Hotmail To Ban Common Passwords 140
Time and again, when security breaches reveal large numbers of user passwords, analysis shows there are particular passwords commonly used by a significant percentage of the userbase. Now, an anonymous reader tips news that Hotmail is trying to do something about it. "We will now prevent our customers from using one of several common passwords. Having a common password makes your account vulnerable to brute force 'dictionary' attacks, in which a malicious person tries to hijack your account just by guessing passwords (using a short list of very common passwords). ... Common passwords are not just 'password' or '123456' (although those are frighteningly common), but also include words or phrases that just happen to be shared by millions of people, like 'ilovecats' or 'gogiants.'" This comes alongside a new feature that lets users send a report indicating a friend has had their account hacked.
123456 (Score:5, Funny)
My luggage! Nooooo
Re: (Score:2)
Very funny, but what if your Int stat is 11 or less, and the only language you speak is Common?
0000 (Score:1)
Except in this scene (in Spaceballs), I think the password is: 0000.
That's what I use for everything.
Re: (Score:2)
Re: (Score:2)
Woah. I guess it's been too long since I've seen that movie.
http://www.youtube.com/watch?v=WzEz-SHJbB0 [youtube.com]
Re: (Score:2)
Prediction (Score:5, Insightful)
Prediction (Score:1)
Re: (Score:1)
Sales will increase significantly for laptop users... as will a trail of sticky notes on every surface where they have placed their laptop.
Re: (Score:3)
That's horrible security practice!
What you're supposed to do is write all your passwords on one sheet of paper, clearly indicating which one is for what login. Then write the word PASSWORDS at the top in big letters and post it on the wall of your cubicle.
(Sadly, I really have seen this.)
Re: (Score:2)
That's horrible security practice!
What you're supposed to do is write all your passwords on one sheet of paper, clearly indicating which one is for what login. Then write the word PASSWORDS at the top in big letters and post it on the wall of your cubicle.
(Sadly, I really have seen this.)
I remember that scene too. The password for this month is "pencil".
Re:Prediction (Score:4, Interesting)
The funny thing is that in today's highly connected world, it's probably safer to write down your complex password at home than to use a simple one you can remember and don't need to write down.
A written-down password on a post-it note can only be read by those who have physical access. So if someone cracks your account due to it, it will likely be someone you know, such as family or a visitor. Whereas a simple password you remember can be guessed by anyone on the Internet.
Which is more likely to be compromised? If you trust those you allow into your home, it's more likely to be the simple password.
Re: (Score:1)
Gee, did you just now spot the pattern after 15 years of sharks with frickin laser beams jokes?
Re: (Score:2)
"Well, used to be just baloney, but now they make you add number."
I think the big story here is.... (Score:1)
That Hotmail still exists.
Re: (Score:1)
Meh. I never saw the appeal of hotmail. I'm still using excite.com *pulls up onion belt*
Re: (Score:2)
I haven't checked it in a while since it doesn't render in Seamonkey (malformed XML error). Half the time it won't render in Firefox as they get cute with the MS only code. There are probably 2,500 unread spams in my account by now.
Meanwhile in 1999 (Score:1)
Oh man, I can't WAIT for the new millennium!
What if (Score:1)
What if you really love cats?
Re: (Score:1)
Is it just me, or does that graph look an awful lot like a fish without a head?
Re: (Score:2)
Re: (Score:2)
I am glad you mentioned that xkcd. It's funny, and quite possibly true. I don't know why someone marked you down as a troll. If anything, it may be off-topic.
Re: (Score:1)
well, you just have to check and see if "ireallylovecats" is on the blacklist. If it is, try "ireallyreallylovecats." Rinse and repeat (not the cats).
Re: (Score:2)
What if you really love cats?
Oh please, no one loves cats more than this girl
http://youtu.be/mTTwcCVajAc [youtu.be]
Re: (Score:3)
You can create a 100% secure password:
il0v3c4ts
I use this technique all the time. Usually I just use the name of the service, like bankofamerica, and change Es to 3s, etc. Do you get it? An E and a 3 look kinda the same... but backwards!!! Brilliant!
This is totally bulletproof. No hackers have ever heard of this amazing technique. Everyone should use it.
Re: (Score:2)
Its a heck of an improvement over lowercase alpha-only passwords.
Re: (Score:2)
There is even a specific option to slightly increase the cracking time by checking for letter - number - symbol substitution which it will do before attempting brute force checking.
Not really any more secure at all. Sorry. I used to use Lopht on a
Re: (Score:2)
Re: (Score:2)
Sure, with the hashes you can break the passwords quickly, but that requires you first have the hashes. Now think about attacking over the web and brute forcing it. Let's assume their brain dead and allow you to try all day long. How fast can you try passwords? Remember, you have to consider not only your connection speed, but their speed and the rate their server can answer.
I recently tested hydra on a full duplex 100Mbit network with just two computers on it, one being an ssh server and the other the atta
Re: (Score:2)
they'll just add another word to it. such as ilovelasercats
Moving Target (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
I've always wondered whether a system that compares your hash to a hashdb and rejects it if there's more than a certain percentage of matches would be a good idea.
This obviously wouldn't work for small populations, as the system could itself be used to identify passwords within the system... but for something the size of Hotmail's DB, it could work; especially if the feedback was a simple "you cannot use this password. Try again" for all collisions and blacklisted passwords.
The system could even prompt use
Re: (Score:2)
Only if you had the entire list of passwords. And, even then, it's a predefined list of common passwords: why wouldn't a cracker try them?
Any password cracker absolutely would. A banned, "common" password will never be the best option. A long password phrase always will be.
Re: (Score:2)
Any password cracker absolutely would. A banned, "common" password will never be the best option. A long password phrase always will be.
I've started doing this recently, it's great - passwords can be both rememebred easily.
However, it's ridiculous the number of sites that still disallow spaces in passwords. There's no excuse for that, unless you're storing passwords as old DOS file names.
User names often have the same ridiculous restriction.
fix brute force attack (Score:1)
Why not limit the number of password tries in a given time unit?
Re: (Score:2)
Re: (Score:3)
That only works when trying to hack a particular account. If you want to send spam to everyone in some random account's contact list, you don't care whose contact list. So if you know some percentage of the accounts use the same thing for their password, that's a lot of contact lists, mission successful at only one password attempt per account.
Password Encrypted? (Score:1)
Re: (Score:1)
I thought those passwords are encrypted, so how do they get the list of those common password?
Common password lists do exist, this has been studied to death. I would imagine that the password is compared with a list that exists on the server before it is encrypted.
Re: (Score:2)
Whenever you type your password on the login form, it is available to them in plain text.
(of course it is transmitted encrypted over the internet, but then it is decrypted by their server)
If you are lucky they don't store your password in their database in plaintext, but each time you log in they have the opportunity to lookup your password in their insecure password list before encrypting it again to compare it with their database entry.
Re: (Score:2)
If you are lucky they don't store your password in their database in plaintext
If you're really lucky they run your password through a one-way hash and store *that* into the database. Then, theoretically, anyone who gets access to your hash can come up with a password that will get them into the compromised system.. that is a password that happens to have the same hash, but not necessarily your actual password.
Re: (Score:1)
Yes but if several accounts all use the same password they all hash to the same value. If an administrator puts password 123456 into a known account and looks up the hashed password for that account, it's easy to then search for that hash among all accounts.
Re: (Score:1)
Yes, I assume they can sort by hashed password, and actually my question is how they ended up with "common password" if Hotmail encrypted the password. If there is a decrypt function, then I am curious how secure it is being hosted.
And I suppose they are here to study the pattern, which included related passwords, eg. 123456 qualify as linear f(x) = x, therefore 1234567 will also be categorized as the same thing for study, no?
If I am a hacker, I am interested in the pattern more than just common passwords,
Re: (Score:2)
Re: (Score:3)
Not if properly salted it will not.
Re: (Score:2)
Not if properly salted it will not.
It should be obvious that this isn't the case or this analysis would be impossible.
Re: (Score:2)
Microsoft has the salt, so they will be able to check certain passwords. Hash 123456, salt it, compare with the table.
The point of salt isnt to make the hashes impossible to do lookups on (otherwise you couldnt do logins), its to make existing rainbow tables worthless.
Re: (Score:2)
Microsoft has the salt, so they will be able to check certain passwords. Hash 123456, salt it, compare with the table.
But the salt isn't necessarily the same for every login.
Many login systems create random salt for EACH account, and store it with the hash.
The point of salt isnt to make the hashes impossible to do lookups on (otherwise you couldnt do logins),
Of course.
its to make existing rainbow tables worthless.
If your login database is stolen, and you use the same salt for each account, then its a fairl
Re: (Score:1)
It's better to generate a new salt for each password; i.e., a new salt should be generated whenever a password is modified. That way it is pointless to generate rainbow tables for a chosen account.
Re: (Score:2)
Yes, but all the proposed things I was replying to were rainbow table type analyses.
It's computationally cheap to compare a hash to a database of a few million hashes. It's much more difficult (not hard, but slow enough that it couldn't be used as an ad-hoc password rejector) to compare all passwords when a properly slow hashing algorithm with a unique salt per account is used.
Re: (Score:2)
We have one, it's "reset your password", and it's what every moderately well-run site uses. I haven't seen a password recovery option on any mildly popular site in years. (I'm sure someone will come up with an example, point is, it's rare).
Re: (Score:2)
Re: (Score:2)
Of course if you actually have their Hotmail login and password, chances are they are the same as the bank account.
Re:Password Recovery vs Google Two Way Auth (Score:1)
How would you expect to `reset your password` for your email, while the validation process requires you login to your email account?
How do you envision to reset your password on Hotmail, while the requirement might be for you to login to get the reset password link?
Actually, its good to mention Google's two way authentication here as well.
I know HSBC or some other banks had been using similar way 20 years ago, and with better technologies, Google expands this with an app on Android phone (it works on my And
Re: (Score:2)
With banks, you typically have to call them, which is fine - it's not something yo have to do all that often.
Speaking of HSBC, they have this gimmick where you have two passwords, and one of them you have to enter by clicking letters on a l
Re: (Score:1)
The Google Two Way Authentication is similar the the SMS solution that you mentioned.
As for HSBC 20 years ago (not Internet era yet, but using modem to call into their server), which generates a second password for your next session.
Re: (Score:2)
Re: (Score:2)
FTFY.
Common sense here... (Score:2)
This is something that public access UNIX systems and universities with a ton of students learned ages ago, when all it took was a guy running Crack on /etc/passwd (before passwords were shadowed.)
Most operating systems have a small dictionary they check against so people using "12345" for something other than their luggage will be stopped immediately.
History just repeats itself... websites are now learning what operating system makers learned in the early 1990s -- keep the passwords well encrypted, and dis
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
The reason online services have not bothered is because until now, it really didn't matter. Having security is expensive, and the PHBs believe anything security related has no ROI, so it doesn't get done.
Now that attackers have snarfed password databases and made them public, online services are starting to actually bother with some security such as using salts and hashing passwords, enforcing basic password measures, and adding anti-brute force attack provisions, such as locking out IPs, tarpitting (where
I am not using hotmail, but maybe my friend is... (Score:2)
What I find disturbing with features like this, is how the service (be it hotmail, linkedin, facebook, whatever) always assumes that when you receive crap from one of their users and want to report it so something is done about it, you also have an account yourself.
I want to be able to report that I receive spam from one of their users WITHOUT having to create an account on their system.
So the "my friend has been hacked" report should not be only in their mail user interface, but also in some publicly acces
Re: (Score:2)
The principle of the idea is sound, but the implications of them being--ironically--spammed to hide real problems is probably not appealing to them.
This is almost certainly true, but the features simply came out at the same time due to their relationship, and having your password brute forced is not a requiremen
Good idea to ban common passwords (Score:3)
Re: (Score:1)
I agree with ATM card or physical key, since you are aware of these things being taken away.
However, password can be different. You never know MITM attack.
I really hate changing my password every 6 months (my company policy is every 30 days, 15 different passwords). And the only way to remember my password to start my workstation is to have a pattern (sigh, add a different number once in a while), which is not very secure, I believe.
Re: (Score:2)
Re: (Score:2)
Your argument is to alert the owner, not to force the owner to do more make-work.
Re: (Score:1)
I never understood the reasoning behind the time based password change. No one expects people to get a new key every six months for their home lock. No one expects someone to get a new ATM card every 6 months.
Physical tokens like keys don't require such frequent replacement because (in general) they are difficult to compromise without alerting the holder. Someone has to actually steal your key and take it to the hardware store without you noticing. Passwords, on the other hand, can be shoulder surfed, socially engineered, stolen with malware, stored in plain text in the database, shared with someone else, etc., and the user may have no clue his password is compromised. Also, if someone steals your key and robs
Re: (Score:2)
Your argument is to alert the owner, not to force the owner to do more make-work.
Re: (Score:1)
Re: (Score:2)
People seldom try to open your locks without you finding out. And when they do manage to open a lock, you likely will change it pretty promptly.
People may try to crack your password quite often without you finding out. And when they do manage to crack your password, you still don't always find out.
Re: (Score:2)
for listing how many times in the past 24 hours someone tried to log in.
You have a crappy argument for requiring people to change their password.
Design the system around human limitations, don't force humans to do work that a computer does better.
So does anyone think this is a good idea? (Score:1)
epidemic (Score:1)
New common passwords (Score:2)
That's possible.
Any dictionary of "common passwords" is going to have to be adaptive.
But the thing is, if you look at lists of common passwords, and of how many accounts can be compromised by them, the really common ones are really common.
Hotmail have taken a long-overdue step here. I'd love to see all major online service providers follow suit, though if we could just get major email providers (Google, Hotmail, Apple, Yahoo, AOL), and Facebook (used for single sign-on), we'd be ahead of the game.
Th
bout damn time (Score:2)
Abuse (Score:1)
This is intolerable. (Score:2)
My Password Won't be Blocked Under That Rule! (Score:3, Funny)
I've been using 8 asterisks for passwords so I can see what I'm typing.
No need to keep track of a "list" (Score:2)
I'd considered this sort of thing a while back -- there's really no need to use a set list of passwords.
Assuming that the passwords are being hashed, you can have a lookup table where you store:
(Password hash) + (Current # of accounts using that hash)
By setting a threshold for the ratio of (Current # of accounts using a hash) to (Total # of accounts), you can reasonably control the average entropy of passwords in the system.
For example, if you have 100,000 users in a system and set a threshold of 2%, the sy
Better password manager needed (Score:2)
People need to use the browser's password manager to avoid remembering or entering any passwords. There is no reason to keep it in your head when your computer is perfectly capable of doing it.
The problem with the current implementation is that you still have to enter the master password every time you start the browser, which leads most people to just not set one, which leads to the passwords being stored on the disk unencrypted and easily stolen.
The solution we need is to integrate authentication for the
Re: (Score:2)
As I noted above, the flaw in this is that not all sites use login fields that Firefox can capture. Imageshack is but one example of such a site.
Re: (Score:1)
You get that automatically if you have home directory encryption enabled, which both Ubuntu and OSX support out of the box in the install process. Then it doesn't matter what is stored on your disk in plaintext because it all gets automatically encrypted and decrypted when you log out.
Re: (Score:2)
No, you don't. While you are logged in, your password file will be decrypted and visible to anybody who wants to read it, like a malware app. Home directory encryption is there to protect against offline attacks only, when your hard drives are stolen. To protect against malware running as you the password file must not be accessible to you.
Re: (Score:1)
People need to use the browser's password manager to avoid remembering or entering any passwords. There is no reason to keep it in your head when your computer is perfectly capable of doing it.
The problem with the current implementation is that you still have to enter the master password every time you start the browser, which leads most people to just not set one, which leads to the passwords being stored on the disk unencrypted and easily stolen.
The solution we need is to integrate authentication for the password manager with the login process. Store the passwords in an encrypted file, with the account password as the key. A password daemon, like ssh-agent, running as root can securely load and decrypt your password file at login time. It will remain unaccessible except through a specific interface. The interface can authenticate the calling application by using socket credentials passing and allow the user to explicitly let the firefox password manager (which will have to be a separate process and executable for this purpose) access the passwords.
This way the passwords are not accessible to any remote threat and are encrypted on disk to thwart any local threats. The user never has to enter any passwords except at login. Convenience and security.
They already have this - it's called Keychain on Mac OS X
Perhaps... (Score:2)
...we should add basic security to the curriculum at schools? I'm sure I'll be parroting what others have said already, but all password systems need to allow letters (case mattering), numbers, and special characters. Further I think they should require them. Length limits are good, and 8 is a decent starting point. Obvious pass words should be blacklisted as being done here. Perhaps implement a check against other user info like birth-date and such to refuse passwords involving 2 and 4 year birth year date
Probably overlaps with Twitter's list (Score:1)
Probably overlaps with:
Twitter's List Of 370 Banned Passwords
http://www.businessinsider.com/twitters-list-of-370-banned-passwords-2009-12 [businessinsider.com]
Anyone have the actual Hotmail list?
Too many rules (Score:2)
For every rule one adds to the creation of passwords one decreases the number of possibilities. For example, if an 8 character password that must be letters and numbers you are removing 52^8 all character words and 10^8 all digit words. As the number of rules get larger the number of possibilities get smaller. I agree there should be a short list of banned passwords but if the list is too big it just helps cracking.
Stop babysitting the users (Score:1)
I myself create occasionally accounts that I really don't care about them, I just need them for temporary means. In such use cases, a thousand rules and fields to fill are just pointless. And BTW, I always thought the "mystery question/answer" was the most stupid security measure ever invented, even for my main accounts.
Warn the user: YES. Ban the simple or common passwords: NO.
Also, a lot of people here on Slashdot ne
Missing the bigger question... (Score:1)
Re: (Score:2)
I'll admit that a couple of passwords I thought were 'clever' have shown up on these lists, and it's convinced me to change them to som
Re: (Score:2)
I don't think you're clear on what brute force means.
Re: (Score:2)
no. and above all, see the comment above about a max password length for Live.com accounts. (hotmail is part of live.com now)
Re: (Score:2)
Re: (Score:2)