This is good news:
The man who wrote the book on password management has a confession to make: He blew it.
Back in 2003, as a midlevel manager at the National Institute of Standards and Technology, Bill Burr was the author of “NIST Special Publication 800-63. Appendix A.” The 8-page primer advised people to protect their accounts by inventing awkward new words rife with obscure characters, capital letters and numbers—and to change them regularly.
***The new guidelines, which are already filtering through to the wider world, drop the password-expiration advice and the requirement for special characters, Mr. Grassi said. Those rules did little for security—they “actually had a negative impact on usability,” he said.
Long, easy-to-remember phrases now get the nod over crazy characters, and users should be forced to change passwords only if there is a sign they may have been stolen, says NIST, the federal agency that helps set industrial standards in the U.S.
That’s nice to know.
Villago Delenda Est
Well, my give up. My passwords always include numerals and special characters, and I can usually remember them.
Baud
“DieInAFire”
Baud
“ShavingTheCatsAss”
Baud
“AllOfThemKatie”
Peale
AntiChafingBallDeodarant. But that might not be random or uncommon.
Origuy
“MustardLostInField”
Cookie monster
“subaru-mustard-bathroom-mop”
Smedley Darlington Prunebanks (Formerly Mumphrey, et al.)
Hallelujah. It’s about time somebody came up with something that people can stick in their heads and then pull back out when they need them. Guess I’ll have to change my passwords.
Roger Moore
My general feeling is that the old password guidelines were written with the assumption that passwords had to be short. If you need a password that’s both short and hard to guess, you need to include symbols, case changes, etc. These days, though, there’s no particular reason to want to keep passwords that short. It isn’t particularly difficult to deal with very long passwords or pass phrases, and (as the comic shows) they can be a lot more challenging to guess.
Major Major Major Major
I use Diceware for my passwords, partly because I just like rolling dice.
Baud
“PunchInTheNeck”
Origuy
The problem is all of those websites and IT policies that enforce the old specification. It will take years to get those changed.
Baud
“FuckOffAndDie”
Smedley Darlington Prunebanks (Formerly Mumphrey, et al.)
How do they get 44 from only 25 letters, 28, if you put spaces between the words?
rikyrah
Evening Cole?
ruemara
I use things I say or like and since I am utterly random and weird, even I forget what they are sometimes.
Major Major Major Major
@Smedley Darlington Prunebanks (Formerly Mumphrey, et al.): Informational (Shannon) entropy != number of letters. (Wiki)
Quinerly
“nekkidmoppinginjuries”
p.a.
VoteEarlyVoteOften
LiveFreeOrDie
Don’tLetMeDown
Fragile:MustBeItalian
Baud
“ThereAreFourLights”
Villago Delenda Est
Baudtwentytwentyvictory
Emma
I use Welsh. Works beautifully.
Villago Delenda Est
Donaldthehorsesass
Cermet
If it is easy to use, memorize and makes sense, no government agency would ever allow it – QED
Villago Delenda Est
“LukeIamyourfather”
SiubhanDuinne
“SkullFuckAKitten”
Baud
@Villago Delenda Est: I miss the exclamation point already.
Baud
@SiubhanDuinne: I can’t believe I forgot that one.
Baud
“TheHelicoptersAreLaughing”
The Simp in the Suit
Ididn’tthinkitwasloaded…officer
SiubhanDuinne
@Emma:
Llanfairpwllgwyngyll123?
The Simp in the Suit
Mynipplesburstwithexcitement
Major Major Major Major
@Baud: Well you don’t have to leave it out.
Basically, suppose you have an option to remember one of two things about a password–either where the special characters are, or an additional word. The extra word will give your password more oomph. If you happen to also have a natural place for an exclamation point, more power to you!
Bill Arnold
FWIW,
My current standard is 3 words (plus an optional numerical suffix) if env is reasonably secure (and guessing rate-limited) or two factor authentication is used, else 4 words. Phrase can optionally be grammatically correct but must not make full sense in this reality. Encryption passphrases much longer. (Still have a few older shorter passwords due to sloth.)
Roger Moore
“Skull Fuck A Kitten”
OldDave
The four words should not be obviously related, so some of these won’t be as unbreakable as one might hope – example: ImpeachDonaldJTrump is way too obvious.
SiubhanDuinne
@ruemara:
Surely you remember the name of your kindergarten teacher.
SiubhanDuinne
@Roger Moore:
Go #26 yourself, Roger Moore.
Roger Moore
@The Simp in the Suit:
Hovercraft full of eels
smintheus
GetABrainMorans
p.a.
ThurstonWhatTheFuck!
IMissMyPets
eclare
@Baud: Love it, a tradition is born. Of course can also use ShutTheFuckUp.
Roger Moore
@SiubhanDuinne:
Mass of Vicious Vitriolic Jackals
Roger Moore
Lord And Master Tunch
Baud
“IHateYouAll”
? ?? Goku (aka The Hope of the Universe) ? ?
