Passwords should not be random characters and numbers.

Story: Changing your password regularly is a terrible idea, and here's whyTotal Replies: 25
Author Content
dotmatrix

Apr 19, 2016
9:18 AM EDT
Passwords should be sentences...

like this one:

Once_upon_a_time_I_ate_5_hotdogs!

You can test the entropy of your password here:

http://rumkin.com/tools/password/passchk.php

My example sentence scores well:
  • Length: 33
  • Strength: Very Strong - More often than not, this level of security is overkill.
  • Entropy: 168.9 bits
  • Charset Size: 92 characters
And much better than a typical user password with an average of 45 bits of entropy.

However, it's well past time to retire passwords altogether and start using cryptographic keys instead

Again... there's a cartoon for this one:

https://xkcd.com/936/

vainrveenr

Apr 19, 2016
12:02 PM EDT
Quoting:Passwords should be sentences...

like this one:

Once_upon_a_time_I_ate_5_hotdogs!
On the other hand, it is security technologist Bruce Schneier's contention in the piece 'Choosing Secure Passwords' found at https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html that rather passwords SHOULD BE random characters and numbers.

As Schneier specifically writes :
Quoting:Pretty much anything that can be remembered can be cracked.

There's still one scheme that works. Back in 2008, I described the "Schneier scheme":

So if you want your password to be hard to guess, you should choose something that this process will miss. My advice is to take a sentence and turn it into a password. Something like "This little piggy went to market" might become "tlpWENT2m". That nine-character password won't be in anyone's dictionary. Of course, don't use this one, because I've written about it. Choose your own sentence -- something personal.

Here are some examples:

WIw7,mstmsritt... = When I was seven, my sister threw my stuffed rabbit in the toilet.

Wow...doestcst = Wow, does that couch smell terrible.

Ltime@go-inag~faaa! = Long time ago in a galaxy not far away at all.

uTVM,TPw55:utvm,tpwstillsecure = Until this very moment, these passwords were still secure.

You get the idea. Combine a personally memorable sentence with some personally memorable tricks to modify that sentence into a password to create a lengthy password. Of course, the site has to accept all of those non-alpha-numeric characters and an arbitrarily long password. Otherwise, it's much harder.

Even better is to use random unmemorable alphanumeric passwords (with symbols, if the site will allow them), and a password manager like Password Safe to create and store them. Password Safe includes a random password generation function. Tell it how many characters you want -- twelve is my default -- and it'll give you passwords like y.)v_|.7)7Bl, B3h4_[%}kgv), and QG6,FN4nFAm_. The program supports cut and paste, so you're not actually typing those characters very much. I'm recommending Password Safe for Windows because I wrote the first version, know the person currently in charge of the code, and trust its security. There are ports of Password Safe to other OSs, but I had nothing to do with those. There are also other password managers out there, if you want to shop around.




Quoting:Again... there's a cartoon for this one:

https://xkcd.com/936/
But in the same piece as above Schneier specifically addresses that cartoon:
Quoting:Modern password crackers combine different words from their dictionaries:

What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as "k1araj0hns0n," "Sh1a-labe0uf," "Apr!l221973," "Qbesancon321," "DG091101%," "@Yourmom69," "ilovetofunot," "windermere2313," "tmdmmj17," and "BandGeek2014." Also included in the list: "all of the lights" (yes, spaces are allowed on many sites), "i hate hackers," "allineedislove," "ilovemySister31," "iloveyousomuch," "Philippians4:13," "Philippians4:6-7," and "qeadzcwrsfxv1331." "gonefishing1125" was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, "You won't ever find it using brute force."

This is why the oft-cited XKCD scheme for generating passwords -- string together individual words like "correcthorsebatterystaple" -- is no longer good advice. The password crackers are on to this trick.




Perhaps the thread title of "Passwords should not be random characters and numbers" is rather poor advice to give for the more security-conscious, i.e., poor advice for those requiring heightened security for their more sensitive, confidential programs & data.





dotmatrix

Apr 19, 2016
1:17 PM EDT
I've only had one of my passwords get broken. It was a length twelve alpha-numeric with special characters.

I use a throw away password on this site, because all passwords and usernames are transmitted in plain text... for reasons unknown to me. However, at any given moment, some random attacker capturing clear text traffic could log on to LXer as me and post stuff...All other places I use sentences which include at least one number and three special characters. My typical password entropy is around 180 bits, and none of those have been broken.

In general, most passwords are at least as safe as the website's security. And it is much more likely that the website's database will be cracked rather than a given user's password... and then the web site owner has a problem because he/she failed to salt properly. In most other cases, social engineering is quicker and has a higher success rate in compromising accounts than brute forcing passwords.

Bruce Schneier has some really good advice, but the password stuff... no. It's much better if you can remember your password. It's even better when you don't have one.

