Warning: include_once(/home/antonaylward/InfoSecBlog/public/wp-content/plugins/wordpress-support/wordpress-support.php): failed to open stream: Permission denied in /home/antonaylward/InfoSecBlog/public/wp-settings.php on line 304

Warning: include_once(): Failed opening '/home/antonaylward/InfoSecBlog/public/wp-content/plugins/wordpress-support/wordpress-support.php' for inclusion (include_path='.:/usr/local/lib/php:/usr/local/php5/lib/pear') in /home/antonaylward/InfoSecBlog/public/wp-settings.php on line 304
Password « The InfoSec Blog
The InfoSec Blog

How much would you give up your laptop for?

Posted by Anton Aylward

http://tech.yahoo.com/blogs/null/154866;_ylt=Av2YyMlmiE8ERpzUwD020zUWLpA5

Remember all those journalists doing the "give you password or a chocolate bar" articles?

Twix bar Purchased March 2005 in Atlanta, GA, USA

Well this seems a lot more realistic - giving up you laptop.

Not just the hardware, but everything on it!

Frightening!

Enhanced by Zemanta

Passwords Suck!

Posted by Anton Aylward

http://techbuddha.wordpress.com/2008/08/13/passwords-suck/

Indeed they do.
Its beginning to look like the point I've been trying to make for years, here and with clients, is finally getting some notice. That the sad real truth is that passwords are security theatre. They provide the
illusion that you're securing something.

For those new here, I've long recommended Rick Smith's excellent book on this matter:
"Authentication: From Passwords to Public Keys" ISBN 0201615991
See his home page at http://www.smat.us/crypto/index.html

Grandpa Rob Slade reviewed this, rather more kindly than some books he's reviewed.
The author of the article recommends passphrases - a passphrase is easy too remember.
In "Password Expiration Considered Harmful" Rick makes the case that the overhead of periodically creating and remembering new but obscure passwords is actually a greater risk than conventional wisdom would lead one to think.

See also 'The Strong password dilemma' and not least of all this cartoon.

I use SSH and a 40+ character passphrase which is a line from a poem I wrote in my youth (and as the bard said, "But that was in another country and besides, the wench is dead"). I fat finger one time in four.

Some of it is practice. If you make people change their passphrases or passwords they won't flow from their fingers so readily.

My home machine, where no-one can get in from the net and where no-one looks over my shoulder except my cats, I've used the same passphrase for over a decade. I can type it a LOT faster than a a shoulder-surfer could see and my fat-finger rate is down around 1 in 300+. I don't even have to 'say' the passphrase in my mind so even a telepath couldn't "sniff" it.

Yes, this is a unique setting. My hardware, my home, no-one else comes near (not even to clean out the dust bunnies).

My error rate at client sites is, though, very high. They have these rules that Rick Smith points out are user-unfriendly and demand that I change the password just about the time I'm getting used to it. In the week after the mandatory password change I probably make 2-3 calls to support. AND I have to dream up more and more forgettable passwords.

If you ask me, its crazy, unproductive and expensive.

To debunk the myth that frequent password rotation is a good idea, see Gene Spafford's blog entry on this.  But many regulations require it, no matter how counter-productive it is and no matter how much it has been shown to weaken security.

Tell me, now often do you change the lock on your front door?

Reblog this post [with Zemanta]