The End of Passwords:

Problems

by M. E. Kabay, PhD, CISSP-ISSMP

Professor, Computer Information Systems Norwich University, Northfield VT


I detest passwords. Why do I loathe passwords as a method for authentication? Let me count the ways:


  1. Most systems allow users to choose their own passwords. Most users have no clue how to choose passwords that will resist even the mildest guessing based on elementary research of their interests (family, hobbies, pets, favorite sports teams) or simple dictionary-based attacks (ordinary short words). Many users choose the word "password" or their own name as their password.

  2. If the system applies filters to passwords to impose content and structure requirements (e.g., minimum length, inclusion of numbers or special characters, exclusion of words in a dictionary) then most users use the same password over and over and for every possible application requiring a password including their external e-mail, offshore gambling sites, auction sites, book clubs, and pornography vendors.

  3. Reasonable system administrators require periodic changes of passwords; paranoid system administrators require changes of passwords so often that the users become desperate because they keep forgetting their passwords.

  4. Users faced with demands for changes of passwords adopt a policy of using the same password all the time, or possibly changing a single number in the password; e.g., ramo1bilu, ramo2bilu, ramo3bilu and so on.

  5. Some administrators make the mistake of having a single day (e.g., once a month) on which all passwords expire; they thus create a flurry of interventions as support staff help users who forgotten their new passwords.

  6. If the system applies password histories to prevent reuse of passwords [* see note] on a particular system, users write to passwords down on scraps of paper and stick them to every available surface, often with helpful identifying notes such as, "Password for accounting system."

  7. Most users share their passwords with anyone who asks; e.g., technical support staff, the guy in the next cubicle, and even complete strangers on the street who offer them a chocolate or nothing at all.

  8. Some system administrators still leave their password files accessible to any eight-year-old who wants to run a password cracker for fun and profit. A very few still use unencrypted password files.

  9. Many system administrators still receive no (or ignore any) real time alert when attackers try online password guessing, especially if the attacker uses slow scans that attack many different user IDs, but only one of the time, over many hours or days.

  10. Some system administrators still believe that inactivation of user IDs under password- guessing attack is a reasonable response; they thus hand their system over to attackers for a simple denial of service: try every account with a dummy password. Admittedly, most system administrators understand that requiring manual intervention to reset a lost account is not the cleverest policy in the world; therefore, they configure their systems to have a

    reasonable timeout (e.g., a few minutes).

  11. Sometimes organizations send users both their user ID and their password in the same unencrypted message, making it too easy for accidental or deliberate interception to break security.

  12. In environments where time pressure is extreme, such as medical facilities, many users bypass the nuisance of constant logon/logoff cycles by having workstations logged on every morning by whoever gets there first and then simply using that session all day.


In the next article, I’ll review the usual options for replacing passwords; in the last couple of articles in a short series I will present what I think of as the Holy Grail of identification authentication -- and it's here at last.


[* Note: I cannot resist my favorite error message of all time: Jean-Jacques Quisquater reported this gem to RISKS 21(37):


"Q276304 - Error Message: Your Password Must Be at Least 18770 Characters and Cannot Repeat Any of Your Previous 30689 Passwords"


Commented the correspondent dryly, "New level of security at Microsoft."]


* * *


For Further Reading


Kessler, G. C. (1996). Passwords – strengths and weaknesses.

< http://www.garykessler.net/library/password.html >


Wagner, R. (2003). Windows password weaknesses could threaten your enterprise.

< http://www4.gartner.com/DisplayDocument?doc_cd=116510 >


Wagner, R. (2004). Will trade passwords for chocolate.

< http://www.securitypipeline.com/news/18902074 >


Quisquater, J-J (2001). Microsoft error message.

< ftp://ftp.sri.com/risks/21/risks-21.37 >

* * *


A Master’s degree in the management of information assurance in 18 months of online study from Norwich University – see

< http://www3.norwich.edu/msia > for details.


