Why do I need to change my password

JimKiler

Diamond Member
Oct 10, 2002
3,559
205
106
My work requires me to update my password every quarter and I understand the theory that if someone knows it then when i change it they no longer have access. But in reality is this true. If a hacker or other nefarious person gets it they will lock me out of my account right? They will not just let me change it and shut them out of the system right?
 

Virucyde

Junior Member
Sep 19, 2011
18
0
0
Well, since most companies have a fairly fast password changing system, all you'd need to do if you were locked out by a hacker is call up your IT group and get it changed, locking out the hacker again in the process.
I think it's a bit silly, especially considering most companies have ridiculously stringent password changing requirements, which actually make is EASIER to brute force, but it DOES prevent a compromised password from being useful for an extended period of time.
 

Apple Of Sodom

Golden Member
Oct 7, 2007
1,808
0
0
It is for the same reason that credit cards expire - it limits the usefulness of the card (or password) if it gets compromised. If someone steals your password the worry isn't so much that they will lock you out, rather that they will use your account to access systems that are off limits. Maybe they get your password and don't even lock you out, they just use your account to do whatever they want to do (read your e-mail, browse web, whatever.) At some point your password will expire and they will no longer have access (provided they don't change it on you.)

At any rate, password enforcement policies (complexity requirements, expiration, etc) are low hanging fruit. They are effective and very easy to implement. It causes minor inconvenience to end users but the trade-off is worth it.
 

MrChad

Lifer
Aug 22, 2001
13,507
3
81
It is for the same reason that credit cards expire - it limits the usefulness of the card (or password) if it gets compromised. If someone steals your password the worry isn't so much that they will lock you out, rather that they will use your account to access systems that are off limits. Maybe they get your password and don't even lock you out, they just use your account to do whatever they want to do (read your e-mail, browse web, whatever.) At some point your password will expire and they will no longer have access (provided they don't change it on you.)

At any rate, password enforcement policies (complexity requirements, expiration, etc) are low hanging fruit. They are effective and very easy to implement. It causes minor inconvenience to end users but the trade-off is worth it.

It's debatable whether expiration policies increase system security. When users are forced to change passwords frequently, they tend to choose passwords that are easier to remember or (worse) write down their passwords. These unintended consequences can actually make security worse than just forcing users to have a complex password that never expires.

http://www.cryptosmith.com/node/218
 

JimKiler

Diamond Member
Oct 10, 2002
3,559
205
106
It's debatable whether expiration policies increase system security. When users are forced to change passwords frequently, they tend to choose passwords that are easier to remember or (worse) write down their passwords. These unintended consequences can actually make security worse than just forcing users to have a complex password that never expires.

http://www.cryptosmith.com/node/218

I would agree with this as I have 4 different passwords and while our company has one policy on password strength each is different, SAP requires 4 out of 4 criteria and windows requires 3 out of 4 and the databases exclude characters so when i try to update all passwords at once to the same password i have to try several times before i meet all the various rules. With security threats as they are today if you do not find unauthorized access until the password is reset i would say the damage is already done therefore changing passwords quarterly or more often is a waste of time.
 

Apple Of Sodom

Golden Member
Oct 7, 2007
1,808
0
0
It's debatable whether expiration policies increase system security. When users are forced to change passwords frequently, they tend to choose passwords that are easier to remember or (worse) write down their passwords. These unintended consequences can actually make security worse than just forcing users to have a complex password that never expires.

http://www.cryptosmith.com/node/218

I agree with this, and a lot of administrators don't understand this concept. One of my employers (a huge company) remembers the last 24 passwords. It is ridiculous because people start putting retardedly simple passwords (or increment their password by one.)

People that cannot remember passwords need to be taught to devise an algorithm so they can write their password down. Remember the algorithm (which can be the same for all passwords) and you can safely write down the root of your password, although you still SHOULD NOT do this if you can help it. Anyone that gets your password would also need to get the algorithm for transforming it to your real password, which should be kept secret.

