TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Frequent Password Changes Is a Bad Security Idea

130 pointsby alanfranzalmost 9 years ago

22 comments

MAGZinealmost 9 years ago
For those who work at corporations with password rotation policies, it may actually be a good way to get creative. This guy changed password rotations into a lifehack:<p><a href="https:&#x2F;&#x2F;medium.com&#x2F;the-lighthouse&#x2F;how-a-password-changed-my-life-7af5d5f28038#.dlynk50b7" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;the-lighthouse&#x2F;how-a-password-changed-my-...</a><p>Previous discussion on it: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8015470" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8015470</a>
评论 #12241447 未加载
评论 #12241613 未加载
评论 #12242790 未加载
petercooperalmost 9 years ago
This reminds me of a story I read about the NHS (National Health Service) here in the UK.<p>Some edict came through that scans had to be stored and accessed digitally. There were numerous teething problems in accessing the system, so a brain surgeon was going nuts running back and forth across the hospital trying to do his work.<p>A nurse in another department said he could use their consultant&#x27;s login with the password &#x27;fuckoff&#x27;. He ran back to his own desk, no go. So he went back and they said, &quot;Ah, he has to keep changing the password each week so try fuckoff45&quot; because the system had been set up almost a year prior. It didn&#x27;t work, but after realizing more time had passed, he tried &quot;fuckoff47&quot; and it did the trick(!) Note that the problem here wasn&#x27;t just the password but that sharing <i>entire logins</i> was&#x2F;is rife.<p>(Update: I&#x27;ve found a reference to the story at <a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;books&#x2F;2014&#x2F;mar&#x2F;30&#x2F;do-no-harm-stories-brain-surgery-review-henry-marsh" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;books&#x2F;2014&#x2F;mar&#x2F;30&#x2F;do-no-harm-sto...</a>)<p>(The NHS is full of fun IT-related stories. Another was that due to patient privacy laws, <i>keys</i> to access scans had to be sent under separate transport. So you&#x27;d end up with situations where two couriers would be delivering separate USB sticks each to access a single scan.)
lipsalmost 9 years ago
Does anyone aside from HN type folks listen to these recommendations?<p>I just had a major banking institution send me a plaintext pw instead of reset token, with a 15 char limit, and a rotation requirement.
评论 #12241790 未加载
评论 #12241657 未加载
dguestalmost 9 years ago
Does anyone actually have data showing that frequent password changes lead to better security?<p>Because to me requiring frequent password change seems like the ultimate non-technical management blunder: management wants to say they did something to prevent hacks, so they ask IT to require password changes; IT doesn&#x27;t want to be blamed so they implement it; users comply with the requirements but can&#x27;t remember their new password (and don&#x27;t really care about the company&#x27;s security in the first place), so they come up with something insecure and keep it somewhere even less secure.
评论 #12242129 未加载
bambaxalmost 9 years ago
At a client&#x27;s who requires frequent password changes, people simply write out their passwords on post it notes that they stick onto their screens. Some security. (That&#x27;s a bank, by the way).
评论 #12241575 未加载
评论 #12241545 未加载
评论 #12241485 未加载
评论 #12245594 未加载
评论 #12241703 未加载
Theodoresalmost 9 years ago
There is also the matter of cost-benefit analysis of time spent updating passwords. Where I work we have a special code that has to be typed in by logged in members of the team if they want to really delete a transaction, this code is the same for all members of the team. A manager sets this code to expire on a monthly basis because a new code will be good for security, apparently. In reality this means that on the first of each month a team are locked out for an hour or two whilst the new code gets generated and circulated - in email. So there is a misunderstanding on security plus an implementation issue leading to disruption equivalent to the loss of a person&#x27;s productivity for a day.<p>A similar scenario of disruption happens if you use lots of devices and need to update a password on several boxes to get working again. There may not be the communication overhead of my special code analogy (which is invariably delayed due to waiting for the manager to get out of meeting), however there is still disruption and time taken out from the task in hand.<p>As an aside, I like &#x27;ambient&#x27; passwords, e.g. the VAT number on the receipt that you got given buying your lunch, the receipt can be kept in the top drawer - safe from the cleaner - and, if it is lost, you can go to the shop again to get another receipt.
0xmohitalmost 9 years ago
