Go Back  FlyerTalk Forums > Travel&Dining > Travel Technology
Reload this Page >

Password "security" ?

Password "security" ?

Old Jan 22, 2016, 10:33 am
  #16  
 
Join Date: Feb 2008
Posts: 1,154
My biggest problem with the sites that use more obscure rules and force you to change the password frequently is that I'm not convinced it's really making things more secure because I find the harder it is for someone to remember their password, the far more likely it is that they'll write the password down somewhere, and frequently that somewhere will be easily located from where the computer is. This is something that I frequently have to harass my users about (among other things, we had a security audit a number of years ago, and this is one thing they specifically were looking for in the building). I have a few users that have pages of notes of sites and passwords sitting next to their computers. Thankfully, they're not generally the same faculty members that leave their office door wide open and wander off for hours at a time (in a building that has had occasional thefts occur in it). We do have one annoying piece of software in our department that makes you change the password every 6 months, and with the last update we had, they went from remembering the last 10 passwords to the last 50 (and I'd consider the last 10 to be excessive).

I was pretty resistant to it myself for a long time, but I've ultimately gone to using lastpass for things. I'm still kinda transitioning to it, but so far it's been pretty reasonable for me. We've also used keepass for stuff that we didn't really want stored online (although note, if you store the file for that on a network drive, when you can't access said network drive it becomes very difficult to retrieve the passwords you need from it in an emergency ).
piper28 is offline  
Old Jan 22, 2016, 2:19 pm
  #17  
 
Join Date: Oct 2001
Location: SW WA
Posts: 3,882
Sadly, my employer blocks the use of password managers like lastpass. The also require an extremely long & complicated passphrase with multiple numbers, symbols and capitalized letters. It means that everyone just has a post-it with their password affixed to their monitor.
Buster is offline  
Old Jan 22, 2016, 4:47 pm
  #18  
FlyerTalk Evangelist
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,781
Originally Posted by Buster
Sadly, my employer blocks the use of password managers like lastpass. The also require an extremely long & complicated passphrase with multiple numbers, symbols and capitalized letters. It means that everyone just has a post-it with their password affixed to their monitor.
So use a local password manager like Keepass on your personal phone, and just copy it over from there.
nkedel is offline  
Old Jan 22, 2016, 6:00 pm
  #19  
 
Join Date: Dec 2014
Posts: 394
Originally Posted by Buster
Sadly, my employer blocks the use of password managers like lastpass. The also require an extremely long & complicated passphrase with multiple numbers, symbols and capitalized letters. It means that everyone just has a post-it with their password affixed to their monitor.
So why not use a password manager on your phone, and use that to access your password? Certainly more secure than a Post-It beside your monitor!
Calliopeflyer is offline  
Old Jan 22, 2016, 7:21 pm
  #20  
 
Join Date: Jun 2005
Location: Tri-State Area
Posts: 4,728
Originally Posted by gfunkdave
So I'm not worried, and I like the seamless online transfer and update of my passwords to and from my various devices.
Good for you!

Originally Posted by Calliopeflyer
So why not use a password manager on your phone, and use that to access your password? Certainly more secure than a Post-It beside your monitor!
^^
dtsm is offline  
Old Jan 22, 2016, 7:52 pm
  #21  
 
Join Date: Feb 2013
Location: Somewhere In The Five Eyes
Posts: 228
http://arstechnica.com/security/2013...our-passwords/

For less than $5US, it is possible to purchase a GPU rig that can do ~80 Billion guesses per second. Hint: Right now, a guaranteed-good (stolen) credit card can be purchased for $4.80US.
gqZJzU4vusf0Z2,$d7 is offline  
Old Jan 22, 2016, 9:20 pm
  #22  
 
Join Date: Dec 2015
Location: ATL
Programs: DL, FL, AA, Choice, Hilton, Hyatt, Marriott
Posts: 3
Password "security"

Great answers so far, great question, great thread.

First I'll comment on "does all this junk I'm asked to do really make a difference." Let's look at how to make a hard-to-guess password, and start with some EASY math.

If you could only use digits 0-9 for a password, the number of different passwords for a given password length is (10^3) -- OK stop stop stop, math is scary. No, let's say you could only have 3 digits -- 10 to the 3rd power, or 10 * 10 * 10 - picture this -- 0-9 (10) TIMES 0-9 (10) TIMES 0-9 (10). 1000 combinations.

If you make that more complicated and have 0-9 plus a-z plus A-Z, you have 10 + 26 + 26 = 62 different characters, to the power of whatever the length is.

Obviously, however complicated (what characters are allowed) and the length of the password both factor in here. (OK, giggle ladies, length is important ha ha)

What's not obvious is that length is more important than variety; 10^5 (100,000) is bigger than 5^10 (9,765,625; that's 97 TIMES more complex, get a calculator out and check).

So ... making people use crazy letters and symbols is basically stupid. Using a "passphrase" is basically really smart. In other words "Oy, my aching left foot" is way better than "#4fTTg6Q$%" and it's a lot easier to remember.

Here's another thing that may make IT people mad. Forcing you to change your password is STUPID. The only "attack" that helps against is if someone steals the password file. They should KNOW if the system was compromised, then force everyone to change their password. Unless someone gets the password file and cracks it, your 14 year old password is just as secure as it was when you created it. It's math.

What does this all mean?

Use a password generator anyway, and if your employer blocks things like 1Password and Lastpass (I prefer lastpass), they're stupid and oh well, find a way to work around it, like copying and pasting on your phone, or using Pushbullet, or some of the other GREAT ideas people have shared.

