TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Passwords Evolved: Authentication Guidance for the Modern Era

440 pointsby Spydar007almost 8 years ago

29 comments

koolbaalmost 8 years ago
This is a nice article. Only thing missing is calling out &quot;secret questions&quot; as asinine.<p>I loathe when sites require you to set them up as it requires manually generating a series of N-length random strings (ex: eZDWzazuMw0ZzD4nKhxXXVN3) and saving the pair (question plus random text) as metadata associated with the account. Not exactly pulling teeth but it&#x27;s pretty annoying to manually do that for 3-5 entries.<p>Even worse offenders are the sites that don&#x27;t even let you enter a value in a text box but instead require you to pick from a drop down with a handful, say 10-15, of entries (<i>cough</i> United Airlines <i>cough</i>).<p>And the very worst offenders are the ones that, after successfully authenticating with your password, ask you for the answers to the secret questions every single time you log in (<i>cough</i> again United Airlines <i>cough</i>).
评论 #14856373 未加载
评论 #14855546 未加载
评论 #14856396 未加载
评论 #14857191 未加载
评论 #14857242 未加载
评论 #14856016 未加载
评论 #14858011 未加载
评论 #14857181 未加载
评论 #14858376 未加载
评论 #14861578 未加载
tompalmost 8 years ago
Ah, passwords.<p>Look, webmasters, the simple truth is - I don&#x27;t care. I have a default password that is very simple to memorise (and hence guess&#x2F;hack), that I use for most logins, because frankly, I just don&#x27;t care. Unless you&#x27;re vitally important to my life (email, Facebook, backup, services that I use so often that they keep my personal&#x2F;credit card data), your login&#x2F;password is just an annoyance for me, as is your password security policy.<p>I commend reddit and webshops that allow &quot;checkout as guest&quot;, that recognise this.
评论 #14856623 未加载
评论 #14858895 未加载
评论 #14855817 未加载
评论 #14857874 未加载
评论 #14856555 未加载
评论 #14858444 未加载
评论 #14862609 未加载
评论 #14856256 未加载
MarkMcalmost 8 years ago
This is a great article, but it doesn&#x27;t acknowledge that there is sometimes a tradeoff between security and profit.<p>For example, imagine a typical user who tries to choose a password:<p>User: I want my password to be &quot;monkey&quot;<p>System: Sorry, that password is in the dictionary<p>User: OK, I want my password to be &quot;monkey1&quot;<p>System: Sorry, that password is on a list of exposed passwords<p>User: Grrr! OK, I want my password to be &quot;monkeymonkey&quot;<p>System: Sorry, that password is on a list of exposed passwords<p>User: Grrr! OK, I want my password to be &quot;monkeyfuckyou!!!&quot;<p>System: Sorry, that password is on a list of exposed passwords<p>User: Screw this, I&#x27;ll just sign up with one of your competitors.
评论 #14855671 未加载
评论 #14855829 未加载
评论 #14855963 未加载
BlackFlyalmost 8 years ago
For anyone who is thinking about using unicode for passwords, remember to normalize the unicode before hashing it. Different human input devices may output different codepoints for what appears to a human to be the same character&#x2F;string. Obviously make sure you manage the decoding&#x2F;encoding as well.
karrotwaltzalmost 8 years ago
Here is what NIST has to say about allowing the user to display the password on screen:<p>&gt; In order to assist the claimant in successfully entering a memorized secret, the verifier SHOULD offer an option to display the secret — rather than a series of dots or asterisks — until it is entered. This allows the claimant to verify their entry if they are in a location where their screen is unlikely to be observed.
waynecochranalmost 8 years ago
Math tells us longer passwords are better than longer alphabets, yet I am often forced to add special characters. If I have 12 character password over an alphabet of 26 characters, there are 26^12 possible passwords. If I have the choice between adding 5 special characters or increasing the length of my password by 5 characters, math says do the latter:<p><pre><code> (26 + 5)^12 = 7.88 x 10^17 &lt; 26^(12 + 5) = 1.13 x 10^24 </code></pre> That&#x27;s over <i>six</i> orders of magnitude higher. How come supposedly computer savvy people don&#x27;t know the difference between x^N and N^x?
