charters to repeat, it reduces number of possible combinations as
per well known formula n!/(n-k)!. How ever Number of combinations with repeating (and order matters for pwd) is n^k
n - number of different characters available
k - number of characters used for password
But that was probably compromises for simplification of password strength and policy check, and preventing passwords like aaaaaaaa :)
So that part is just lazy developers/admins vs lazy users.
Excellent Post. I do, however, have a query: If you were the person in charge of setting the passwords-policy, what all rules would you set?
I think rather than having such crazy complexity, perhaps security professionals should be more interested in setting retry limits/timed lockouts, rate-limiting their web services, and other measures to reduce the threat of automated attacks, rather than working so hard at devising 'clever' complexity requirements... If it's other humans you're worried about, well a human knows to look under your keyboard, in your desk, behind your monitor or anywhere else you are probably keeping your written-down complex password.
For the argument that your user database could be compromised directly, well, perhaps you need to be concerned with protecting that better at the outset too.
Passwords should be moderately complex, but not to the extent this site you describe is. That's crazy.
Anyhow, thanks for writing this article! -J
Displaying comments 1 - 10 of 43 in total