My passwords are usually random letters with a few capitalizations and some numbers thrown together.
Ex: STubtc84
Is this a bad password, like above?
Major Major Major Major
Technically it’s best if the words wouldn’t show up naturally in a sentence.
eclare
@Quinerly: How is your eye? Hope you are feeling better!
Roger Moore
Fax You My Credenza
Baud
@? ?? Goku (aka The Hope of the Universe) ? ?: A bit short.
Splitting Image
“Dan Rather is a Turnip”
Central Planning
@The Simp in the Suit: strangely, that’s the name of my future 18th century classical kazoo band.
Roger Moore
YourConcernIsNoted
eclare
“BigBrainOnBrett”
Major Major Major Major
@? ?? Goku (aka The Hope of the Universe) ? ?: that password would be less secure than, say, JackalSquirrel1974.
Major Major Major Major
@? ?? Goku (aka The Hope of the Universe) ? ?: that password would be less secure than, say, JackalSquirrel1974.
Emma
@SiubhanDuinne: GwernblaenllinAwantgysseuin.
Baud
“BernieWouldHaveWon”
SiubhanDuinne
@Roger Moore:
All Your Base Belong
schrodingers_cat
AllYourBaseAreBelongingToTunch
schrodingers_cat
@Baud: MahatmaBaud
? ?? Goku (aka The Hope of the Universe) ? ?
@Major Major Major Major:
cow flowed out of the moons ass
Butthurt Jordan Trombone (fka XTPD)
RoastWolfDickBeef
Ohio Mom
Ohio Dad has been saying this since forever, and it is the protocol we use in our household whenever a password is required. I predict that he will not feel vindicated when I show him this, instead he will be annoyed that it took everyone else so long to catch up.
p.a.
WhatIsTheFrequencyKenneth
BeMyDixieChicken
TalkinBoutMyGeneration
Major Major Major Major
@? ?? Goku (aka The Hope of the Universe) ? ?: @Butthurt Jordan Trombone (fka XTPD): now we’re getting somewhere! You guys are cracking me up.
? ?? Goku (aka The Hope of the Universe) ? ?
@Major Major Major Major:
@Baud:
Well that sucks. I never considered a computer would try to break my password, just another human. And really, who could possibly guess that, besides a computer?
kdaug
MomStuckOnRoof
Butthurt Jordan Trombone (fka XTPD)
@Major Major Major Major: Stephen Colbert reference (Rebecoming the Greatness).
I’m still upset nobody got the jazz reference in my Saturday link to Greenwald.
Major Major Major Major
@? ?? Goku (aka The Hope of the Universe) ? ?: the problem is that there are lots of computers out there indiscriminately trying to crack passwords. You don’t need to be targeted specifically.
Mnemosyne
The current advice from the Giant Evil Corporation I work for is two unrelated but easy to remember words, one special character, and a 4-digit number.
schrodingers_cat
DieInAFire
Mr Stagger Lee
There was a movie starting Ray Liotta and Kurt Russell, in which Liotta was stalking Russell and his family. In the climax Liotta crashes the house,so he needs to assure the security company the password, he says diamond, but Russell changed it. Classic Russell line. “Seven Letters” [email protected] You”:
p.a.
AFishInThePercolator
A Ghost to Most
I’ve taken to using song titles, since they are easy to remember: GimmeShelter_14.
? ?? Goku (aka The Hope of the Universe) ? ?
Perhaps thumb prints would be better than passwords? Passwords can be figured out by computer programs. Every person has a unique thumb print. Several smartphones already have the technology.
kdaug
@Roger Moore: Damnit, no one ever remembers I was being *cheerful*.
A REFUGE for the snarling mass.
It was meant as a compliment.
Major Major Major Major
@? ?? Goku (aka The Hope of the Universe) ? ?: thumb prints can be compelled by police, passwords can’t; and the technology to read biometrics is far from ubiquitous.
Gin & Tonic
@Butthurt Jordan Trombone (fka XTPD):
Maybe it’s just that everybody ignored it because you linked to Greenwald.
Mnemosyne
Also, I feel vindicated that for years I used a newspaper phrase as my password on the assumption that people who didn’t work at my college paper wouldn’t be able to guess it.
Baud
@Mnemosyne:
“TheNYTIsGarbage”?
T S
No individual account on any system should let 1000 guesses per second be tried remotely. Also, decent email services warn you if it looks like someone is trying to guess your password. Hard to guess a password by brute force when you add those factors in. Also, too, use two-factor identification.
chris
Blonde-not-so-dumb joke which (maybe) came from the xkcd forum.
Young lady was told that her password must contain seven characters and a capital so she typed DocGrumpyHappySleepyDopeyBashfulSneezySacramento.
I pick four words from the spines of the books around me and then put those books together at one end of a shelf because brain farts happen.