评论 #14856974 未加载
评论 #14856970 未加载
评论 #14856956 未加载
评论 #14857582 未加载
评论 #14858420 未加载
评论 #14858411 未加载
aidosalmost 8 years ago
On systems that disable the pasting of passwords: could I give a special shout-out to Apple OSX which, in 2017, still refuses to allow users to paste a passphrase when the ssh agent pops up a window to request it?
评论 #14857650 未加载
评论 #14858879 未加载
dustinmorisalmost 8 years ago
One thing which I find Troy constantly misses to advertise and which I personally think is a much better solution than using password managers and each individual system having to develop their own login + verification and security system is to use 3rd parties to authenticate.<p>I am a big fan of password managers, but I don&#x27;t think there is a need for them, because WE ALREADY HAVE ALL OUR EGGS IN ONE BASKET: email.<p>If someone gets access to your email address then they have effectively access to every single service you signed up with that email. Therefore every single service might as well just use Google&#x2F;Hotmail&#x2F;Microsoft&#x2F;etc. to authenticate their users instead of building their own login system and asking people to come up with a new password which forces them effectively to use a password manager and yet another place to store all eggs in one basket.<p>The password to your email account == the password to your password manager.<p>If we would all just rely on Google&#x2F;Hotmail&#x2F;Microsoft&#x2F;Facebook logins then we would be even more secure then everyone having to use a password manager, and it would be a much better user experience. Also I am pretty sure that Google + Microsoft + Facebook have a lot more talent + resources to secure their accounts then every new service which pops up every day. Let them do the security and you focus on your actual business value...
评论 #14874848 未加载
brightballalmost 8 years ago
When I talk about security, the question I like to pose is this:<p>Imagine every password for every one of your users is published...can you identify people? How would you clean up the mess? Imagine a malicious person logged into EVERY one of your user accounts and tampered with them, changed email addresses, etc. Can you identify it? Can you clean it up? Can you prevent it from happening again?<p>If the answer to any of those is no...then you&#x27;re sitting on a time bomb.<p>Start with the assumption that the username and password is convenient but unreliable, then move forward with actual security.
kutkloon7almost 8 years ago
The problem with a password manager is that you don&#x27;t have easy access to one when you&#x27;re on a different machine.<p>A better way is to use a scheme that hashes your username, service name, and master password to generate a password. A problem is that this doesn&#x27;t always comply with the arbitrary demands on your password.<p>This is why these arbitrary demands need to die: they make the only way to securely and conveniently access accounts from different devices impossible.
评论 #14855033 未加载
评论 #14855218 未加载
评论 #14855325 未加载
评论 #14855936 未加载
评论 #14857115 未加载
评论 #14858424 未加载
评论 #14855258 未加载
评论 #14858245 未加载
zwilyalmost 8 years ago
Does anyone provide a regularly updated bloom filter of exposed passwords you could use for meeting the last point? Seems like something Troy could do...
评论 #14862892 未加载
评论 #14858604 未加载
评论 #14859708 未加载
xoaalmost 8 years ago
While I think there is growing recognition that password based authentication is a highly suboptimal path dependency, we&#x27;re also stuck with them on the majority of systems&#x2F;services for the time being. Even if UI and market standards for cryptographic based auth finally gets improved, it&#x27;ll still be a long haul for it to grow in usage. That being said this seems like a solid overall listing of the basics that all password using services should follow, except as koolba said earlier &quot;Security&quot; Questions (scare-quotes extremely intentional) were always a horrible anti-user &amp; anti-security idea and should be eliminated everywhere.<p>My only actual quibble&#x2F;concern with this piece is in the <i>&quot;Notify Users of Abnormal Behaviour&quot;</i> section. I agree it&#x27;s a good idea in principle to perform notifications, the only niggle though is that some common forms of notification are not authenticated in general, and in practice that particularly means email. I have only ever seen a few companies, even in the financial sector, that sign emails (and without that more aggressive automated domain anti-forging is hard too). At least from the stats I&#x27;ve seen on my own servers and for users I&#x27;m responsible for, &quot;Notification&#x2F;Alert&quot; emails are an ever greater favorite of spearphishers &amp; spammers. A lot of the major companies deal with this by using better authenticated purpose-made notification systems or even just text messages, but email still enters in, and if the practice spreads I&#x27;d expect to see a lot more places just using email. I think it&#x27;s worth being careful about getting users trained into any habit that might lead them to immediately assume something from an unauthenticated source is real and should be clicked. This might be an area that&#x27;d be worth coming up with better standards and UI for as well.
