<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Good, bad &amp; ugly - Your password in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Good-bad-ugly-Your-password/m-p/131#M5</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;I have already been ranting online about passwords several times. They might be there to protect your digital assets but are also a liability. There are a lot of articles about user passwords being easily guessable. Usually they blame the user and his/her stupidity, the inability to select and remember a password. I consider this plain wrong. Most of those errors are enforced by anachronistic and bad password policies.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;PASSWORD REQUIREMENTS&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;A good password&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;must&lt;/STRONG&gt;&amp;nbsp;have two properties:&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff; font-size: 14.85px;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;EM&gt;&lt;SPAN&gt;1) It has been memorized by the user&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2) It is difficult to guess for a third person (even if he/she knows the user well)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;But in most cases another requirement is thrown into the mix:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&lt;EM&gt;3) The password shell be complex (have a high entropy)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;Usually the requirements take the form of a password policy like&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://support.apple.com/kb/ht4232" style="color: #cc6666; text-decoration: none;"&gt;this&lt;/A&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; font-size: 14.85px; margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must be at least 8 characters long&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must contain upper- and lower-case letters&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must contain a number&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must contain a non-alphanumeric character&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;You notice anything? Yep, this policy only&amp;nbsp;focuses&amp;nbsp;on the third requirement. And it does so at the expense of the first requirement and (knowing human psychology) it also has a negative impact on the second requirement.&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff; font-size: 14.85px;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;A good example (on how not to do it) was implemented by the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://portal.cs.oag.state.tx.us/OAGStaticContent/portal/login/help/listPasswordRules.htm" style="color: #cc6666; text-decoration: none;"&gt;Attorney General of Texas&lt;/A&gt;:&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;A href="https://1.bp.blogspot.com/-jmlpLVJNoMA/VGMK6js_TaI/AAAAAAAADCc/BSoT8jv68fM/s1600/Passwords.JPG" style="color: #cc6666; text-decoration: none; margin-left: 1em; margin-right: 1em;"&gt;&lt;IMG height="126" src="https://1.bp.blogspot.com/-jmlpLVJNoMA/VGMK6js_TaI/AAAAAAAADCc/BSoT8jv68fM/s400/Passwords.JPG" style="border: none;" width="400" /&gt;&lt;/A&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;They try to specify entropy in details which is kind of ironic.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;THREATS TO PASSWORDS&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Let us take look at how the security of password can be compromised:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;OL&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The input of the password has been observed (by eavesdropping,&amp;nbsp;key-loggers&amp;nbsp;or by the ordinary Mark 1 Eyeball)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password has been re-used by the user in a different context where the attacker has access to it&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The attacker gained access to the encrypted storage of password and managed to extract it from there&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password has been guessed by the attacker&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;DIV&gt;&lt;SPAN&gt;How does having a complex password help you against these attacks?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;UL style="margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;In case of an attacker observing the user entering the password, no complexity will help. Rather the contrary, a password with mixed upper/lower-case, numbers and special characters is entered at a significantly slower pace. This helps an attacker observing the password by good old-fashioned peeking.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;If the password is known to the attacker from the use in a different context, the complexity is no help either. Knowing the psychological side, cryptic passwords are rather compound the problem. Once a user has found a password that fits the typical policy, he tends to use it wherever such a password policy is in place and therefor increases the chances of an attacker to use a known password of the user in a different context.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;In case of access to the&amp;nbsp;encrypted&amp;nbsp;password store, the complexity clearly helps to hamper the attacker (if the password is encrypted properly).&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;One would expect that password policy should help making a password un-guessable for a third person. From my personal observation the contrary is true. Under the watchful eye of a password policy they tend to stick to first names, upper-casing the first or last letter, replacing characters by similar looking special characters or numbers and/or adding numbers at the end (like birthdays).&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Only in one attack scenario choosing a complex password helps, in all other&amp;nbsp;scenarios&amp;nbsp;it does not have any or even a negative impact. So let us look at this scenario a bit more detailed.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;DECRYPTING PASSWORDS&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;To decrypt the password of a user, the attacker has first to have access to the password storage. At which point the first and most critical security failure has already occurred. And the user had nothing to do with it.