PhoenixRising
RabidAnonymousPackofJackals
SiubhanDuinne
@schrodingers_cat:
To this day, whenever I see or think “All your base are belong to Tunch,” I automatically set it to the Christmas tune “Il est né, le divin Enfant.” Both the phrase and the carol are corrupted for me forever.
Major Major Major Major
@Gin & Tonic: that’s what I did!
@T S: well, for the 99% of users and web services that aren’t like that, this is good advice.
Mnemosyne
@Baud:
Nah. It was a department joke. I don’t want to say it because I still use it for some low-value passwords of mine (i.e. places where I need to log in but there’s no credit card info or personal information stored).
? ?? Goku (aka The Hope of the Universe) ? ?
@Major Major Major Major:
Huh. Didn’t know that. I guess I assumed because an app on my phone (and the phone itself) has a thumbprint lock.
p.a.
GetOffMyObstacle
? ?? Goku (aka The Hope of the Universe) ? ?
@Mnemosyne: @Baud:
GodblesstheWaPo
Butthurt Jordan Trombone (fka XTPD)
@Gin & Tonic: touché, but the link has to be glossolalia-levels incoherent/nonsensical for the joke to work
Like so: hamannadalooloourszuladudziak
Roger Moore
@? ?? Goku (aka The Hope of the Universe) ? ?:
Biometrics have the problem they can’t be changed easily if somebody gets a copy of them.
p.a.
@SiubhanDuinne: I think it’s the McGarrigles (sp?) who do a nice version on The Chieftain’s xMas album.
Schlemazel
@Emma:
DOn’t count on foreign words alone for security! The hackers have many dictionaries including most languages. Because of entropy a long password/phrase is more secure but it does not hurt to add numbers and special characters just to be safe. The simple way to add them is to use them like spaces so correct1horese2battery3. The way passwords are hacked makes that a lot harder to find – and for gods sake don’t use that password from XKCD because hackers are looking for that one
PhoenixRising
WellDoneWithKetchup
raven
We have to change our work email passwords every 6 months, I’ve got a year to go so I started using my Army serial number. 50 years and it’s clear as bell.
Roger Moore
@T S:
They’re worried that somebody will steal the password file. Any place with decent security will store the password hashes instead of the passwords themselves, but it’s still possible to do a dictionary-based attack against the hashed passwords, especially if they aren’t well salted.
Percysowner
I’m old enough that we had letters in our phone numbers and I called my grandma all the time, so I have the perfect 7 digit password memorized from 50+ years ago.
Frankensteinbeck
This has been known for years. All that stuff about constantly changing your password, and adding numbers and characters, that was arbitrarily made up by system devs who thought it sounded like it would help. When it was actually studied, it made no difference at all. Hacking methods almost always depend on either going around authentification, or knowing your password ahead of time.
EDIT – But I’m glad it has finally been officially declared by people who might actually have influence in changing annoying systems.
Ruckus
@SiubhanDuinne:
I don’t remember the names of my favorite teachers, or even the ones that I hated. I remember the names of the guys I served with that I liked. Most of them. Some of us have a hard time hearing names and remembering them even if we are familiar with the people. I don’t know my moms mother’s first name, I only knew her as grandma. She did pass away when I was 9 or 10 though.
germy
“WeFiredKermit”
SiubhanDuinne
@p.a.:
Rufus Wainwright’s mother. Works for me.
Major Major Major Major
@Roger Moore: didn’t LinkedIn or something store them in plaintext? Idiots everywhere.
Butthurt Jordan Trombone (fka XTPD)
“Go7Skullfuck19A1Chicken3”
T S
@Major Major Major Major: A lot of services don’t have two-factor and don’t have warnings…but any system that lets 1000 guesses per second be tried…I won’t say you are wrong, I guess I don’t know…but that’s criminal in itself.
Amaranthine RBG
Okay, here’s a dumb question:
If 3 or 4 word phrases become the new de facto password scheme, would it be easy to crack by just running through 3 and 4 word combinations from a dictionary?
I get that longer passwords are harder to crack when you don’t know any of the characters and every character in the password could be a letter/number/upper or lower case, etc.
But by completely uninformed guess is that they would be easier to crack if each character was assumed to be word.
On second thought, I guess this would be easy enough to fix by making it CorrectHorseBatteryStaple7 or something.
eclare
@Butthurt Jordan Trombone (fka XTPD): KeepFuckingThatChicken
SiubhanDuinne
@Ruckus:
There are, or at least used to be, a lot of sites that would allow you to prompt in case you forgot your password. Usually things like “mother’s maiden name,” “name of your kindergarten teacher,” “breed of your first pet,” “first boy/girl you kissed,” etc. Haven’t seen those kinds of prompts in years, though.
Major Major Major Major
@Amaranthine RBG:
They already do that.
p.a.
RecordInaugurationDayCrown
NoDealingsWithRussia
DownGoesRepealReplace
RepublicanSenateFailSad!
