- Oct 9, 1999
- 21,019
- 156
- 106
Yeah, it's been discussed, I don't care. I have had it with the needlessly overdone rules for creating passwords.
Given: a strong password is reasonably secure within the firewall.
Given: if nobody outside the firewall can even access the application, the potential for brute force password guessing is a lot smaller.
Given: disabling access after too small a number of wrong entries only drives up help desk workloads.
Given: An strong, unguessable password that uses digits and special characters does not need to be changed. (OK, this is debatable)
So to the people who determine the password rules, can't you see that OVERCOMPLICATED RULES ONLY WEAKEN SECURITY!
The PC logins require 8+ characters, at least one digit, at least one special character, cannot reuse any of the last 24 passwords, good for 3 months. 3 wrong tries, you're locked out until you get IT involved.
Main corp application requires EXACTLY 8 characters with EXACTLY 1 digit and NO special characters, cannot reuse any of the last 24 passwords, good for 6 months. 3 wrong tries, you're locked out for an hour.
Just let me create a password strong enough to satisfy your overinflated sense of paranoia, please. Make the rules as complicated as you want. But then I should not need to change it, ever. Nobody will ever guess it. Nobody WANTS to guess it. Only people behind the firewall can even get to the applications anyway. They have their own access, why would they try to use mine?
Allow 10 wrong tries before disabling access. It could be 20, it won't hurt security any. Just log that there were an excessive number of wrong tries and where they originated.
And I'd love to hear the argument for how not allowing reuse of old passwords does a single thing to improve security.
You don't support single sign-on, you make people change their passwords too frequently, you make the rules too complicated, and what you get is people writing down their passwords. You ought to realize that's a symptom of a problem right there. Your wonderfully complex password scheme flushed down the toilet because practically every keyboard has a sticky note on the bottom with the written-down passwords.
Given: a strong password is reasonably secure within the firewall.
Given: if nobody outside the firewall can even access the application, the potential for brute force password guessing is a lot smaller.
Given: disabling access after too small a number of wrong entries only drives up help desk workloads.
Given: An strong, unguessable password that uses digits and special characters does not need to be changed. (OK, this is debatable)
So to the people who determine the password rules, can't you see that OVERCOMPLICATED RULES ONLY WEAKEN SECURITY!
The PC logins require 8+ characters, at least one digit, at least one special character, cannot reuse any of the last 24 passwords, good for 3 months. 3 wrong tries, you're locked out until you get IT involved.
Main corp application requires EXACTLY 8 characters with EXACTLY 1 digit and NO special characters, cannot reuse any of the last 24 passwords, good for 6 months. 3 wrong tries, you're locked out for an hour.
Just let me create a password strong enough to satisfy your overinflated sense of paranoia, please. Make the rules as complicated as you want. But then I should not need to change it, ever. Nobody will ever guess it. Nobody WANTS to guess it. Only people behind the firewall can even get to the applications anyway. They have their own access, why would they try to use mine?
Allow 10 wrong tries before disabling access. It could be 20, it won't hurt security any. Just log that there were an excessive number of wrong tries and where they originated.
And I'd love to hear the argument for how not allowing reuse of old passwords does a single thing to improve security.
You don't support single sign-on, you make people change their passwords too frequently, you make the rules too complicated, and what you get is people writing down their passwords. You ought to realize that's a symptom of a problem right there. Your wonderfully complex password scheme flushed down the toilet because practically every keyboard has a sticky note on the bottom with the written-down passwords.