FBI Recommends Passphrases Over Password Complexity (zdnet.com) 93
An anonymous reader shares a report: For more than a decade now, security experts have had discussions about what's the best way of choosing passwords for online accounts. There's one camp that argues for password complexity by adding numbers, uppercase letters, and special characters, and then there's the other camp, arguing for password length by making passwords longer. This week, in its weekly tech advice column known as Tech Tuesday, the FBI Portland office leaned on the side of longer passwords. "Instead of using a short, complex password that is hard to remember, consider using a longer passphrase," the FBI said. "This involves combining multiple words into a long string of at least 15 characters," it added. "The extra length of a passphrase makes it harder to crack while also making it easier for you to remember."
Already been doing this when I can. (Score:5, Insightful)
Re:Already been doing this when I can. (Score:5, Insightful)
Re: (Score:3)
100% as you say, if length matters it may be storing in plain text. Whether it was one character or a thousand, the hash is effectively the same length.
On the other side of this, the complexity in actual characters used, I've seen weird things in the wild such as forbidden characters in passwords. One example that comes to mind was a poorly implemented Basic Auth handling, where the username and password are concatenated with a colon between them (username:password), and then converted to a base64 string
Re: (Score:3)
When I run into that, I use the last character of each word in a passphrase. Or better yet, break out my password manager and generate a random one. My password manager is protected by a massive passphrase and MFA.
Re: (Score:2)
When I run into that, I use the last character of each word in a passphrase.
Considering that there is a ~50% chance of the last character of a randomly-selected word[*] being one of 's', 'd', or 'e', you might want to rethink that strategy. The entropy of the final letters of 10 randomly-selected words, each contributing about 3.4 bits, would be less than what you would get from seven random lowercase alphanumeric characters or six case-sensitive alphanumeric characters—easily brute-forceable. Also, most passphrases are not just random words, which makes them even more predic
Re: (Score:2)
You do a nonsense passphrase, something you will remember ie happylemmingsleap, thequickdogjumps, all sorts of fun possibilities, can be quite personal or crude as in HRChorriblerottencunt, something you will remember and you can capitalise or add numbers, Trumpno1arsehole, what ever rocks your boat. Just three words in a nonsence string somewhat personal to you and have fun with it.
Re: (Score:2)
10 character limit has always been absurd.
Re: Already been doing this when I can. (Score:1)
Re: (Score:2)
Re: (Score:2)
I've been using phrases for a while when I am able to.
Unfortunately, a lot of banks are still stuck only allowing ten characters or less.
And requiring a certain count of capitals, numbers and special characters. This prevents you from using both memorable passphrases and the long randomized strings that password managers can generate with their 'suggest' function.
Re: (Score:2)
My password is a passphrase. Replace some letters with numbers (e.g. i = 1) and replace some other letters with their capital variants. Eliminate spaces and there you go.
You can also repeat a relatively simple password with its variations, e.g. "TooBadt00badToob4d!"
then use a passphrase on KeePass ;-) (Score:2)
At least, that's what I do.
Absurdly short un-memorizable passes where banks & al constrain me, which I all store within the open-source, verified Keepass behind a long password.
Duh (Score:2)
No kidding. That is why my password is "OneTwoThreeFour".
Re: (Score:2)
PenisAssholeShitholeScumbagWangOrificeRectumDick
Re: (Score:2)
Re: (Score:2)
Idea's been around a while, probably true. (Score:2)
I took a security class a *long* time ago and the instructor asserted that pass phrases were more secure and easier to remember. As an example, he said, "My daughter has big, brown eyes." was easy for him to remember and probably pretty secure, especially as her eyes were blue. :-)
Re:Idea's been around a while, probably true. (Score:5, Insightful)
Sure it is. Until you get lazy, and you need another one, and another one. And then humans inevitably start doing simple variations or selecting different lines from the same song/poem/book.
And then the web form requires at least 1 digits and at least 2 capitals... so your passphrase is rejected anyway.