IWonSoBigly
WhiteHouseADump
IAmTheDecider
IsOurChildrenLearning
Gvg
@? ?? Goku (aka The Hope of the Universe) ? ?: as you get older, your skin dries out and it becomes hard to get finger prints. This was explained to us when we were getting foster parent licenses and several of our older helpful relatives did background checks so they could be legal babysitters for us…my older relatives had to try several times. Now I am getting dry hands and sometimes touch screens won’t read my swipes. I have to moisturize. Anyway I don’t think fingerprints are going to work.
Schlemazel
@? ?? Goku (aka The Hope of the Universe) ? ?:
what they do is take a dictionary (the best hackers have custom dictionaries with millions of word and letter combinations) and encrypt each word using a hash function and compare the results to what they can see in the password file. If they get a match they know your password. It takes a lot of computing power to do that fast & very long passwords take exponentially longer. Be aware that they know ‘leet’ and their dictionaries will have words where the o’s are zeros, the i’s ones the t’s sevens etc.
PhoenixRising
@Percysowner: I use my childhood phone number, which I can’t forget and no one could guess. My sister is my backup system; if I get hit by a truck she can break open my password storage file. I hope. She was class valedictorian & I know we were drilled in kindergarten…
SiubhanDuinne
@Percysowner:
EUclid 3-4990
(Not an actual password)
Butthurt Jordan Trombone (fka XTPD)
@eclare: But mine also serves as a subtle (if serendipitous) dick joke.
raven
@Frankensteinbeck: What about password management sites? I use last pass and it has a PW generator.
schrodingers_cat
ThreeSticksBeatsTwoScoops
Schlemazel
@? ?? Goku (aka The Hope of the Universe) ? ?:
Seriously, I have no finger prints. We have a secure room where I work that requires a card and a fingerprint. I have to be escorted every time because they cannot capture a print from any of my fingers.
Mnemosyne
@Major Major Major Major:
So is the difference that they’re (ideally) 3 or 4 unrelated words (not a phrase) so it’s hard to guess what each individual word is?
I’m also assuming it’s kind of like the advice you get when locking up your bicycle: thieves who really, really want your specific bicycle will keep working until they break all of your locks, but thieves who just want to steal A bicycle will move along if you make it too much of a pain in the ass for them.
p.a.
@Mnemosyne: That’s the key to much non-computer security; kind of like you don’t have to outrun the grizzly, just outrun the next person.
mai naem mobile
ButtherEmails
ButHeremails
ButterEmails
HelikesemailsINALLCAPS
Bannonsuckshisouioui
eclare
@SiubhanDuinne: I still see them, and so many of them either don’t apply to me as single with no kids or siblings or I have no idea. My first grade teacher, really?
sigaba
@Smedley Darlington Prunebanks (Formerly Mumphrey, et al.): It has to do with the search space. A casual word randomly selected has 11 bits of entropy, assuming you’re picking from a list of about 2048 words.
The other method requires a rarer word but the things you do to it, replacing letter with numbers and adding the random symbol here or there, don’t significantly make it more random.
Major Major Major Major
@Mnemosyne: Well, see @Schlemazel above first; they’re looking for low hanging fruit from tables of many many passwords. So more predictable passwords with fewer characters will be guessed faster in general, and phrases that can be mined from a corpus as likely to occur together will be among those guessed first.
ETA: and yes, if somebody really wants your information, there’s always rubber-hose cryptanalysis.
Amaranthine RBG
@Major Major Major Major:
Understood, that’s why I was wondering if the “Just use four random words” is actually good advice?
Ruckus
@SiubhanDuinne:
Yeah those questions were probably answered as the password. So if someone has any info on you and sees that, they are in. When I still run across one one of those I use a word that means nothing to anyone. Mom’s name for example might be dusseldorf758.
Rosalita
IAmAwareofallInternetTraditions
Schlemazel
@Amaranthine RBG:
You either get the whole password or none of it. If your password were correcthorsebattery and somehow I knew you used correcthorse I could build a dictionary with every possible combination of words (and word order) and would eventually get it right but if I knew none of the words I would have to try every possible combination of every possible word. That would take years.
eclare
@Butthurt Jordan Trombone (fka XTPD): I will admit it was too subtle for me.
? ?? Goku (aka The Hope of the Universe) ? ?
@Mnemosyne:
I have a combination bike lock. I ALWAYS make sure to loop it around the front wheel AND the frame to an immovable object. The front wheel on most bikes has a release.
When out I usually see bikes without front wheels, locked securely to a pole or something. I probably should get an extra lock, but I don’t really use my bike as everyday transportation much.
Edit: That and my bike is a WallyWorld Special “mountain bike”. Nothing expensive. I slapped some street slicks on them and use on asphalt trails.
Another Scott
@Origuy: Yup. Plus too many places have limits on the number of characters – they throw a fit if you have more than 15 characters.