Your algorithm could be as simple as adding 4567 to the end of all root passwords, or whatever.
 

nickbits

Diamond Member
Mar 10, 2008
4,122
1
81
Count me as someone who writes down their pw/increments it by 1 every time a change is required.
 

TanisHalfElven

Diamond Member
Jun 29, 2001
3,520
0
76
while the xkcd comic is funny. It's only true for encrypted data that's local. If you have to authenticate with a server really any password nobody can guess in the 1st 10 tries is good enough.

Also, my school does this thing where they show me the last login. Maybe everyone should start doing that, and making an approve this box. If that time really was the last time you used it, great otherwise account gets flagged and you know you need to change the password (or do something..)
 

Jeff7181

Lifer
Aug 21, 2002
18,368
11
81
I never understood why changing passwords was such a big deal. Even complex passwords don't have to be a slew of nonsense characters, you just follow some simple rules when creating passwords... R3dRubb3rB4ll... C4ndyC4n3... !H4t3Chr!stm4s... C1nam0nT04stCrunch... L00k1nL1k3aF00lW1thY0urP4nts0nth3Gr0und... all of these have been passwords I've used before. The last one was a service account... people rarely had to type it.
 

Scouzer

Lifer
Jun 3, 2001
10,359
6
0
My workplace does this and all my coworkers just go like this:

password123
then when it forces them to change...
password234

we just go back and forth the keyboard since it forces us not to reuse any of the last 5 or 10 passwords

a useless security system.
 

jadinolf

Lifer
Oct 12, 1999
20,952
3
81
I normally wouldn't do it but I've been forced to do it many times lately.

It is a good idea.
 

Dravic

Senior member
May 18, 2000
892
0
76
My work requires me to update my password every quarter and I understand the theory that if someone knows it then when i change it they no longer have access. But in reality is this true. If a hacker or other nefarious person gets it they will lock me out of my account right? They will not just let me change it and shut them out of the system right?

NO not right. The last thing a hack wants to do is draw attention to himself. The days of virus and trojans being only destructive are long gone. They are much morel ikely to use your access to get around the network and look for accounts with better access to secure areas. If the hacker changes your password he tips you and your admins off that he as access.

Your password need to change on a regular basis so that the passwords he may have stolen no longer work, and then alert your security team of the failed access attempts when he tries to get back in. The theory is/was to change the password more frequently then it would take someone to crack them. Getting tough to do with crappy 8-14 char length passwords. Long passphrases that are easy to remember are much harder to crack then a 8-14 char length password of all special chars.

The hacker, after getting your password, is much more likely to use it to download the password hive/file and crack them offline.

If it takes a month to crack a secure password, but you change your passwords every 28 days (try working for a bank some day) then any password he ever gets will already be obsolete.
 

Dravic

Senior member
May 18, 2000
892
0
76
Count me as someone who writes down their pw/increments it by 1 every time a change is required.

You password system is not too good, that should not work because too much of the existing password is then retained. Long easy to remember passphrases are key.


76 North Smith Lane, Somewhere, AA 11223

easy to remember, could be an address of a place you used to work for MANY years ago, or an old girlfriends address. Not easy to figure out or crack, and more secure then any password
 

olds

Elite Member
Mar 3, 2000
50,061
720
126
We have to change passwords every 30 days. I have to log into:
Computer
Novell
Email
Time keeping system
Travel section (I travel for work)
Materials Ordering page.
Probably others that escape me right now.

My passwords are always the month, a phrase I use each time and the year.
So December might be:
decemberpasswordssuck2011

Next month:
januarypasswordssuck2012

I have no nuclear secrets, I don't care how secure it is. What I need is backed up, I'll leave everything else to chance.
 