***

In the context of the posted article: If you can't remember your password, then you must change the password.
jdixon

Apr 19, 2016
1:23 PM EDT
> Even better is to use random unmemorable alphanumeric passwords (with symbols, if the site will allow them), and a password manager like Password Safe to create and store them.

I use KeepassX for that purpose.
dotmatrix

Apr 19, 2016
1:33 PM EDT
If you use a password safe for passwords, you are trusting the security of the passwords to the password safe.

If there is a remote exploit for the given password safe, you are sunk.

I'm sure passwords generated and secured via most password safes are probably fine. But, in effect, all your passwords have been written down -- on the computer.

As I've posted before, I lament the basic failure of web developers in creating an authentication path for PGP keys. If such a thing existed and was in wide use, smart cards could be purchased for a few dollars like this one:

https://www.sigilance.com/store/

If a user generates the keys on the card, the secret key is never exposed beyond the card boundary. And then, passwords would be entirely unneeded and so would the discussion about password entropy.
jdixon

Apr 19, 2016
1:59 PM EDT
> If there is a remote exploit for the given password safe, you are sunk.

Yep. But an analysis of the alternatives indicates that it's probably the best solution for most people. They only need to remember one good password (well, two if they have a logon password).
jdixon

Apr 19, 2016
2:00 PM EDT
> ... smart cards could be purchased for a few dollars like this one:

25 is not "a few". :)
NoDough

Apr 19, 2016
2:19 PM EDT
To assure ultimate security, I insist that web site operators deny access to my account unless I show up at the hosting location with government issued photo ID and log on to a locally connected workstation. This post alone cost me 8 hours of driving.

Please don't ask me any questions. By the time you read this I will have already left and the answer would require another 8 hour drive.

Signed, No (security by insanity) Dough
dotmatrix

Apr 19, 2016
2:35 PM EDT
Keepass in 2012:

http://www.cvedetails.com/product/23054/Keepass-Keepass.html?vendor_id=12214

http://www.vulnerability-lab.com/get_content.php?id=615

Passwordsafe in 2006:

http://www.securiteam.com/windowsntfocus/5NP0Q20I0E.html

Of course these are old and patched... but it shows that 'password keepers' are not necessarily to be blindly trusted, even ones written by Schneier himself.

>They only need to remember one good password.

If there is one good password and malware has been installed on the system... your good password is no longer a problem for the attacker.

>(well, two if they have a logon password).

Login password is immaterial, since once one is logged in to a system -- that user is logged in... and presumably the logged in user is the user using the password keeper.

>indicates that it's probably the best solution for most people.

I won't argue that point. Simply that most worthwhile account compromises are probably not the result of brute forced passwords -- regardless of entropy.

The big money is in social engineering aka spear phishing, not brute force.

http://www.infosecurity-magazine.com/news/average-cost-of-a-spear-phishing/

>25 is not "a few". :)

$25.00 is less than a Raspberry Pi. And that particular card has NFC... which means you can put in your pocket-protector shirt pocket [like all us nerds have] and just swipe your phone over the card to access your authentication key.

My authentication security is worth a $25.00 one time fee.
jdixon

Apr 19, 2016
2:44 PM EDT
> If there is one good password and malware has been installed on the system

What makes you think I'm using Windows? :) Well, I am at work, but that's not my choice.

> $25.00 is less than a Raspberry Pi. ... My authentication security is worth a $25.00 one time fee.

I have no doubt that it's worth the money. That still does not make 25 "a few".
mbaehrlxer

Apr 19, 2016
3:15 PM EDT
i am sorry, but can someone explain why, if "tlpWENT2m" is a good password, should "This little piggy went to market" be a worse one?

if the cracker can guess the written out sentence, it is just a few permutations to generate and guess the shorter version.

greetings, eMBee.
jdixon

Apr 19, 2016
3:45 PM EDT
> i am sorry, but can someone explain why, if "tlpWENT2m" is a good password, should "This little piggy went to market" be a worse one?

The first requires a brute force attack, since it (in theory) wasn't in a dictionary. The second only requires a dictionary attack.
dotmatrix

Apr 19, 2016
4:08 PM EDT
@jdixon:

That's why the sentence needs to use underscores for spaces, include the punctuation, and throw in a number.

My given example, in the first post, is also not in anyone's dictionary.

The Schneier example is a strawman argument based on an xkcd comic about the inanity of using passwords that are compact and secure versus passwords that are sparse but longer and easier for humans to remember.

Example:

iloveyou

changes to:

I_love_you_2!

The memorability of each of these is about the same. But...

The first version is 28 bits and weak.

The second version is 62 bits and "Strong - This password is typically good enough to safely guard sensitive information like financial records."

However, I wouldn't recommend either since the general phrase "I love you" is common enough to be discovered in either case.