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;When it comes to decrypting a password, the algorithm used is a more important than the complexity of the password. If the service provider has not done his home work, complex passwords offer only little protection. This is another critical point, where the user has no influence whatsoever.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;But in case of the service provider having botched the safety of his password file&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;but&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;made everything correct when choosing the algorithm the complexity of the user passwords can offer extra protection against the attacker.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Does this case justify all the negative impact?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;I want to point out, that the safety of the encrypted password is not the responsibility of the user. So would say:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Don't make him part of the process here.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Don't shift the responsibility to to him where the service provider is responsible.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Remark: I did not specifically address the issue of an attacker trying out all passwords by automatically entering them one after another. It falls into the same category since it starts with a critical error on the service provider side by allowing this.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;WHAT SHELL WE TEACH USERS ABOUT PASSWORDS?&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;I think we should focus on the first two requirements i started this blog post with:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;UL style="margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;Choose a password you can remember&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;Use a password someone else does not associate with you&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;SPAN&gt;and (which is more important than complexity):&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;UL style="margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;Use distinct passwords, at least for the most critical uses (Work, Banking, Apple, Facebook, Google, Paypal, Amazon) and never use those somewhere else.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;SPAN&gt;If the user follows those three&amp;nbsp;advice&amp;nbsp;only, his security would be greatly improved. It is much better to use several (cryptographically) weak passwords than one good one for everything.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;WHAT ABOUT PASSWORD COMPLEXITY?&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;I am not opposed to complex passwords, as long as it has no negative impact on the more important issues. There is nothing bad about advising the user about his password being weak or strong as information.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;But if you do so, please do it right. Do not just look for which kind of characters are used. Don't care about the source of entropy as long at it is there.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;"Test1234!" is not safer then&amp;nbsp;&amp;nbsp;"mucho danke shopping magazzini", rather the opposite. Let the user find his way to create a memorable complex password. If you force him into a scheme you think best, you will weaken passwords.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;And:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Except for the most critical uses, 40 bits of entropy are enough.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If it is not enough, you need to rethink the way you store your passwords.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;That is why i think&amp;nbsp;&lt;A href="https://subrabbit.wordpress.com/2011/08/26/how-much-entropy-in-that-password/" style="color: #cc6666; text-decoration: none;"&gt;XKCD&lt;/A&gt;&amp;nbsp;has it right, no matter what&amp;nbsp;&lt;A href="https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html" style="color: #cc6666; text-decoration: none;"&gt;Bruce Schneier says&lt;/A&gt;&amp;nbsp;(i never thought i would agree on a security topic rather with a comic author than one of my most respected security experts).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;ARE THERE EXCEPTIONS?&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Yes, of course. There are always exceptions. But in those cases you should rather look into using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://en.wikipedia.org/wiki/Two-step_verification" style="color: #cc6666; text-decoration: none;"&gt;two factor authentication&lt;/A&gt;&amp;nbsp;than trying to get the users brain work in a way that evolution did not intend it to.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;H2 style="color: #888888; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;PASSWORD MANAGERS&lt;/SPAN&gt;&lt;/H2&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;It seems to have become a fashion to prohibit the use of password managers, either by written policies or enforcing it in web application. I consider this a bad idea. If a user tells me, that he has problems memorizing passwords of&amp;nbsp;sufficient&amp;nbsp;complexity, i tend to believe him. Password managers are a great help, but personally i want to be able to recite my critical passwords (Amazon, Google, Apple, Paypal) directly (even though backed up by 2FA).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;My suggestion here: Instead of banning passwords managers, help the user pick the right one.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Remark: This a re-post of an old blog post of mine (originally:&amp;nbsp;&lt;A class="link-titled" href="https://blog.literarily-starved.com/2014/05/good-bad-ugly-your-password.html" title="https://blog.literarily-starved.com/2014/05/good-bad-ugly-your-password.html"&gt;Literarily Starved: Good, bad &amp;amp; ugly - Your password&lt;/A&gt;&amp;nbsp;)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Feb 2019 11:07:40 GMT</pubDate>
    <dc:creator>Martin_Seeger</dc:creator>
    <dc:date>2019-02-25T11:07:40Z</dc:date>
    <item>