It’s all so stupid.
Oh, and iris scanners can be fooled, also too.
Cheers,
Scott.
(Who wants Ctrl-g and TAB and BACKSPACE in his password.)
Roger Moore
@T S:
Again, the worry about guessing 1000 passwords per second isn’t based on an on-line guessing attack. It’s based on them stealing the password file and doing a dictionary attack against the hashed passwords.
For those who don’t know, it’s normal for sites not to store the passwords themselves in the password file. Instead, the passwords are run through a cryptographic hashing function, that is a function that converts the password into apparently unrelated gibberish. Hashing functions are also called trap door or one-way functions because they are easy to perform but essentially impossible to reverse. So the idea is that they store the hashed password because hackers can’t start with that and go backward to the original password.
Hackers have counterattacked by using dictionary attacks. Instead of trying to reverse the function, they just take all the words in the dictionary, compute the hash function, and compare it to the hashed passwords to see if they can find a match. Computers are now fast enough they can use not just the dictionaries themselves but also permutations of the dictionaries, like substituting symbols for letters, adding digits to the beginning and end, changing case, and all the other tricks people like to use. They also precompute the hashes and store them so they can reverse the hash very quickly.
So the problem isn’t just finding a password that will keep the hackers from guessing by trying usernames and passwords on-line. You have to have a password that they won’t be able to find when they have the hash and try dictionary attacks offline.
Major Major Major Major
@Amaranthine RBG: a series of random characters the length of four random words will be better, but good luck remembering it. Quantity of characters is a much easier way to add entropy than quality.
Mnemosyne
@Major Major Major Major:
I will reveal the example password that the GEC created for their demos: SushiDiamonds (plus a special character and a year). You’re supposed to pick two of your favorite but totally unrelated things. Are they correct in saying that it should be almost impossible for someone to randomly guess that?
Butthurt Jordan Trombone (fka XTPD)
@eclare: How one could be able to skullfuck a chicken, is the key to the punchline here.
NotMax
ThisIsMyPassword
ParsleySageRosemaryThyme
SexOnTheBeach
ItsFullOfStars
WhatsTheFrequencyKenneth
IAmTheWalrus
UseTheForceLuke
Brachiator
@SiubhanDuinne:
There are plenty of sites and businesses that still use these profiles and reminders. A rule of thumb is never to use real personal information unless you absolutely have to.
Mike J
Since JC was asking about VPNs, did anyone see the story that came out today about the scam VPN injecting tracking in all its traffic?
Major Major Major Major
@Mnemosyne: someone? Without knowing you or the formula? Sure, that would be pretty hard. Knowing the formula, well, assemble a list of things people like and the most-picked numbers.
Another Scott
@T S: Yup.
Cheers,
Scott.
Schlemazel
@Mnemosyne: @Mnemosyne:
there are a couple of problems & they are the same as insisting there be a special character. Lazy people will always make the first or last char an exclamation point, the dictionaries try that, so if I know the rules I would append or prepend ‘2017’ to every guess. It isn’t terrible but the fact that they publish the rules makes it less secure because it can reveal a pattern.
Schlemazel
@Mike J:
I assume NSA has several VPN provider sites out there so I am not surprised
You are not going to be safe from a nation state, they will use metadata to identify targets and then focus on breaking whatever they use. Hell NSA had dozens of tor relays so instead of being anonymous you were feeding data right to them.
NotMax
@Schlemazel
There are more than a few ‘free’ VPNs which have holes big enough to drive a UNIVAC through.
trollhattan
@Schlemazel:
Weird. Maybe your fingers are overinflated, can you let some air out?
Fair Economist
@Amaranthine RBG:
3 words, sort of. 4 words, no, because there would be too many combinations. A typical American has an active written vocabulary of 10,000, which makes 10 quadrillion possible four-word combinations. It would just take too long to run the list, even with a computer.
Some caveats, though – you don’t want a phrase, because there are far, far, fewer 4-word phrases in English. You also want to use some less common worlds. If all the words were from the 1000 most common (ten hundred most common in the Thing Explainer) then there’s “only” a trillion, which is crackable with physical access to a device (still not for most remote access).
3 words instead of 4 drastically reduces the numbers, which is why you want 4.
Schlemazel
@trollhattan:
It is related to a skin condition but I get a lot of mileage out of telling the kids at work it is the result of my time with MIB
Brachiator
@Mnemosyne:
Some hackers are going after businesses because a lot of companies are lazy and stupid about customer and internal security while individuals have gotten smarter. So if a company has your ID and password in an unsecured and easily accessible database, it doesn’t matter how great your login info might be.
Also, people are often predictable, using popular phrases. Game of Thrones fans might use winter is coming.
If you are a very public person, you may announce your favorite stuff, making a guess easier. Rumor was that some celebrity used her dog’s name as a password and she often mentioned the name in interviews.
p.a.