  1. E. Kabay, PhD, CISSP is Associate Professor in the Division of Business and Management s at Norwich University in Northfield, VT. Mich can be reached by e-mail at < mailto:mkabay@norwich.edu >; Web site at < http://www.mekabay.com/index.htm >.


    Copyright 2004 M. E. Kabay. All rights reserved.


    Permission is hereby granted to Network World to distribute this article at will, to post it without limit on any Web site, and to republish it in any way they see fit.

    The End of Passwords:

    Inadequate Solutions

    by M. E. Kabay, PhD, CISSP-ISSMP

    Professor, Computer Information Systems Norwich University, Northfield VT


    In my previous article on this subject, I ranted about how awful passwords are as a mechanism for authentication of identity. Practically everyone already knows that the for fundamental mechanisms for binding social identity to user ID -- that is, authentication – are



I'm not going to go into the details of these systems in this essay. What I want to point out is that most of these systems are good for session initiation but not so great for automatic session termination. One can place one's finger on a fingerprint reader, insert a magnetic card into a reader, look into an iris scanner, speak into a microphone, type on a keyboard, sign one's name -- all of these methods can allow an authorized user to log on to a system.


The problem is that once the interaction is complete, there is usually no mechanism for automatically detecting the departure of the authorized user. Indeed, if one tries to use tokens such as magnetic cards to detect departure by forcing the user to leave the card in the reader while the session is in progress, one of two unpleasant consequences will result: either the user will leave the card in the reader and walk away or the user will walk away with the card attached to his or her wrist and either be yanked backward or pull the equipment onto the floor with a clatter.


One promising biometric technology to allow automatic session initiation and termination is face recognition. Theoretically, it ought to be possible to set up a camera-based facial recognition system that can correctly detect the departure of an authorized user. However, I don't know of such a system in use (let me know if you do).


Another technology that should allow the kind of automatic logon and logoff I've been dreaming of is proximity cards. We already have long-established access-control systems that use Wiegand cards, which have metal particles embedded in plastic so they produce a unique signature in response to radio waves. Proximity sensors can be placed in the wall to control door locks and allow people to go in and out without having to touch their cards.


For the last 20 years, I have wanted to see a proximity sensor used with workstations to control automatic logon and logoff. This week, I learned of the authentication equivalent of the Holy

Grail: we finally have a good method for fast, effective password-free access control using proximity badges and sensors. And the results are even better than I had imagined.


More in the next article.


* * *


For further reading:


Lynch, C. (1998). A White Paper on Authentication and Access Management Issues in Cross- organizational Use of Networked Information Resources.

< http://www.cni.org/projects/authentication/authentication-wp.html >


Kabay, M. E. (2003). Identification and Authentication lecture, IS340 course.

< http://www.mekabay.com/courses/academic/norwich/is340/14_I&A.ppt >


What is a Wiegand card?

< http://whatis.techtarget.com/definition/0,,sid9_gci852292,00.html >


* * *


A Master’s degree in the management of information assurance in 18 months of online study from Norwich University – see

< http://www3.norwich.edu/msia > for details.


M. E. Kabay, PhD, CISSP is Associate Professor in the Division of Business and Management s at Norwich University in Northfield, VT. Mich can be reached by e-mail at < mailto:mkabay@norwich.edu >; Web site at < http://www.mekabay.com/index.htm >.


Copyright 2004 M. E. Kabay. All rights reserved.


Permission is hereby granted to Network World to distribute this article at will, to post it without limit on any Web site, and to republish it in any way they see fit.

Coping with Strong Passwords

By Charisse M. Sebastian, CNE


[M. E. Kabay comments: I was invited to speak at a meeting of the New England Information Security Group < http://www.neisug.com/ > in May 2004 and was delighted to meet Charisse Sebastian. We had such a great time exchanging stories and ideas about technical support and security that I invited her to write about her insights into the importance of good communications between the IT group and the user community. Here is her contribution to the Network World Security Strategies column with my thanks.]


* * *


In previous articles about passwords, Dr Kabay has expressed his distaste for this method of identification and authentication (I&A). But whether he likes them or not, most of us are stuck with passwords and the management problems they cause.