But... a good password sentence is something interesting like:

The_black_phone_on_my_desk_rings_40_times_a_day!

I don't know about most people, but I have no problem remembering something like that for a few months or so... and that sentence is very very unlikely to be discovered via a dictionary attack and has...

243 bits of entropy.
patrokov

Apr 19, 2016
4:15 PM EDT
I used to let KeepassX generate my passwords for me until I had to enter my password into a computer that didn't have Keepass on it. Looking at my phone and trying to type sF34;'22#@(')FJej2l,m] is REALLY hard, and even harder when the password is obscured.

I think the xkcd style passwords can still be effective if you're using different symbols between letters and possibly include punctuaton and numbers like dotmatrix says.. But then again, I'm not a cracker. On the other hand, I've only had one password cracked in 20 years of using the interwebs.
BernardSwiss

Apr 19, 2016
7:12 PM EDT
OK... I'm not an expert, and security is notoriously tricky even for experts, but as I understand the matter ...

- - -

The XKCD style passwords are in fact generally more secure -- but only IF

1) you are using a "password" that is at least six words long (ie. ~30 characters, not a mere dozen characters).

An eight or twelve character "not really random" password including one or maybe two dictionary words (even if obfuscated by " a -> @, r -> 4, o -> 0, before -> B4 " style transliterations) are not terribly secure against modern cracking methods. In fact, the crackers likely won't even bother turning to their dictionaries, for such short passwords.

(note: I respect and admire Bruce Schneier -- but those weren't actually xkcd-style passwords)

But a string of more than half a dozen randomly selected words (from a list of several thousand 5+ character long words), is still big a problem for even modern methods.

(Otoh, cloud computing is redefining "too big" at a scary rate).

2) the "password" isn't being silently truncated to some more "reasonable" length.

that apparently is (was?) a fairly significant problem on many websites (including some banks), and situations where the password setting routine and the password checking routines had different assumptions about how long a password could be, and a problem with many "single sign-in//log-in" situations, where one's signed-in status/credentials are shared among several related sites

= = = = = = = = = = = = = = = =

here's some interesting links:

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” http://arstechnica.com/security/2013/05/how-crackers-make-mi...

Diceware passwords now need six random words to thwart hackers http://arstechnica.com/information-technology/2014/03/dicewa...

Why your password can’t have symbols—or be longer than 16 characters http://arstechnica.com/security/2013/04/why-your-password-ca...
dotmatrix

Apr 19, 2016
9:06 PM EDT
OK...

just do this and be done with it..

$uuidgen -r | sha512sum |awk '{print $1}'

****

It's unclear to me how choosing 6 words from a 'special' list of exactly 7776 words is going result in a password that is easier to remember or more secure than thinking of a few random sentences on your own like these:

Did_the_red_spider_have_7_flies_in_its_web?

I_drove_over_the_gray_mouse_last_night_at_8_o'clock.

All_your_hair_fell_out_because_you_drank_3_extra_beers.

****

Oh well. I suppose it's off to play with gpg authentication or off to the funny farm for us all.
BernardSwiss

Apr 19, 2016
10:42 PM EDT
Straightforward math:

(7776)^6 = 2.210739197×10²³ * (possible combinations of 6 words -- all lower case, no spaces) from the dice-words list

(7776)^7 = 1.7190708×10²⁷ (possible combinations of 7 words -- all lower case, no spaces)

(*) (technically, only 2.206477761×10²³, :-) because you won't use a word twice)

- - - - - - - - - - -

(62)^12 = 3.226266762×10²¹ (possible combinations of 12 alphanumeric characters)

(62)^13 = 2.000285393×10²³ (possible combinations of 13 alphanumeric characters)

(80)^12 = 6.871947674×10²² (possible combinations 12 alphanumeric characters plus special characters)

- - - - - - - - - - -

of course, both probabilities can be expanded by padding with special characters. so a long string (30+ characters) of a half-dozen easily remembered words, beats out a short string (10-14 characters?) of random characters.

The difference between 6 random words and a sentence, is that sentences aren't random -- so a sentence is going to be much more vulnerable to a sophisticated (non brute force) attack.

mbaehrlxer

Apr 20, 2016
4:58 AM EDT
"tlpWENT2m" is not in the dictionary, but it can be generated with a few transformations:

let's assume that "This little piggy went to market" is in the crackers dictionary. the cracking code will use it to generate a few likely passwords:

This_little_piggy_went_to_market Thislittlepiggywenttomarket Thislittlepiggywent2market Tlpwtm Tlpm2m Thislpw2m Tlittlepw2m Tlpiggyw2m Tlpwent2m Tlpw2market

these are all straight forward transformations. add a few more with variations using upper and lower case and tlpWENT2m is found.

greetings, eMBee.
dotmatrix

Apr 20, 2016
8:42 AM EDT
@BernardSwiss:

I understand the math and the probabilities... but I have yet to see proof, mathematical or philosophical, that the 5 sentences I wrote are somehow 'not as good as' using 6 words from the 'magic' list of 7776 words.