Now go make your passwords LONGER and easier to remember, or use a tool to make them equally long and impossible to remember.
OracleOfTravel is offline  
Old Jan 22, 2016, 9:24 pm
  #23  
 
Join Date: Jan 2010
Location: New York and Vienna
Programs: PA WorldPass Platinum, AA, DL, LH. GHA Black, SPG and HHonors Gold
Posts: 3,870
Originally Posted by OracleOfTravel
So ... making people use crazy letters and symbols is basically stupid. Using a "passphrase" is basically really smart.
Yes, my password life revolves around variations of passphrases (plus my user names are different and unique to a specific site.

The passphrase I use is a variation of "ourcomputernevercrashesdoesit" and for ..... and giggles I insert a few random numbers in, such as "our1computer2never3crashes4does5it" . This is just an example and don't try to log into my FT account with it please.
jspira is offline  
Old Jan 22, 2016, 9:37 pm
  #24  
 
Join Date: Jun 2013
Location: NYC
Programs: AA Platinum/OW Sapphire, Delta Gold, Marriott Gold
Posts: 89
Originally Posted by Buster
Sadly, my employer blocks the use of password managers like lastpass. The also require an extremely long & complicated passphrase with multiple numbers, symbols and capitalized letters. It means that everyone just has a post-it with their password affixed to their monitor.
I cosign the greatness of 1Password and 1PasswordAnywhere lets you log in via browser after you've set it up. But you can also just have the app on your phone and then type in the password as others have said.
eyeNina is offline  
Old Jan 23, 2016, 5:51 am
  #25  
 
Join Date: Jun 2005
Location: Tri-State Area
Posts: 4,728
Listen to Edward Snowden's suggestions on better passwords: http://www.cnet.com/news/margaret-th...o-john-oliver/.

Makes sense....
dtsm is offline  
Old Jan 23, 2016, 7:57 am
  #26  
 
Join Date: Nov 2006
Programs: Seniors Bus Pass
Posts: 5,528
Whilst Mr Snowden's advice is good, the need is usually for different passwords for multiple sites and remembering that is hard. But other ways can also significantly alter a 'known' word, such as adding punctuation - so Flyertalk (9 chars) becomes F.l.y.e.r.t.a.l.k. (18 chars) or Flyer;;;;;talk (14 chars). Unguessable and not going to work as a brute force attack anytime this century. This Steve Gibson explanation of needles in haystacks is fun:
https://www.grc.com/haystack.htm

Whilst handy for extending and complicating an easy password it only gives you one example and if a site gets compromised and you have used that password elsewhere you have a problem. Many sites store your email address and password and it is if that single site is compromised that causes problems as you probably use the same email address for all your logins - hence why different passwords for each site are important.

But the password manager advantage is that it will give you a randomised 20 character password that is different for each site. If one site ever got compromised the email address and that password does not help the hacker get in anywhere else.

Even if you keep those passwords encrypted on your phone and have to manually input it to keep an employer happy it is way better than the post-it beside the monitor!
antichef is offline  
Old Jan 23, 2016, 10:16 am
  #27  
 
Join Date: Aug 2010
Location: ORF
Programs: Amex Plat, AA, BA Silver, Marriott Plat, Choice Gold, HHonors Gold, IHG Diamond
Posts: 3,749
The New York Times had an article on password managers today, http://www.nytimes.com/2016/01/21/te...an-region&_r=0. Not necessarily endorsing the conclusions but adding this here because of its timely relevance to this thread.
lwildernorva is offline  
Old Jan 23, 2016, 12:53 pm
  #28  
 
Join Date: Feb 2013
Location: Somewhere In The Five Eyes
Posts: 228
All the gimmicks mentioned for passphrases, are already used by crackers, and for which hashcat rule sets already exist.

Use long, random machine generated passwords ... Kinda like my username. Use Nothing from a dictionary. Among the passwords I have cracked using hashcat, my favorite stupid password: You w!ll n3v3r b3 abl3 t0 brut3 f0rc3 th!$ l3ngthy passw0rd!

Hashcat cracked it in the first 24 hours using an 8-GPU rig, street price: $4.80US

Last edited by gqZJzU4vusf0Z2,$d7; Jan 23, 2016 at 4:14 pm
gqZJzU4vusf0Z2,$d7 is offline  
Old Jan 23, 2016, 2:42 pm
  #29  
 
Join Date: Aug 2010
Location: ORF
Programs: Amex Plat, AA, BA Silver, Marriott Plat, Choice Gold, HHonors Gold, IHG Diamond
Posts: 3,749
Originally Posted by gqZJzU4vusf0Z2,$d7
All the gimmicks mentioned for passphrases, are already used by crackers, and for which hashcat rule sets already exist.

Use long, random machine generated passwords ... Kinda like my username. Use Nothing from a dictionary. Among the passwords I have cracked using hashcat, my favorite stupid password: You w!ll n3v3r b3 abl3 t0 brut f0rc3 th!$ l3ngthy passw0rd!

Hashcat cracked it in the first 24 hours using an 8-GPU rig, street price: $4.80US
And thus the rationale for frequently changing passwords (and although not always emphasized, usernames as well) and not reusing passwords. Your suggestions certainly increase the security of a password, but given enough time, any encoded information can be deciphered. There is no 100% safe solution--only best practices.

Your post, though, does demonstrate that the tools for decryption continue to evolve, and the best practices from five years ago or 2013 or even last year may no longer be safe.
lwildernorva is offline  
Old Jan 23, 2016, 5:31 pm
  #30  
 
Join Date: Jan 2005
Posts: 814
Sites are dumb if they allow brute force attacks. It's easy to allow only 3 attempts and then block further attempts for 5 minutes. Then a billion attempts would take over 3000 years!
glob99 is offline  

Thread Tools
Search this Thread

Contact Us - Manage Preferences - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service -

This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.