@trollhattan: Occupation: cat burglar?
Emma
@Schlemazel: I don’t. It’s WelshPlus.
p.a.
@Fair Economist: tRump’s biographer says he has an active vocab of only 200 words. But he’s already exposed covfefe to the public.
The Lodger
@SiubhanDuinne: Thanks. Just… thanks.
Fair Economist
@PhoenixRising:
First: you’d be surprised what they have records of. Second, if they’re using an automated attack method, simply trying all 7 digit phone numbers is trivial.
p.a.
@Emma: Is every letter considered a vowel in Welsh?
Major Major Major Major
@Fair Economist: if you know where Phoenix grew up you can narrow it down significantly too.
Quinerly
@eclare:
Eye seems to be all clear today. Painful Saturday night. Appointment with eye doctor for a final check on the healing later this week. Thanks for asking. Have a great evening.
dm
@Smedley Darlington Prunebanks (Formerly Mumphrey, et al.):
Each word provides about 11 bits (implies that they’re drawing from a 2000-word (2^11) vocabulary — a bigger vocabulary implies more bits).
It’s important that the words be random — if you can predict the next word from the previous one, that helps the attacker. If the four-word phrase is likely to appear anywhere, that gives the attacker some help. So: it may be a good idea to Google your phrase before using it. A lot of hits => The phrase is in an attacker’s dictionary.
Schlemazel
@Emma:
good
although mixing Welsh with English would be a great idea as long as they didn’t figure that out. But if you didn’t always use the same words or the same language order trying to hit 4 words of some combination of 2 languages is much more difficult
Quinerly
@p.a.:
GrabThemByThePu**y
You forgot one.
Jay S
@? ?? Goku (aka The Hope of the Universe) ? ?:
not true, some people do not have fingerprints at all, My sister claims hers were worn off over time. It was a problem when her job required prints. There may be a set of bio-metrics that can cover every one but a single one will have outliers.
Ruckus
@Schlemazel:
5 words, 3 languages. Not common words and less used languages.
Omnes Omnibus
@Schlemazel: And, by that point, the U-boats have sunk the convoy.*
*Why, yes, I am re-reading Enigma.
different-church-lady
@Major Major Major Major:
“riverrun, past Eve and”
Major Major Major Major
@different-church-lady: I bet Joyce is in the hackers’ corpus.
Roger Moore
@Amaranthine RBG:
The point is that the effort goes up enormously as the number of words increases. Imagine that you’re starting with a tiny dictionary that has only a thousand words in it. Obviously a hacker would only have to guess a thousand times to get one. If you add a two digits to the end, you increase that to a hundred thousand. If instead you use two words you get a thousand times a thousand, or a million, possible choices. If you go up to four words, it’s a thousand times a thousand times a thousand times a thousand or a trillion possible choices.
And that’s assuming you’re choosing from only a thousand words. If you’re choosing from ten thousand, four words gets you to ten quadrillion possibilities. Basically, adding one word is as effective as adding several digits or replacing a few letters with symbols, but the added word is probably easier to remember and type.
different-church-lady
Different-Church-Lady’s rule: every possible event in life is covered by either (a) an xkcd, (b) a Monty Python Sketch, or (c) a Louis CK routine.
Geeno
My Invader Zim based series of passwords started last year with the line “Gir, Bring me cow” with some occasional LEET speak numeric substitutions from my gaming (FPS) days and a remembered pattern of altered capitalization/punctuation. Since the lines were funny when I heard them first, they’re easy to remember, and Invader Zim was delightfully random in many ways. I’ve since branched out to other shows, but I always stick to obscure ones with somewhat messed up humor.
different-church-lady
@Major Major Major Major: C’mon, nobody has ever read the thing.
Major Major Major Major
@different-church-lady: I have!
@Geeno: whoever convinced them to give the guy famous for “Johnny the homicidal maniac” a kid’s show is an impressive salesperson.
Ruckus
@different-church-lady:
My entire life is covered by all three. There is laughter.
ETA Not saying the bits were aimed at me or intended to be about me but still….
Jim Parish
Of the various institutions I have passwords with, there is only one which asks for (or accepts) multi-word passwords: Discover Card. Pity I almost never use that card….
namekarB
Address from my growing up neighborhood (not my own street address). Has numbers, upper and lower case. Works great and easy to remember
Brachiator
@Ruckus:
.I used to use a word that was very obscure in the real world. One day, for fun I did a Google search and found out that the word was very, very common. It was foreign, but also a piece of equipment that was used by a character of that nationality in a hugely popular computer game. I’m not a gamer, so I had no idea.
Roger Moore
@Brachiator:
Unfortunately, you don’t always get a choice. My bank used one of the tools the credit score people have as their password recovery system, where they ask you a series of questions about your previous employers and residences to confirm you’re really you. It sounds clever, but somebody broke into the warehouse where the escrow company that handled my mortgage kept all their files. That gave somebody all the information they needed to get through those checks and reset my username and password on my bank’s website.