I was curious -- and looking through the list, I see I generally hit many of the words anyway.

There shouldn't be anything special about the choice of words nor the 'randomness' of choosing the words - remember the list is a dictionary and the 'strength' of the password sentence is only good within a certain amount of available attacker computing power. It's simply the predictability of certain word combinations. So, I suppose if most human password creators are not creative enough with the password sentence, there may a problem. Perhaps, there may be 200 "I_Love_You_2!" sentences in a long list of user passwords...

However, I strongly refute the need for choosing 6 random words from the special list... and challenge anyone to retrieve my particular password sentences from a list of hashes.

Bad password sentences would be:

How are you doing today?

Thank goodness it's Friday.

*** And so on...

It should be very easy for people to understand that:

I_like_the_2_yellow_dresses_you_bought!

is a better choice than:

letsgopatriots

even though both are easy to create and remember.
mbaehrlxer

Apr 21, 2016
11:18 AM EDT
maybe counting the hits of a phrase on a search engine might give a hint on how likely it is that such a phrase appears in an attackers phrase list.

greetings, eMBee.
flufferbeer

Apr 21, 2016
4:05 PM EDT
@vainrveenr and other "pro-randomizerers",

>> Perhaps the thread title of "Passwords should not be random characters and numbers" is rather poor advice to give for the more security-conscious, i.e., poor advice for those requiring heightened security for their more sensitive, confidential programs & data.

Great link to that Schneier siuggestion on random passwds https://www.schneier.com/blog/archives/2014/03/choosing_secu... . Already bookmarked this.

2c
dotmatrix

Apr 21, 2016
9:10 PM EDT
@flufferbeer:

How to use ssh keys with a DD-WRT router:

http://linuxneophyte.com/dd-wrt-ssh-remote-management-with-public-key-authentication/

I have a DD-WRT router... but I have become disenchanted with the limited capability to do certain things... and, speaking of passwords, I think the passwords are hashed with MD5 -- not great. My router is definitely the weakest security link... and that should just not be the case.

I think the following is going to be my next router in a little while because many things are just so much easier when you build it yourself.

http://www.newegg.com/Product/Product.aspx?Item=N82E16856173128

with this:

http://www.newegg.com/Product/Product.aspx?Item=N82E16820191523

and this:

http://www.newegg.com/Product/Product.aspx?Item=N82E16820016001
flufferbeer

Apr 24, 2016
11:12 AM EDT
> Seems that those better randomized and shorter 10 to 14 mixed character+symbol ones --- as maximally acceptable --- are absolutely EXCELLENT for changing away from those default router passwords that too many rushed admins use!

BTW, that's likely for WE rushed admins..... mostly any of us usaing your basic home routers like Linksys/Cisco's with firmware variants DD-WRT or Tomato variations or OpenWRT.

On the one hand seems to me that word-delimiters in sentences of ANY sort --- standard single blankspaces, underlines, dashes, commas, whatever --- will SOONER rather than later get figured out. OTOH, while it's not great security-wise in terms of passwword-selection, K.I.S.S. really helps in memorization.

2more c's
dotmatrix

Apr 24, 2016
11:46 AM EDT
>word-delimiters in sentences of ANY sort

There is a 72 character limit on bcrypt password hashes using php's password_hash()...

That's this long:

123456789012345678901234567890123456789012345678901234567890123456789012

The_big_blue_mules_lived_in_the_garden_which_was_filled_with_10_grasses!
An attacker would need to guess all the words and the order to break the password sentence. This requires language based cryptanalysis. Cracking a three word sentence is very easy, cracking the above example would take nearly forever... and -- I was under the impression that hashcat has a limit of 54 characters anyway...

Even if an attacker can guess that the beginning of the sentence is a capital letter and the end of the sentence is some punctuation... that doesn't change the entropy that much...
flufferbeer

May 11, 2016
10:07 AM EDT
@jdixon

>> Even better is to use random unmemorable alphanumeric passwords (with symbols, if the site will allow them), and a password manager like Password Safe to create and store them.

> I use KeepassX for that purpose.

now there's this that bob just submited..... https://www.linux.com/learn/two-best-password-manager-gui-ap...

both KeepassX AND Password Gorilla look interesting 'nuf

-fb
jdixon

May 11, 2016
7:15 PM EDT
> both KeepassX AND Password Gorilla look interesting 'nuf

I've used both. I have a slight preference for KeepassX, but either will do the job.

Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]

Becoming a member of LXer is easy and free. Join Us!