Red Squirrel

No Lifer
May 24, 2003
67,898
12,365
126
www.anyf.ca
At work I have close to 50 different logins. Some expire every 30 days, 60, 90, while others never expire, or are even shared with the rest of the dept. It's a pain.

It can't be THAT hard to make it so everything authenticates to a single point.

IMO what companies should do is have a single point of authentication that is very secure such as two factor authentication, but have that as the ONLY password.

Also forcing to change is more or less useless. Let's say that at this very moment a brute force bot is trying to guess your password. You can change it all you want, but chances are decent whatever you change it to has not been tried yet by the bot. It's a hit/miss. What every authentication system needs is brute force protection. You can have the most secure password in the world, but if there is no brute force protection on the system, a bot will eventually get in.

Setup a Linux server, forward the SSH port to the internet, leave it like that. Use a very basic alpha numeric password for root. Give it 5-10 minutes and it's hacked. Install fail2ban or other brute force protection system, you wont get hacked. Heck, disable root logons, make a user account with a common name, like asmith or something. That account will get hacked within maybe 30 minutes. Brute force is the easiest way to hack, and also the easiest thing to protect from.
 
Last edited:

Jeff7181

Lifer
Aug 21, 2002
18,368
11
81
At work I have close to 50 different logins. Some expire every 30 days, 60, 90, while others never expire, or are even shared with the rest of the dept. It's a pain.

It can't be THAT hard to make it so everything authenticates to a single point.

IMO what companies should do is have a single point of authentication that is very secure such as two factor authentication, but have that as the ONLY password.

Also forcing to change is more or less useless. Let's say that at this very moment a brute force bot is trying to guess your password. You can change it all you want, but chances are decent whatever you change it to has not been tried yet by the bot. It's a hit/miss. What every authentication system needs is brute force protection. You can have the most secure password in the world, but if there is no brute force protection on the system, a bot will eventually get in.

Setup a Linux server, forward the SSH port to the internet, leave it like that. Use a very basic alpha numeric password for root. Give it 5-10 minutes and it's hacked. Install fail2ban or other brute force protection system, you wont get hacked. Heck, disable root logons, make a user account with a common name, like asmith or something. That account will get hacked within maybe 30 minutes. Brute force is the easiest way to hack, and also the easiest thing to protect from.

Single sign-on and password expiration are unrelated.
 

Red Squirrel

No Lifer
May 24, 2003
67,898
12,365
126
www.anyf.ca
I never said they were, I'm just saying, it should be standard. If they want to expire passwords, at least make it so there's only one to remember. Basically, use something like ldap, and don't buy any solution unless it supports ldap. Or do everything in house. there's lot of ways.
 

alkemyst

No Lifer
Feb 13, 2001
83,967
19
81
People 'suing' due to compromised password bullshit is the reason why companies just follow the painful approach to it's user base. Most of the time the C levels have it easier.

And of course if you are in any type of Network support that matters you can set your password outside the rules FTMFW.

My biggest problem is when some site limits me to under 12 characters for my password. Some go 16 which still doesn't work for me.

So then I spend a lot of time doing password resets which just diverts that traffic to unsecure email.
 

Jeff7181

Lifer
Aug 21, 2002
18,368
11
81
I never said they were, I'm just saying, it should be standard. If they want to expire passwords, at least make it so there's only one to remember. Basically, use something like ldap, and don't buy any solution unless it supports ldap. Or do everything in house. there's lot of ways.

It makes sense in some situations, but would be a huge security risk in others. Imagine having to explain to a customer that their sensitive data was stolen because you didn't want to have to remember multiple passwords, so your password was compromised while logging into the VPN and that also gave the attacker access to firewalls, routers, databases, documents, etc.
 

Jeff7181

Lifer
Aug 21, 2002
18,368
11
81
People 'suing' due to compromised password bullshit is the reason why companies just follow the painful approach to it's user base. Most of the time the C levels have it easier.