      <title>Good, bad &amp; ugly - Your password</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Good-bad-ugly-Your-password/m-p/131#M5</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;I have already been ranting online about passwords several times. They might be there to protect your digital assets but are also a liability. There are a lot of articles about user passwords being easily guessable. Usually they blame the user and his/her stupidity, the inability to select and remember a password. I consider this plain wrong. Most of those errors are enforced by anachronistic and bad password policies.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;PASSWORD REQUIREMENTS&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;A good password&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;must&lt;/STRONG&gt;&amp;nbsp;have two properties:&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff; font-size: 14.85px;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;EM&gt;&lt;SPAN&gt;1) It has been memorized by the user&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2) It is difficult to guess for a third person (even if he/she knows the user well)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;But in most cases another requirement is thrown into the mix:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&lt;EM&gt;3) The password shell be complex (have a high entropy)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;Usually the requirements take the form of a password policy like&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://support.apple.com/kb/ht4232" style="color: #cc6666; text-decoration: none;"&gt;this&lt;/A&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; font-size: 14.85px; margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must be at least 8 characters long&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must contain upper- and lower-case letters&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must contain a number&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password must contain a non-alphanumeric character&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;You notice anything? Yep, this policy only&amp;nbsp;focuses&amp;nbsp;on the third requirement. And it does so at the expense of the first requirement and (knowing human psychology) it also has a negative impact on the second requirement.&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff; font-size: 14.85px;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;A good example (on how not to do it) was implemented by the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://portal.cs.oag.state.tx.us/OAGStaticContent/portal/login/help/listPasswordRules.htm" style="color: #cc6666; text-decoration: none;"&gt;Attorney General of Texas&lt;/A&gt;:&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="" style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;A href="https://1.bp.blogspot.com/-jmlpLVJNoMA/VGMK6js_TaI/AAAAAAAADCc/BSoT8jv68fM/s1600/Passwords.JPG" style="color: #cc6666; text-decoration: none; margin-left: 1em; margin-right: 1em;"&gt;&lt;IMG height="126" src="https://1.bp.blogspot.com/-jmlpLVJNoMA/VGMK6js_TaI/AAAAAAAADCc/BSoT8jv68fM/s400/Passwords.JPG" style="border: none;" width="400" /&gt;&lt;/A&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;They try to specify entropy in details which is kind of ironic.&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;THREATS TO PASSWORDS&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Let us take look at how the security of password can be compromised:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;OL&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The input of the password has been observed (by eavesdropping,&amp;nbsp;key-loggers&amp;nbsp;or by the ordinary Mark 1 Eyeball)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password has been re-used by the user in a different context where the attacker has access to it&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The attacker gained access to the encrypted storage of password and managed to extract it from there&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;The password has been guessed by the attacker&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;DIV&gt;&lt;SPAN&gt;How does having a complex password help you against these attacks?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;UL style="margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;In case of an attacker observing the user entering the password, no complexity will help. Rather the contrary, a password with mixed upper/lower-case, numbers and special characters is entered at a significantly slower pace. This helps an attacker observing the password by good old-fashioned peeking.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;If the password is known to the attacker from the use in a different context, the complexity is no help either. Knowing the psychological side, cryptic passwords are rather compound the problem. Once a user has found a password that fits the typical policy, he tends to use it wherever such a password policy is in place and therefor increases the chances of an attacker to use a known password of the user in a different context.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;In case of access to the&amp;nbsp;encrypted&amp;nbsp;password store, the complexity clearly helps to hamper the attacker (if the password is encrypted properly).&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;One would expect that password policy should help making a password un-guessable for a third person. From my personal observation the contrary is true. Under the watchful eye of a password policy they tend to stick to first names, upper-casing the first or last letter, replacing characters by similar looking special characters or numbers and/or adding numbers at the end (like birthdays).&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Only in one attack scenario choosing a complex password helps, in all other&amp;nbsp;scenarios&amp;nbsp;it does not have any or even a negative impact. So let us look at this scenario a bit more detailed.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;DECRYPTING PASSWORDS&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;To decrypt the password of a user, the attacker has first to have access to the password storage. At which point the first and most critical security failure has already occurred. And the user had nothing to do with it.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;When it comes to decrypting a password, the algorithm used is a more important than the complexity of the password. If the service provider has not done his home work, complex passwords offer only little protection. This is another critical point, where the user has no influence whatsoever.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;But in case of the service provider having botched the safety of his password file&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;but&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;made everything correct when choosing the algorithm the complexity of the user passwords can offer extra protection against the attacker.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Does this case justify all the negative impact?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;I want to point out, that the safety of the encrypted password is not the responsibility of the user. So would say:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Don't make him part of the process here.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Don't shift the responsibility to to him where the service provider is responsible.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Remark: I did not specifically address the issue of an attacker trying out all passwords by automatically entering them one after another. It falls into the same category since it starts with a critical error on the service provider side by allowing this.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;WHAT SHELL WE TEACH USERS ABOUT PASSWORDS?&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;I think we should focus on the first two requirements i started this blog post with:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;UL style="margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;Choose a password you can remember&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;Use a password someone else does not associate with you&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;SPAN&gt;and (which is more important than complexity):&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;UL style="margin: 0.5em 0px; padding: 0px 2.5em;"&gt;&lt;LI style="border: none; margin: 0px 0px 0.25em;"&gt;&lt;SPAN&gt;Use distinct passwords, at least for the most critical uses (Work, Banking, Apple, Facebook, Google, Paypal, Amazon) and never use those somewhere else.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&lt;SPAN&gt;If the user follows those three&amp;nbsp;advice&amp;nbsp;only, his security would be greatly improved. It is much better to use several (cryptographically) weak passwords than one good one for everything.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;WHAT ABOUT PASSWORD COMPLEXITY?&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;I am not opposed to complex passwords, as long as it has no negative impact on the more important issues. There is nothing bad about advising the user about his password being weak or strong as information.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;But if you do so, please do it right. Do not just look for which kind of characters are used. Don't care about the source of entropy as long at it is there.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;"Test1234!" is not safer then&amp;nbsp;&amp;nbsp;"mucho danke shopping magazzini", rather the opposite. Let the user find his way to create a memorable complex password. If you force him into a scheme you think best, you will weaken passwords.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;And:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Except for the most critical uses, 40 bits of entropy are enough.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If it is not enough, you need to rethink the way you store your passwords.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;That is why i think&amp;nbsp;&lt;A href="https://subrabbit.wordpress.com/2011/08/26/how-much-entropy-in-that-password/" style="color: #cc6666; text-decoration: none;"&gt;XKCD&lt;/A&gt;&amp;nbsp;has it right, no matter what&amp;nbsp;&lt;A href="https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html" style="color: #cc6666; text-decoration: none;"&gt;Bruce Schneier says&lt;/A&gt;&amp;nbsp;(i never thought i would agree on a security topic rather with a comic author than one of my most respected security experts).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;H2 style="color: #888888; background-color: #ffffff; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;ARE THERE EXCEPTIONS?&lt;/SPAN&gt;&lt;/H2&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Yes, of course. There are always exceptions. But in those cases you should rather look into using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://en.wikipedia.org/wiki/Two-step_verification" style="color: #cc6666; text-decoration: none;"&gt;two factor authentication&lt;/A&gt;&amp;nbsp;than trying to get the users brain work in a way that evolution did not intend it to.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;H2 style="color: #888888; margin: 0.5em 0px;"&gt;&lt;SPAN&gt;PASSWORD MANAGERS&lt;/SPAN&gt;&lt;/H2&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;It seems to have become a fashion to prohibit the use of password managers, either by written policies or enforcing it in web application. I consider this a bad idea. If a user tells me, that he has problems memorizing passwords of&amp;nbsp;sufficient&amp;nbsp;complexity, i tend to believe him. Password managers are a great help, but personally i want to be able to recite my critical passwords (Amazon, Google, Apple, Paypal) directly (even though backed up by 2FA).&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;My suggestion here: Instead of banning passwords managers, help the user pick the right one.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;/DIV&gt;&lt;DIV style="color: #333333; background-color: #ffffff; font-size: 14.85px;"&gt;&lt;SPAN&gt;Remark: This a re-post of an old blog post of mine (originally:&amp;nbsp;&lt;A class="link-titled" href="https://blog.literarily-starved.com/2014/05/good-bad-ugly-your-password.html" title="https://blog.literarily-starved.com/2014/05/good-bad-ugly-your-password.html"&gt;Literarily Starved: Good, bad &amp;amp; ugly - Your password&lt;/A&gt;&amp;nbsp;)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2019 11:07:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Good-bad-ugly-Your-password/m-p/131#M5</guid>
      <dc:creator>Martin_Seeger</dc:creator>
      <dc:date>2019-02-25T11:07:40Z</dc:date>
    </item>
  </channel>
</rss>