评论 #14856182 未加载
jimktrains2almost 8 years ago
The problem with passwords on the web is that they require sending and trusting private credentials to someone else. As devs we need to working on making better systems (e.g. TLS client certs and SRP (e.g. TLS-SRP or PAKE)) more usable.<p>It&#x27;s not a magic bullet and not something a switch can be flipped on, but the status quo is terrible.
评论 #14858271 未加载
评论 #14857079 未加载
评论 #14856309 未加载
SeoxySalmost 8 years ago
One thing that bothers me about this article, and the way everyone does passwords is this assumption that the output of a cryptographic had function is alphanumeric. It&#x27;s not, is binary. Store the actual data in your database, not the base16 representation! This applies to anything, not just passport hashes—don&#x27;t transmit around data as base64 unless you&#x27;re actually using a medium that requires it (e.g. email)
评论 #14855576 未加载
评论 #14856100 未加载
shadowashealmost 8 years ago
passwords are clearly still a gigantic problem in infosec for the users <a href="https:&#x2F;&#x2F;blog.binaryedge.io&#x2F;2017&#x2F;07&#x2F;24&#x2F;antipublic-password-analysis&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.binaryedge.io&#x2F;2017&#x2F;07&#x2F;24&#x2F;antipublic-password-an...</a>
评论 #14855205 未加载
评论 #14855206 未加载
_nothingalmost 8 years ago
Whenever a site requires special characters, it just ends up limiting me to one of the few memorized passwords I have that matches the criteria, most of which are barely 8 characters long.<p>I use LastPass but I don&#x27;t like using the password generator because I want to be able to log in on mobile or other computers when necessary, but I don&#x27;t do so enough to justify signing up for a subscription (I dislike subscription models) that would allow me to access use it on mobile.<p>I wish I could just use giant password strings on all of my sites.
评论 #14859114 未加载
评论 #14861612 未加载
gouroualmost 8 years ago
<a href="https:&#x2F;&#x2F;www.baekdal.com&#x2F;insights&#x2F;password-security-usability" rel="nofollow">https:&#x2F;&#x2F;www.baekdal.com&#x2F;insights&#x2F;password-security-usability</a>
riettaalmost 8 years ago
Excellent read. I&#x27;ve finally decided to do what I&#x27;ve been saying I would do for two years and create an open source demo Ruby on Rails application that applies these principles using the Devise gem and a few others. Will show it supporting multiple two factor strategies as well as account lockout, recovery, and access downgrading based on confidence. It&#x27;s a private repo at the moment but I will share as soon as its worth showing.
Someone1234almost 8 years ago
I like the concept of &quot;Notify Users of Abnormal Behaviour&quot; but how. I mean that in a technical sense. This XKCD seems to apply[0].<p>People take for granted that an organisation can just hook into a bunch of paid external services, GeoIP, Browser&#x2F;Device Database, etc. First off, there&#x27;s a great many organisations who cannot or will not be able to use an external GeoIP database for example, and even if they could how is a threshold of &quot;abnormal&quot; determined?<p>I too love Facebook&#x27;s implementation. How do I make that without hooking into half a dozen paid external providers? I&#x27;m legitimately asking, because this seems like a &quot;research team and five years&quot; type of issue.<p>[0] <a href="https:&#x2F;&#x2F;xkcd.com&#x2F;1425&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;1425&#x2F;</a>
评论 #14856652 未加载
评论 #14858942 未加载
utexaspunkalmost 8 years ago
Is there an independent body that certifies that a site uses good practices? I mean, I have no way of knowing whether a website is storing my password in the clear (unless they email my password to me), using a symmetric cypher, a site-wide salt, etc. It would be nice if a trustworthy party could investigate a site&#x27;s security practices and certify that they are doing things properly.