And then the site promptly gets compromised, so you have to change it, and using a passphrase doesn't help you vs bad password management at the backend, and MITM/phishing attacks etc, so reusing passphrases is still a really bad idea. And remembering lots of different passphrases that are constantly changing isn't really any easier.
So... a password app, protected by a passphrase, where all the actual passwords are just random gibberish that you generate randomly and copy/paste as needed and don't even look at or try to remember... is really about as good as it gets right now.
Re: (Score:2)
Re: Idea's been around a while, probably true. (Score:2)
This is why I don't bother remembering passwords or using password managers.
I enter something totally random and do "forgot my password" reset on every login. This way I only need to secure and remember my email password.
Re: (Score:2)
I have a number of websites that force password changes every 90 days. I often only need to log into these websites except for once, sometimes twice a year. I just let the passwords expire intead of changing them, and then do an email-based password reset. Lame security - might as well just have the login email me a link to login.
Re: (Score:2)
I think perhaps a physical token is as good as it gets right now, though not always available.
Re: (Score:2)
Your instructor also read XKCD?
https://xkcd.com/936/ [xkcd.com]
XKCD (Score:2)
https://xkcd.com/936/ [xkcd.com]
Re: (Score:2)
Was going to post the same thing, but you beat me to it!
Re: (Score:2)
I wonder how many people use "correcthorsebatterystaple" as their passphrase.
Re: (Score:2)
It makes the "common password" list just as a password.
They are wrong - it doesn't matter which (Score:5, Informative)
It is very important not to reuse the same password on multiple sites. Therefore it is impossible to memorize all of your passwords and you must use a password manager. Once you use a password manager you should go all in on using completely random passwords or passphrases - it doesn't matter which as long as there is enough entropy. So pick 16 character random letters numbers and punctuation or pick 6 word random passphrases from large dictionaries. Since more current websites accept 16 characters than 30+ characters the password choice makes more sense.
Re: They are wrong - it doesn't matter which (Score:2)
Re: (Score:2)
Then for every site, think of a story that lets you recall the first half of the password. Then combine it with a second half that you can remember with another story, and use that second half across all sites. Or just think of a story for each password on each site.
It's called a mnemonic. [wikipedia.org] One of my favourites is "spdsfpgdshfpig" for remembering the ordering of energy-levels inside an atomic nucleus. Just remember "spuds if pug dish of pig" and remove all the vowels except the last one. ("Eat potatoes if th
Re: (Score:2)
And then someone cracks your password manager. Now what?
Re: They are wrong - it doesn't matter which (Score:1)
Ok, seriously, put important stuff on an isolated device used for nothing but critical logins and your
Re: (Score:2)
Re: They are wrong - it doesn't matter which (Score:2)
use 2FA on all your important financial and identity accounts so your password will be insufficient to login in. protect your password manager with a very strong master password and 2FA. that will be the one and only password you have to remember.
Re: (Score:2)
Nowadays a password manager with complex password (Score:2)
Nowadays a password manager with complex passwords and a different password for each account is better
15 Characters? (Score:2)
Never re-use the user-id/password on other sites.
On my local network, everything is locked to ssh key access only (no password access), except root, which doesn't allow logins at all.
And the password for my key is longer than 15 characters.
I'm still somewhat skeptical about the privacy and security of SSO services like BookFace and Verizon.
but (Score:2)
people tend to use common phrases so if one word is known, it may be easier to guess.
Re: but (Score:1)
I use that on my luggage. Oh wait sorry wrong movie.
Re: (Score:2)
Re: (Score:2)
It's far better then walking into a government office and seeing sticky-notes with passwords on it.
Re: (Score:1)
correcthorsebatterystaple is a four-letter password in a bigger alphabet
cwbiywcwliaputs means "my kid likes bob the builder and spongebob"
The storing and recall of that fact is LESS surface area than the example, yet grants MORE entropy than the "characters" of TFS, which add mediocre entropy at best (sup3rm@n! will snap like a twig) while increasing the recall tax (causing more password reuse, written stickies/spreadsheets/etc, burden on Helpdesks, work becomes frustrated/downtime, all kinds of ills)
canwebuildyeswecanwholivesinapineappleunderthesea is potentially vulnerable years from now (decade or two?) when cracker tables get ahold of and integrate (that part's slower than the first) dumps from mass scrapes of leaked google stores or whatever. Yes, so is the prior one, but the ever-worshipped length isn't really giving you any increased resilience, no one bothers brute forcing beyond ~7 characters.
qwertyuiopasdfghjklzxcvbnm is an example of length being worth fuckall when it has shitty entropy - if it's a trivial shift in thought for you it will be a trivial thought for those sculpting the tools. Exploit your meatbag strength, nursery rhymes and jingles and pop culture, shit your brain is oozing with.
JGWentworth877CashNow! is the most secure password ever!
I like passphrases (Score:2)
I used to like the "first letter of each word in a phrase" algorithm, resulting in passwords like TbonTbTitQ - garbage to anybody looking over your shoulder but easy to remember "To be or not To be, That is the Question".
I now use passphrases. Pick two or three words at random, especially if they're not common ones. Throw some random punctuation in to pacify password complexity requirements and break brute-force word searches. Done.
Sample result: pass%w0rdComplex#ityrequ1re(mentS
...laura
Re: (Score:2)
Yeah, Pig Latin also guarantees security.
Re: (Score:2)
Correcthorsebatterystaple wins again! (Score:3)
Obligatory XKCD reference, for the unwashed few that didn't get it, and haven't implemented it yet.
I did this when it came out, because some things just make sense.
Re: (Score:2)
What's amazing that in lists of the most common passwords that get easily hacked, "correcthorsebatterystaple" isn't one of them. I've been using the method for years even before the XKCD comic came out. It just seemed to be the common sense way to go.
Re: (Score:2)
Obligatory XKCD reference, for the unwashed few that didn't get it, and haven't implemented it yet.
I did this when it came out, because some things just make sense.
Really?
Is Grog6 your username for your bank account? Asking for a friend.
Re: (Score:2)
"Passphrases Over Password Complexity". This is a great, secure, random phrase that's even open source -- let's ALL use it!
get a password manager and do both (Score:1)
Re: (Score:2)
Re: (Score:2)
NIST Guidance (Score:2)
NIST SP800-63B, Appendix A was released in June 2017 for the gov't types.
https://pages.nist.gov/800-63-3/sp800-63b.html#appA [nist.gov]
In summary:
Re: (Score:2)
A year later with a T
Re: (Score:2)
Long strings of the repetitive characters are a problem but two or three can help prevent shoulder surfing.
Re: (Score:2)
Yup, also in there: don't auto expire passwords, change only after a breach. People are more like you use better passwords of they know they won't have to re-memorize every X days.
Unfortunately, after almost 3 years, it's been wholly ignored by most. We still have 12 character number, special char, upper/lower passes that expire every 60 days.
Obligatory ... (Score:2)
Obligatory xkcd correct horse battery staple [xkcd.com].
Make a part of it numbers, and separate with one or more special characters, and you are done.
Seems disingenuous (Score:2)
Given they’re also pushing for baking in the ability to backdoor any encryption.
Re: (Score:2)
The FBI can't push for anything. They make statements that it would benefit them and be a good idea, and everybody (including Congress) laughs at them.
More Secure? Maybe... (Score:4, Informative)
A passphrase with 4 common words in it will crack like a 4 character password to a password cracker.
Password ABCD to the password cracker is [A][B][C][D]
where
Passphrase AlphaBetaCharlieDonkey is [Alpha][Beta][Charlie][Donkey]
Both are 4 strings from a list of 'words.' From that perspective though there are only 26 'words' in the alphabet list where there may be 1000 in a super small word list.