And of course if you are in any type of Network support that matters you can set your password outside the rules FTMFW.[/b\]

My biggest problem is when some site limits me to under 12 characters for my password. Some go 16 which still doesn't work for me.

So then I spend a lot of time doing password resets which just diverts that traffic to unsecure email.


That's a pretty crappy system if it allows an admin to break the password policy. Nobody should be able to "work around" a password policy.
 

Paperlantern

Platinum Member
Apr 26, 2003
2,239
6
81
That's a pretty crappy system if it allows an admin to break the password policy. Nobody should be able to "work around" a password policy.

Almost EVERY SINGLE instance of Active Directory in existence does this. The admin can check the box that says "password never expires" on anyone's password. That is circumventing the password policy.

As for brute force; Resetting passwords IS the way of preventing brute force. It would take a computer EONS just to break the password P@$$word4231, but like was already mentioned, the password would have been changed by the time it would have been cracked by any means, whether it be rainbow charts, birthday attacks, dictionary attacks OR brute force, and be obsolete.

IMO it would be so much easier to use social engineering to gain access to a system rather than trying to gain access through a firewall or VPN solution. I'm trying to get my office to implement a "no tell" policy to prevent this very thing. If we need to work on someones machine we just ask for the password and they give it to us no questions asked. ANYONE could pose as a IT person via phone or even in person, the enterprise is big enough with enough IT contractors coming and going that someone could get access pretty easy with a flippant line like "Hey i need to correct some errors we've been seeing on your machine, give me your password and i'll take care of it later today". person will hand over the password without a second thought.

If a no tell policy was in place where we say NO ONE... not even IT, under ANY circumstances will ever ask for your password... then the same question throws a red flag up to that employee and the imposter should be outed. Sorry, tangent there...

Point is, it isn't completely pointless to change passwords in any case. The human factor is a factor with any security policy.
 

Zargon

Lifer
Nov 3, 2009
12,240
2
76
Almost EVERY SINGLE instance of Active Directory in existence does this. The admin can check the box that says "password never expires" on anyone's password. That is circumventing the password policy.
.

yup

been a baaaaaad admin before and done that. BES is the primary reason its ultra useful
 

JimKiler

Diamond Member
Oct 10, 2002
3,559
205
106
It makes sense in some situations, but would be a huge security risk in others. Imagine having to explain to a customer that their sensitive data was stolen because you didn't want to have to remember multiple passwords, so your password was compromised while logging into the VPN and that also gave the attacker access to firewalls, routers, databases, documents, etc.

It is just as bad to have so many passwords that expire every three months that they get written down on pieces of paper.

Almost EVERY SINGLE instance of Active Directory in existence does this. The admin can check the box that says "password never expires" on anyone's password. That is circumventing the password policy.

As for brute force; Resetting passwords IS the way of preventing brute force. It would take a computer EONS just to break the password P@$$word4231, but like was already mentioned, the password would have been changed by the time it would have been cracked by any means, whether it be rainbow charts, birthday attacks, dictionary attacks OR brute force, and be obsolete.

IMO it would be so much easier to use social engineering to gain access to a system rather than trying to gain access through a firewall or VPN solution. I'm trying to get my office to implement a "no tell" policy to prevent this very thing. If we need to work on someones machine we just ask for the password and they give it to us no questions asked. ANYONE could pose as a IT person via phone or even in person, the enterprise is big enough with enough IT contractors coming and going that someone could get access pretty easy with a flippant line like "Hey i need to correct some errors we've been seeing on your machine, give me your password and i'll take care of it later today". person will hand over the password without a second thought.

If a no tell policy was in place where we say NO ONE... not even IT, under ANY circumstances will ever ask for your password... then the same question throws a red flag up to that employee and the imposter should be outed. Sorry, tangent there...

Point is, it isn't completely pointless to change passwords in any case. The human factor is a factor with any security policy.

How long would brute force take to crack an 8 char password if you are locked out after 3 or 4 attempts?
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |