Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Password practices

Dorothea Salo
September 07, 2018

Password practices

For LIS 341/640 "Digital Privacy, Safety, and Security"

Dorothea Salo

September 07, 2018
Tweet

More Decks by Dorothea Salo

Other Decks in Technology

Transcript

  1. Your mission (which you have no choice but to accept)

    ✦ Choose a password that Eve cannot break with standard password-breaking tricks… ✦ (some of which we’ve seen, some of which I’ll talk about in a bit) ✦ … keeping in mind that you can’t always trust systems to manage and store passwords correctly. ✦ Do this not just once, but over and over again… ✦ because you typically need a lot of passwords, right? ✦ … without breaking your brain.
  2. Eve’s tricks ✦ Collecting your password hash while it travels

    through the glass tubes ✦ so she can try to crack it at her leisure ✦ Cracking a system to grab all its password hashes ✦ which she can then try to crack at her leisure ✦ Hashing a whole bunch of words in advance, to compare captured password hashes against ✦ “dictionary attack” using “rainbow tables” of hashes ✦ Trying a whole bunch of password guesses ✦ “brute-force attack” ✦ Using people’s known password habits to refine her attempts ✦ So we need to talk about those!
  3. (Another thing Eve can do is look for leaked passwords

    on the open Internet. Yet ANOTHER thing she can do on some systems is try default passwords. We’ll get to these later, but I did want to mention them, because they may turn up in your incident report.)
  4. Common password habits ✦ Repeating passwords across different systems ✦

    Frustration-caused, not-even-trying bad passwords ✦ e.g. “password” or “ihateu” or similar ✦ Personal information ✦ family or pet names, dates, addresses, life milestones, sportsball team names… ✦ Keyboard/number-pad patterns (“qwerty”) ✦ “Leetspeak” ✦ replacing letters with numbers or symbols that resemble them: 13375p34k (and now you know how L3-37 “Elthree” in Solo got her name) ✦ Incremented number at password end ✦ that is, “password1” then “password2” then “password3” ✦ Super-common in systems that make users change passwords often ✦ Capital letter at password start
  5. How does Eve leverage these habits? ✦ In hash comparisons

    or brute-force attacks, try common bad passwords first! ✦ If they don’t work, go on to the rest of the dictionary… but if Eve has a lot of hashes to work with, chances are good ONE will work. ✦ Then try already-leaked/cracked passwords. ✦ Find out personal information that might be (part of) a target’s password. ✦ No luck yet? Try leetspeak word variations, appending numbers, capitalizing words, etc. ✦ There are tools to automate this process. We’ll see one in lab!
  6. Formerly standard password guidance ✦ The guy who proposed this

    guidance back in 2003 freely admitted in 2016 that he didn’t really know what he was doing. So yeah. ✦ This guidance is still in widespread use. Unfortunately. ✦ “Complexity” rules ✦ those tiresome “must contain one number, one capital letter, one lowercase letter, one symbol, and a partridge in a pear tree” things ✦ Length rules ✦ “at least X characters” ✦ You will sometimes see “but no more than Y characters” where Y is a pretty low number (I’ve seen “16” or even “10” or “8”). Any system that does this is not doing passwords right! ✦ Change-passwords-early-and-often rules
  7. Problems ✦ Complexity rules don’t work; people’s responses to them

    fall into patterns. ✦ Like the password1, password2, password3 thing. ✦ Length rules are sensible, and weren’t too onerous… until mobile happened. ✦ Have fun typing that 20-letter password on your phone. ✦ Length plus complexity (numbers, symbols) is even worse on mobile. ✦ Change-early-and-often is a major pain in the rear. People HATE it, and it is a direct cause of poor password choices. ✦ Human memory limitations strike again. ✦ Also human rationality: if you’ll have to change a password shortly, why even bother making it strong?
  8. Another problem: Rules Don’t Apply To Me ✦ Did you

    see that list of Famous People Passwords in your readings? Yyyyyyyyyyyyyyyeah. ✦ Some people think they’re too important to observe proper security. ✦ That’s exactly backwards. The more important they are, the bigger a target they are. They need to be MORE security-conscious, not less. ✦ But who can tell them that and make it stick?
  9. Those password-strength meters ✦ You may have run into them

    on websites: they supposedly tell you how strong the password you’re choosing is. ✦ Most of them are bogus. They let bad passwords through, and call good passwords weak. ✦ Some of them are just plain poorly programmed. ✦ Rule of thumb: LONG is better than WEIRD. ✦ Most of these meters don’t use this rule, often because they were programmed against the (now known-bad) old guidelines.
  10. But why is long better than weird? ✦ Remember that

    we want to keep Eve guessing— make her burn through a lot of time and computer effort brute-forcing password hashes. ✦ I’ll bypass the math, but the basic idea is: adding one additional character to a password adds many, many more possibilities that Eve must try than does changing (say) a letter to a symbol. ✦ If you’re interested in this and/or the mathy bits of it, “password strength” and “password entropy” are good phrases to search on.
  11. New, better guidance! ✦ Issued by US NIST in 2016.

    ✦ Forget about change-early-and-often. (YAY!!!!) ✦ Force password change only when a password or its hash has been cracked or leaked, or when a (verified!!!!!!) user has forgotten their password. ✦ Forget about complexity rules. ✦ Minimum 8 characters. Try not to set a max. ✦ Don’t allow known-bad, known-cracked passwords. The user should pick again. ✦ Don’t use password hints. Don’t use supposedly- secret questions. ✦ Password hints help Eve as well as Alice. The answers to supposedly-secret questions are often easy to ferret out on social media or whatever.
  12. How do we know if a password has been cracked?

    ✦ We can check rainbow tables for bad passwords… but sometimes GOOD passwords get leaked. ✦ If you weren’t angry enough at online services with bad password- security practices, here’s another reason to be angry. A leaked password is a burned password—you shouldn’t use it any more. ✦ We could lurk on the darkweb and buy stolen credentials, but that’s ethically dubious (paying criminals?!) and could get expensive. ✦ Troy Hunt to the rescue, with the Pwned Passwords database!
  13. How Pwned Passwords works ✦ Troy collects as much data

    from mass password breaches as he can. ✦ He makes the entire file available for download. ✦ He ALSO has a query service where systems can find out “has this password/hash been cracked?” ✦ It’s cleverly implemented so that Eve can’t use it as a brute-force tool. ✦ Several systems and at least one password manager are using this service to help people avoid already-cracked passwords, and to check systems for already-set cracked passwords.
  14. So, Dorothea, how should I pick a password? ✦ Whenever

    you can avoid it, DON’T. Let your PASSWORD MANAGER pick it. ✦ 1Password, LastPass, KeePass Password Safe ✦ cross-platform, including mobile ✦ I love these things! Install one for all your friends and family! ✦ When you must: ✦ Passphrase: 4 to 6 words, ideally randomly-chosen (not biblical or Shakespeare phrases!) For extra credit, put a symbol between words. ✦ The first-letter-of-sentence method (“Tflosm”): I hate this, but if you like it, go for it. Better be a long sentence. ✦ For uniqueness across systems: to either of these, add something from the system you’re using (e.g. for Yahoo, add “yahoo” or “yah”).
  15. Other things that help ✦ (especially as part of a

    passphrase) ✦ We’re looking for words that won’t be in lists and that Eve can’t easily figure out (or con Alice into revealing). ✦ Nonsense words ✦ Do you remember the name of your childhood imaginary friend? ✦ If you know more than one language, making up a multilingual portmanteau can work (e.g. Spanglish verb “pasuordear”). ✦ Obscure languages, dead languages, conlangs ✦ Anglo-Saxon? Dead as a doornail. Go for it. ✦ Sindarin, Shyriiwook, or Klingon? Avoid names and words that many fans know (“mellon” “Chewbacca” “Qapla’!”) but otherwise, sure.
  16. Questions? Please ask! This lecture is copyright 2018 by Dorothea

    Salo. It is available under a Creative Commons Attribution 4.0 International license.