All of this will be moot in twenty years. By then, AI will be able to guess everyone's past and future passwords in 3 seconds running on a single quantum processor powered by fusion.
--
You only think I guessed wrong - Vizzini, The Princess Bride
Re: (Score:1)
yes, there is no difference between a possibility space of 456976 options and a possibility space of 1000000000000 options
Re: More Secure? Maybe... (Score:2)
Re: (Score:1)
10% of 20k is 2000. A random word about of 2000 is about 11 bits, 4 words equals 44 bits. Exactly as xkcd claims.
Re: (Score:2)
There's no point in being able to put together billions of guesses in 3 seconds, if you can't verify them against the system you are trying to break into, within a reasonable amount of time also. I have never seen any convincing argument for producing authentication software which allows a person to retry their password after a failure, without at least a couple of seconds of delay and counting the number of failed attempts.
So I don't understand the pop-scare references to that future quantum/AI/whatever a
Database busts (Score:2)
You can believe them; they're the FBI ! (Score:2, Funny)
If the FBI recommends a security technique you can be assured that it is one that is easy for them to crack. Why would anyone believe the agency that is dead set against individual privacy?
Sometimes, "123456" is good enough. (Score:4, Interesting)
Re: Sometimes, "123456" is good enough. (Score:1)
Re: (Score:2)
Recall the epic fails (Score:1)
They get the key and lock due to site settings.
Staff help the bad guys due to reasons of faith, nation, politics, cash, been criminals, support for banned groups, for the media.
The company is working for another nation, the NSA, GCHQ. The strong, tested and approved cyrpto is junk by design.
I've been using phrases forever (Score:1)
Re: (Score:2)
My experiments with using lines from songs suggest that most people will pick a line from a song that many others also picked. I had several tens of thousands of people to ask to do that experiment.
Lines from songs, common quotes have been used in cracking dictionaries for a long time. Using fortune databases with cracking tools has been done since the 1980s. Leetspeek has been an option for password crackers for decades.
Stanford password policy (Score:2)
The University of Stanford doesn't require password complexity if your passphrase has 20+ characters:
https://uit.stanford.edu/servi... [stanford.edu]
Re: (Score:1)
Re: (Score:2)
The University of Stanford doesn't require password complexity if your passphrase has 20+ characters:
https://uit.stanford.edu/servi... [stanford.edu]
That's Stanford University, if you please. The full name is Leland Stanford Junior University. See https://www.stanford.edu/about... [stanford.edu].
My password is... (Score:2)
"A random string of numbers and letters."
Wat (Score:2)
A passphrase IS password complexity.
English, mother fucker...
I'm wondering if it's really that much better (Score:2)
Does it matter? (Score:2)
Usually, the sites with the most anal user password requirements are also the sites that expose my data and everyone else's at Some_URL?user=admin?password=password. On the bright side, at least the hackers will bother to encrypt the data.
Duh. (Score:2)
This has been the smart answer for years.
Which is why security-exam graduates all over the world have been saying the opposite.
FBI recommenation? (Score:2)
FBI? Isn't it those guys who always tried to get one of another form of backdoor mandated by law? Who think that their ability to eavesdrop criminals is much more important to public safety that privacy of lawful citizens?
Re: (Score:1)
It might be important if the bad guys are planning a WMD attack on the east coast that will kill several million if it's successful.
I Just Use A Longer Phrase That's Easy to Remember (Score:1)
Something like, "You're gonna need a bigger boat" or "You keep using that word," or "Here's looking at you, kid." Easy, and password complexity estimators on the web claim that such phrases would take longer to crack than we have time before the sun expands and swallows the earth. One can misspell something or use a double space between words or something if still paranoid, but it would be so much nicer to remember than the idiot stuff we have to come up with now.
images as passwords (Score:1)
This from the same bureau ... (Score:2)
... that wants back doors.
I'll do "opposite day," thank you.
corecthorsebattery = 19 chars = 26^19 or 10,000^3 (Score:1)