I suspect that the requirement of (1) changing the password every <i>n</i> days, (2) new password cannot be the same as previous <i>m</i> passwords (usually, m=10) leads to insecure passwords for most.<p>I&#x27;ve seen people <i>handle</i> such requirements by creating an initial password, say p@$$w0rd and then appending a digit to it. On any subsequent mandatory password change event, they <i>increment</i> the new password from p@$$w0rd0 to p@$$w0rd1.<p>Not sure if it leads to anything more secure.<p>Wish more people started to use GPG based password store such as pass [0].<p>[0] <a href="https:&#x2F;&#x2F;www.passwordstore.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passwordstore.org&#x2F;</a>
评论 #12241650 未加载
snuxollalmost 9 years ago
Not news to anyone in the security scene, especially as a 30-90 password lifetime disincentives people from actually creating a complex password so they&#x27;ll do stuff like Sp0useName02 that technically meets the complexity requirements, but is horrendously insecure.
koolbaalmost 9 years ago
I&#x27;ve never met anyone in the corporate world that does <i>not</i> suffix a digit to their password that increments with each mandatory password change. Most people start with &quot;foobar&quot;[1] then become &quot;foobar2&quot;, &quot;foobar3&quot;, etc.<p>[1]: <i>Or maybe &quot;Foobar&quot; (because you need a capital letter) or &quot;Foobar!&quot; (because you need a capital letter and a non-alphanumeric letter).</i>
评论 #12242568 未加载
hartatoralmost 9 years ago
I also hate to have to mandatory change my password. I am paranoid, never used 2 times the same password for somewhat important account and have a mental trick system to remember my password. When asking for a password change, it&#x27;s fucking it up. Looking at you Linkedin and Paypal. Thansk for crappy security and annoying password policy.
jwattealmost 9 years ago
Tell that to Wells Fargo commercial. 12 character max, change every other month.
评论 #12242425 未加载
评论 #12241260 未加载
barrkelalmost 9 years ago
I usually deal with this by appending the month and year of the change to a secure password. Broken if the secure password is revealed, but no less secure than no rotation policy.<p>Where I work, we change passwords every 90 days, but every password other than full disk encryption, login and password manager are auto generated by password manager, so this mechanic is less of a concern.
Tempest1981almost 9 years ago
I would guess that phishing works better than password guessing. Not arguing for weak passwords, just thinking big picture.
评论 #12241615 未加载
angrowalmost 9 years ago
I have worked at a US DoD &quot;secure facility&quot;. You can imagine the requirements they imposed on password length, characters, frequency of changing, uniqueness, etc. Perhaps you can also imagine that nearly everyone kept their current password written on a sticky-note somewhere in their desk.
ashitlerferadalmost 9 years ago
<a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Diceware" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Diceware</a>
tomboothalmost 9 years ago
This is echoed by CESG (part of GCHQ) in their password guidance: <a href="https:&#x2F;&#x2F;www.cesg.gov.uk&#x2F;guidance&#x2F;password-guidance-simplifying-your-approach" rel="nofollow">https:&#x2F;&#x2F;www.cesg.gov.uk&#x2F;guidance&#x2F;password-guidance-simplifyi...</a>
joeskyyyalmost 9 years ago
I usually just make up a crazy long sentence I&#x27;ll remember, with no logical order in it. Something funny to me so I&#x27;ll easily remember it. Throw in some assortment of numbers and symbols. Bam! Works like a charm!
评论 #12241396 未加载
评论 #12258453 未加载
ukjalmost 9 years ago
To prevent people doing this just throw in a string similarity algorithm into your password-change UI.<p>if similarity(old_password,new_password) &gt; 50% then reject password change...
评论 #12242373 未加载
评论 #12242184 未加载
评论 #12241861 未加载
评论 #12241862 未加载
paulddraperalmost 9 years ago
The point of changing your password is to counteract any hacked passwords, I think.<p>But WHY ARE YOUR PASSWORDS BEING COMPROMISED?<p>That&#x27;s what you need to address.
steve371almost 9 years ago
I think password + security tokens is a more common way to go nowadays, when you need to access externally.
dingleberryalmost 9 years ago
how about $ echo &quot;password&quot; | md5sum 286755fad04869ca523320acce0dc6a4<p>$ echo &quot;Password&quot; | md5sum 29f33cab54c2a8858885b95d8fbb7ff1<p>$ echo &quot;PAssword&quot; | md5sum 20a68cafb28eb68e306be529a29a8a62<p>$ echo &quot;PASsword&quot; | md5sum 2ed0aec406faee855f7739bc94fa60d0
yeukhonalmost 9 years ago
It&#x27;s a double sword. The true issue with frequent password change is people really don&#x27;t want to be creative. They ended up either changing one letter, or adding an extra letter. At least do a quick distance check and deny password at 90% similarity.
评论 #12241299 未加载