The good news is that the people who did it were not quite smart enough. My bank automatically sends me an email every time critical information on my account is changed, so I got a series of emails telling me as they changed my username, password, and address. I got the email in enough time I was able to call the bank and do something about it before the thieves stole all my money.
Brachiator
@different-church-lady:
. I’ve read it several times. For fun.
Major Major Major Major
@Brachiator: Ulysses is the one that’s a slog!
Brachiator
@Roger Moore:
. True enough. As I noted, many businesses have stupid rules and practices that create an easily abused vulnerability.
One site I used to use would not allow passwords of more than 12 characters.
Brachiator
@Major Major Major Major:
Nope. I absolutely love this novel. Used to read it every year. An Irish American co-worker read it for the first time, and read chunks of it aloud. He got the music and the jokes. As always, yer mule age maze very.
Ruckus
@Brachiator:
Still that’s 5 words and different languages they have to crack. That’s a reasonably tough nut.
As we all know, or all should know, anything you can think up can be cracked, given enough time and energy. Also I didn’t say obscure words but should have. The real problem is that so many of the systems that use passwords are not all that secure and that seems to be the weak entry point into the entire system. Because of course we are mostly all too busy or have too limited of memory to use a different password for every place that requires it.
Jay S
@Brachiator:
Apparently there are sites that take long passwords but only use the first 8-12 characters without telling you.
Mike J
@Schlemazel:
There are good reasons to have a vpn, but if you can’t describe the threat hold off. And as Taylor Swift points out, just using https will get you most of the way there.
Ohio Mom
@Quinerly: Whew! Glad to hear your eye is healing space.
terben
WhaleOilBeefHooked
Phenobarbarella
@Ruckus:
That’s why you want to use a password manager. Remember only one long, strong password…and let the generator do the rest.
Emma
@Schlemazel: Not English. Not a modern language at all. :-) In fact, in some cases, not a language at all.
Emma
@p.a.: Not all, no. There are, however, letters that look like consonants and aren’t.
Omnes Omnibus
@Emma: One wonders that the British didn’t use Welsh code talkers like the US used Navajo.
Soprano2
I’ve always thought the convention of having to change our network password every 90 days made it less secure, because some people write the password on a Post-It and stick it on their desk somewhere so they can remember it. I bet our IT department won’t adopt this new convention until after I retire in 9 or 10 years.
catclub
@? ?? Goku (aka The Hope of the Universe) ? ?:
it is now.
catclub
@Jim Parish: My bank card website asks me to update my password but does not force me to. I think mine is good enough so- NO.
GregB
Trumpisadumpwhinyshitheel.
Ruckus
@Phenobarbarella:
What do you do when someone hacks the password generator? That password for your bank has to be stored somewhere and it has to connect to something to work. Putting in an intermediary system may make your password stronger but that also puts another place where an attack can happen. Anyone and everyone is subject to hacking and from a number of directions. All it takes is desire and computing power. There’s more than enough desire in the world and computing power is extremely cheap these days.
Ryan
I swear there was a Wired article or something about this years ago. I switched to phrases long ago. Donnieyoureoutofyourelement.
Groucho48
For years, if the site would allow it (more and more do), I would use the names of two of my characters from the various MMOs and single player games I’ve played. They are longish names…at least 8 characters in each name. I also substitute a symbol for, say, the 3rd and 12th letter. Is that secure enough or should I add more character names? I’ve created dozens, over the years. I’ve always figured it was the total number of characters that was important, not the number of words used.
Applejinx
@Mnemosyne: Not really. The entropy thing means if you’ve got a phrase, even if it’s pretty ‘guessable’, it’s still unlikely for anything to brute-force it and the number of possible ‘normal’ phrases is larger than you think.
“How’s that hope and change thing working out for ya?” is a LOT of characters, incredibly hard to brute force. If you know that’s what you use, it’s just on you to not tell the world ‘Oh, my password is a thing Sarah Palin said in the form of a taunt’ because that narrows it down hugely. But, if they try “hopey changey thing’ or leave out the apostrophe or spaces or use ‘you’ or omit the question mark, they’re still out of luck.
Jim Parish
@Omnes Omnibus: During the negotiations over Irish independence, the two leaders of the British delegation were Welsh, and would discuss matters in secret by switching to their native tongue. (One of them was David Lloyd George; I don’t recall who the other was.) The Irish had no similar capability, because none of them were fluent in Irish Gaelic – only English.
Applejinx
“yOu cAn dO aNything. gRab tHem bY tHe pUssy. tHey lEt yOu dO iT.”
If you’re misremembering the quote, so much the better as long as you’re totally clear on how you think of it. As you can see, if you’re determined to avoid ‘guessable words’ (with a phrase this long, it’s moot) you can pick a simple tactic like ‘I always capitalize the second character’ or ‘reversed caps: first letter, no cap, all other words capitalized’.