In an age of hackers, viruses, terrorism and malevolent employees, talking about security can make people either try to glamorize it, à la James Bond, or minimize it, as in, “It won’t happen to me.” Both attitudes are distractions that decrease security. Security is too often an afterthought, especially in the United States, where the American culture of openness can interfere with effective security. Openness is a valid and altruistic attitude for social interactions, but protecting networks from intrusion and accidents is crucial to long-term success in business.

Unfortunately, efforts to make users more aware of security are often met with the attitude that IT must be paranoid or with silent resistance.


The most common sources of conflict where IT and users interact over security are password- protected logins and Internet communications. Until we see affordable improvements in I&A, strong passwords and good management remain essential.


In today’s environment, everybody connected to the Internet is a potential target. Some salient statistics – for what they’re worth:


* * *


M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance < http://www.graduate.norwich.edu/infoassurance/ > and CTO of the School of

Graduate Studies at Norwich University in Northfield, VT. Mich can be reached by e-mail at < mailto:mekabay@gmail.com >; Web site at < http://www.mekabay.com/index.htm >.


Copyright 2008 M. E. Kabay. All rights reserved.


Permission is hereby granted to Network World to distribute this article at will, to post it without limit on any Web site, and to republish it in any way they see fit.

Guide to Enterprise Password Management:

NIST Needs Your Comments

by M. E. Kabay, PhD, CISSP-ISSMP

Professor of Computer Information Systems School of Business & Management Norwich University, Northfield VT


I hate passwords. I think passwords are a dreadful way of authenticating identity: they cost a lot

< http://www.mandylionlabs.com/PRCCalc/PRCCalc.htm >, they change too often (and so users write them down), the rules for preventing dictionary and brute-force attacks are generally easy for users to circumvent (da3isy*doggie, da4isy*doggie, da5isy*doggie…), there are too many of them (and so users write them… oh never mind), and nothing can stop users from writing them down (and sticking them in their wallets, under their keyboards, behind their screens, in their desk drawers….). And yet we constantly hear non-technical managers resisting smart-token- based authentication or proximity cards because they are supposedly too expensive.< http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=17144&TEMPLATE=/Con tentManagement/ContentDisplay.cfm >


Growl.


Well, given that we are still stuck with this wretched authentication method, National Institute of Standards and Technology< http://www.nist.gov/index.html > Computer Security Division < http://csrc.nist.gov/ > of the Information Technology Laboratory< http://itl.nist.gov/ > Computer Scientists Karen Scarfone< http://csrc.nist.gov/staff/rolodex/scarfone_karen.html > and Murugiah Souppaya < http://csrc.nist.gov/staff/rolodex/souppaya_murugiah.html > have prepared SP 800-118, “DRAFT Guide to Enterprise Password Management”< http://csrc.nist.gov/publications/drafts/800-118/draft-sp800-118.pdf > and await your comments for improvement.


The blurb reads, “SP 800-118 is intended to help organizations understand and mitigate common threats against their character-based passwords. The guide focuses on topics such as defining password policy requirements and selecting centralized and local password management solutions.”


As always, this Special Publication is complete and thorough. After the usual introduction to the scope and structure of the document, the authors present a brief overview of passwords (section

2) followed by two major sections and their subsections:


  1. Mitigating Threats Against Passwords

    1. Password Capturing

      1. Storage

      2. Transmission

      3. User Knowledge and Behavior

    2. Password Guessing and Cracking

      1. Guessing

      2. Cracking

      3. Password Strength

      4. User Password Selection

      5. Local Administrator Password Selection

    3. Password Replacing

      1. Forgotten Password Recovery and Resets

      2. Access to Stored Account Information and Passwords

      3. Social Engineering

    4. Using Compromised Passwords


  2. Password Management

    1. Single Sign-On Technology

    2. Password Synchronization

    3. Local Password Management

    4. Comparison of Password Management Technologies


The document ends with appendices containing special considerations for firmware and hardware passwords, a glossary, and a list of common acronyms and abbreviations.


