ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Password policies, forced password changes are bad.

    News
    password force change security
    9
    18
    2.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @dafyre
      last edited by

      @dafyre said:

      Just let them use pass phrases... I wish you could require a space in passwords.

      Yeah, I'd love requiring 16 plus.. but really I don't think 12 will likely fly.

      dafyreD 1 Reply Last reply Reply Quote 0
      • dafyreD
        dafyre @Dashrender
        last edited by

        @Dashrender said:

        @dafyre said:

        Just let them use pass phrases... I wish you could require a space in passwords.

        Yeah, I'd love requiring 16 plus.. but really I don't think 12 will likely fly.

        If they make it a phrase, they can easily remember it. Correct, Horse Battery Staple....

        Whoops, now I gotta change my password.

        1 Reply Last reply Reply Quote 1
        • gjacobseG
          gjacobse
          last edited by

          Password polices are something that you have to make users deal with to a certain degree. I don't see anything really wrong with setting a policy that forces change but at some compromising level.

          • Not same within 12 months
          • Upper /Lower case
          • Number / symbol
          • Between 8 and 12 characters

          Some systems have the ability (or at least I believe) to eliminate dictionary type attempts (all A's or numbers) - Lame duck type attempts. The system SHOULD be able to have a Screen Hint so that a user knows what they can and can't do. And when the system rejects the password, it should be stated as to why.

          But maybe that is to logical.

          travisdh1T 1 Reply Last reply Reply Quote 0
          • aaron-closed accountA
            aaron-closed account Banned
            last edited by

            This post is deleted!
            gjacobseG 1 Reply Last reply Reply Quote 1
            • gjacobseG
              gjacobse @aaron-closed account
              last edited by

              @aaron said:

              People still remember passwords?

              I would be able to tell you 2. The one for my laptop and the other for opening my password management application. Then there's a password in there for my second password management application. I really have no clue what most of the passwords are that I use. Aside from aaron12 that's super secure and better than the previous one of aaron11.

              Makes written notes of @aaron's passwords.

              Mine are sitting right here on my desk... you just have to determine what order they go in...

              1 Reply Last reply Reply Quote 1
              • travisdh1T
                travisdh1
                last edited by

                Gah, fixed the first link.

                1 Reply Last reply Reply Quote 0
                • travisdh1T
                  travisdh1 @gjacobse
                  last edited by

                  @gjacobse The point is that forcing people to change their password even just 4 times a year means they will forget them, and be forced into using poor choices and/or patterns. Like @aaron I only have 2 memorized anymore.

                  J 1 Reply Last reply Reply Quote 1
                  • J
                    Jason Banned @travisdh1
                    last edited by

                    @travisdh1 said:

                    @gjacobse The point is that forcing people to change their password even just 4 times a year means they will forget them, and be forced into using poor choices and/or patterns. Like @aaron I only have 2 memorized anymore.

                    Using patterns of added or changing special checerters would be better. Either one still prevents the likely hood of a brute force (along with lock outs).

                    travisdh1T scottalanmillerS 2 Replies Last reply Reply Quote 0
                    • travisdh1T
                      travisdh1 @Jason
                      last edited by

                      @Jason said:

                      @travisdh1 said:

                      @gjacobse The point is that forcing people to change their password even just 4 times a year means they will forget them, and be forced into using poor choices and/or patterns. Like @aaron I only have 2 memorized anymore.

                      Using patterns of added or changing special checerters would be better. Either one still prevents the likely hood of a brute force (along with lock outs).

                      Let me quote that FTC article for you. "I go on to explain that there is a lot of evidence to suggest that users who are required to change their passwords frequently select weaker passwords to begin with, and then change them in predictable ways that attackers can guess easily." So using patterns just leaves you more vulnerable. IE They changed their password, bet they just replaced the # at the end with a !, oh, nope, it was an &. The actual data in the article is even more damming than my little example. "The UNC researchers found that for 17% of the accounts they studied, knowing a user’s previous password allowed them to guess their next password in fewer than 5 guesses."

                      1 Reply Last reply Reply Quote 1
                      • scottalanmillerS
                        scottalanmiller @Jason
                        last edited by

                        @Jason said:

                        @travisdh1 said:

                        @gjacobse The point is that forcing people to change their password even just 4 times a year means they will forget them, and be forced into using poor choices and/or patterns. Like @aaron I only have 2 memorized anymore.

                        Using patterns of added or changing special checerters would be better. Either one still prevents the likely hood of a brute force (along with lock outs).

                        that's the worst. That's what creates the security weaknesses that we commonly see today.

                        Far better to have one long, never changing passphrase than many short, regularly changing ones.

                        1 Reply Last reply Reply Quote 2
                        • 1 / 1
                        • First post
                          Last post