That password above is 154 bits of entropy by XKCD standards. (I’m not sure why single words are ’11 bits’ wide if individual characters themselves are at least 8)
Length of phrase is way more important than whether Sherlock Holmes is gonna deduce your line of thinking.
Phenobarbarella
@Ruckus: Not sure what you mean by “hacks the generator.” The generator is an adjustable CSPRNG; it runs off entropy accumulated (typically from /dev/null) on your local device. If you have concerns that a 1337 h4xx0r can specifically target you and acquire privileges to replace the generator on your device which is part of the kernel itself, you may have larger problems. :-)
If, OTOH, you meant “hacks the password manager,” (not generator) then there are two portions to that question, I think. Most good password managers fully encrypt your data, using AES-256 in either GCM or CBC mode. If you’re aware of any current news that AES-256 has been compromised significantly, please share — I have seen none. Well-constructed cryptography ciphers are in use by both state actors (the NSA uses AES-256 themselves) and the larger web, and there only two ways around it — brute force the math (which is essentially impossible, given today’s resources) or find a flaw in the cipher. If some rando 1337 h4xx0r had found a flaw in AES encryption, the world would’ve heard of it by now. That’s not to say it’s flawless forever…just that it’s been banged on by security researchers for more than a decade now, without success.
So if the actual cryptographic cipher itself is considered secure (and it is), the other attack vector would be your choice of master password (the password that unlocks your password manager and generates the actual AES encryption key which transforms your blob of unreadable ciphertext (your password manager’s data) into human- and machine-readable form. In fact, this is where virtually all attempts to break into password managers occur, because by far the weakest link in the chain is not the math of a well-tested cryptographic cipher like AES-256, but the user’s inability (or simple unwillingness) to use a really difficult-to-brute-force master password.
As you’ve noted, computing power is (relatively) cheap. However, there are ways to figure out computational cost of various strengths of password. Yes, if you use “password1” as your password, a sophisticated adversary in possession of your encrypted data would simply run a dictionary attack against your data, and you’d be pwned in short order. But if you take the time to create and use a good master password for your password manager, the landscape changes significantly. Again, most good password managers will strengthen the encryption key derived from your master password with technology that slows the ability of attackers to run multiple guesses-per-second. Tools like hashcat and John-the-Ripper, unchecked, can run in the billions of guesses-per-second. But a key strengthened with something like PBKDF2, especially such as PBKDF2-HMAC-SHA256, assuming a proper number of rounds (something that won’t crush older, less-powerful hardware but WILL be more than a token, say around 100,000) can slow that down vastly. How slow? Again, a lot depends of many variables, such as what kind of hardware you bring to bear on it. Typically this would be a GPU-enhanced system, often multiple-GPUs. With 100,000 rounds of PBKDF2 used to strengthen your AES key, a decent multi-GPU setup (not cheap) would be limited to maybe 40,000 guesses per second. Possibly way fewer, but let’s go with this.
Is that a huge amount? Well, sure. I can’t guess that fast. ;-) But that’s where you, the user, gets to weigh in. The longer and stronger you make your Master Password, the more time it takes to go through every combination. And indeed, many of the suggestions in this thread, including XKCD’s original one of using TRULY randomly-selected (a la diceware) words, are excellent for creating a strong, difficult-to-crack Master Password. How difficult? Well, even if we use bits of entropy (base 2, obvs) instead of longhand, it’s hard to represent the equations here. So you’ll sort of have to trust me here, (unless you wanna test it out for yourself — and if so, you’re my kinda guy! — http://www.shannonentropy.netmark.pl/ ). But your average three-word phrase (assuming proper random selection, yada yada) would be about 39 bits of entropy. At 40,000 guesses-per-second, that works out to be about 68 straight days (24/7) to crack that password. Totally doable. Three words is not enough in today’s world. However because we’re using log scale here, that means the difficulty goes up exponentially as you add words. a four-word Master Password is about 51 bits of entropy. At 40,000 guesses-per-sec, that’s a whopping 1,445 YEARS to crack. Even with all that hardware. A five-word phrase is about 64 bits of entropy, and at 40K gps (guesses-per-sec), it’s 11 million years.
I dunno about you, but I consider most 1337 h4xx0rs to be kinda poster children for short attention span. Not sure how many of them have 11 million years to wait around. :-) Now, if you’re worried that the “hacker” targeting you specifically is a global state actor? You may have larger problems, and much of these calculations would be reduced due to the greater firepower and money able to be brought to bear. But the math is still the math, and as Ed Snowden has continually maintained, properly implemented strong cryptography is one of the few things that DOES actually work. So, get yourself a good password manager, and create a really strong master password. Not only will you sweat less because you have to remember less passwords (or reuse them, a truly terrible idea), you can use it to create really long, strong passwords for all your OTHER sites, which you never have to remember.