NIST requests comments on draft SP 800-118 by May 29, 2009. Please submit comments by e- mail < mailto:800-118comments@nist.gov > with "Comments SP 800-118" in the subject line.


I submitted six pages of comments and will inflict, er share, one of them in my next column.


* * *


  1. E. Kabay, PhD, CISSP-ISSMP < mailto:mekabay@gmail.com > specializes in security and operations management consulting services. CV online.< http://www.mekabay.com/cv/ >


    Copyright 2009 M. E. Kabay. All rights reserved.


    Permission is hereby granted to Network World to distribute this article at will, to post it without limit on any Web site, and to republish it in any way they see fit.

    IMPERVAious to Common Sense: The Awful Truth about Passwords

    by M. E. Kabay, PhD, CISSP-ISSMP

    Professor of Computer Information Systems School of Business & Management Norwich University, Northfield VT


    One of my favorite correspondents is Nahum Goldmann< http://www.cytrap.eu/files/ReguStand/2007/pdf/2007-05-About-NahumGoldmann-NO- picture.pdf > of Array Development< http://www.arraydev.com > in Ottawa, Canada and publisher of the Journal of Internet Banking and Commerce< http://www.arraydev.com/publishing.asp > and other peer-reviewed publications. Nahum never fails to send out interesting links and commentary, and recently he pointed to a valuable research study that I think will significantly help system administrators in reaching users on the perennial battle over passwords.


    In December 2009, 32 million passwords stored without encryption on the Rockyou.com Website were stolen and published on the Web for anyone to see.< http://www.computerworld.com/s/article/9142327/RockYou_hack_exposes_names_passwords_o f_30M_accounts > The security firm IMPERVA< http://www.imperva.com > published a thorough analysis< of these passwords to see how a large sample of users – not just those responding to a survey< http://www.imperva.com/ld/password_report.asp > – actually manage their personal authentication.


    The results were not good.


    The five-page report is confirmation that passwords are a terrible way to authenticate people.< http://www.mekabay.com/infosecmgmt/end_pw.pdf > Users chose short, simple passwords that would be easy to crack using brute force; nearly half “used names, slang words, dictionary words or trivial passwords (consecutive digits, adjacent keyboard keys, and so on). The most common password among Rockyou.com account owners is ‘123456’.”


    The authors provide clear pie-charts and bar graphs to make their point in a way that anyone can understand, including scoffers who consistently sneer at the security team’s attempts to improve password complexity.


    The last page has simple, clear advice that may reach at least some of your users:


    1. Choose a strong password for sites you care for the privacy of the information you store. Bruce Schneier’s advice is useful: “take a sentence and turn it into a password. Something like “This little piggy went to market” might become "tlpWENT2m". That nine-character password won't be in anyone's dictionary.”

    2. Use a different password for all sites – even for the ones where privacy isn’t an issue. To help remember the passwords, again, following Bruce Schneier’s advice is recommended: “If you can't remember your passwords, write them down and put the paper in your wallet. But just write the sentence – or better yet – a hint that will help you remember your sentence.”

    3. Never trust a 3rd party with your important passwords (webmail, banking, medical etc.)

The advice for administrators is also worth discussing at your next security group meeting. The PDF file is free, simple to distribute, and attractive. What have you got to lose?

* * *


M. E. Kabay,< mailto:mekabay@gmail.com > PhD, CISSP-ISSMP, specializes in security and operations management consulting services and teaching. He is Chief Technical Officer of Adaptive Cyber Security Instruments, Inc.< http://acsi-cybersa.com/ > and Professor of Computer Information Systems < http://norwich.edu/academics/business/infoAssurance/ index.html > in the School of Business and Management< http://norwich.edu/academics/ business/faculty.html > at Norwich University.< http://www.norwich.edu > Visit his Website for white papers and course materials.< http://www.mekabay.com/ >


Copyright 2010 M. E. Kabay. All rights reserved.


Permission is hereby granted to Network World to distribute this article at will, to post it without limit on any Web site, and to republish it in any way they see fit.