EGregalmost 8 years ago
Or you can move beyond passwords.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;Qbix&#x2F;auth" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;Qbix&#x2F;auth</a>
评论 #14856736 未加载
pishpashalmost 8 years ago
A person only has so many memorizable passwords that they can hold at a time; the entropy source is very very low rate. Revealing <i>any</i> memorizable password to stupid random sites is itself an antipattern.
评论 #14856576 未加载
iooialmost 8 years ago
What is the consensus on not allowing previously used passwords?<p>i.e., when changing your password: &quot;You used this password too recently, you can not use your last 20 passwords&quot;
评论 #14860139 未加载
评论 #14864570 未加载
ojralmost 8 years ago
No mention of how to authenticate on mobile? I don&#x27;t think a guidance on how to authenticate for the Modern Era is complete without having a mobile solution
评论 #14857037 未加载
wepplealmost 8 years ago
I&#x27;m curious; why aren&#x27;t we dropping the use of passwords in favor of U2F?<p>I guess for one; not everyone wants to buy and carry a key. But we&#x27;re at the point where you have to have a password manager anyhow, a token isn&#x27;t that much more of a burden.
评论 #14856916 未加载
评论 #14856143 未加载
BucketSortalmost 8 years ago
I believe eventually passwords will become cognitive thumbprints. I.e. instead of a password, we play a short game, type in some text of which the cadence can be analysed.
评论 #14857076 未加载
Piccolloalmost 8 years ago
I like my passwords 1, 2, 3, and 4 5.
gouroualmost 8 years ago
<a href="https:&#x2F;&#x2F;www.xkcd.com&#x2F;936&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.xkcd.com&#x2F;936&#x2F;</a>
评论 #14855152 未加载
ss248almost 8 years ago
&gt;Embrace Password Managers<p>I disagree. Author pointed out &quot;all eggs in one basket&quot; issue, but it doesn&#x27;t look like he completely understands the whole problem. The main problem is that passmanager holds a lot of metadata.<p>For example, you use unique password with high entropy for every service you use. Once attacker gets your one master password (through zero-day or just by watching you type it), potential damage is massive. He doesn&#x27;t have to try to find where you are registered, password manager will tell everything, about every single account and possibly more; some people even store credit card&#x2F;banking info in passmanager. At that point it&#x27;s over, you lost.<p>&quot;... if (password manager) gets compromised it&#x27;s going to be bad news. But this is an exceptionally rare event compared to the compromise of an individual service which consequently exposes credentials.&quot;<p>This is not an argument at all. Let&#x27;s consider the situation when individual service gets compromised. Attacker has thousands of salted hashes. With good hash algorithm, he have to spend considerable amount of time cracking every single hash. He doesn&#x27;t target you in particular. You are just one of many. If attacker cares about you, after cracking hash and getting your password, he has to do a lot of research (trying to find other sites where you used that password and hope you didn&#x27;t change anything there) to make any use of it. Objectively, he doesn&#x27;t actually have much. So going after popular services you use, just to get your password, doesn&#x27;t look like a good attack vector in the first place.<p>People should know, that password manager is just a glorified notepad file with one password. By using them you are trading safety in situations when attacker targets you, for safety in situations when attacker targets someone else and you are just a collateral damage. If you must, use them only for information you don&#x27;t care to lose.
评论 #14858709 未加载
评论 #14863196 未加载
评论 #14859094 未加载
评论 #14858079 未加载
评论 #14858463 未加载