Originally posted by: Jzero
Example:
Text
This is some kid's research paper, but it indicates in theoretical terms how easily and quickly one can brute-force passwords of varying lengths with an average-powered PC.
It is safe to assume that given unlimited time and resources, a dedicated cracker will always achieve his goal. Thus, an IT Security monkey needs to operate under the paradigm of frustrating the average cracker and tracing the expert cracker. This as opposed to making it impossible for the cracker to get through - an unachievable level of perfection.
So the key is multiple layers of defense, and good logging.
For user security this means:
A) Long passwords. Ideally 8+ characters, but 6 can be adequate as long as it is coupled with other measures.
B) NO Dictionary words. I periodically run a dictionary attack on my resources and anybody who fails gets to pick a new password.
C) No dictionary words with numbers stuck on the end. I run a periodic hybrid attack to catch these clowns.
D) Passwords must be a mix of letters, numbers, and special characters. Mixing upper and lower case is good, too. The wider your range of possible characters the longer a brute force attack takes.
E) Passwords cannot be repeated. To help with this, make users wait a few days before they can change their password after they change it. This prevents unscrupulous users from "cycling through" to keep their old password.
F) Passwords cannot be derivatives of previous passwords. No incrementing a number at the end of your password.
G) Passwords must not contain your username or display name.
H) Passwords expire at least every 90 days. Maybe even sooner.
I) After 3-5 failed attempts, the account will lock out either for ~60 minutes or prefereably until an admin can verify the identity of the user and unlock their account. The latter is the "best practice" but it's often not feasible if you have more than 2 people to support.
J) LOG LOG LOG. Log any and all failed login attempts, and if they are network logons as opposed to console logons, make sure you get source IPs! Periodically (weekly at least) check the logs for patterns which indicate something more than a user with a caps lock on.
Hope this helps.
Those are all well and good, but minimum length passwords and "no dictionary words" DECREASES the average amount of time needed to crack the system.
As long as the cracker knows the rules of the system (which any good one undoubtedly should), he'll know to leave out 1-5 and 9-x letter words, along with adding a dictionary of his own. With the number of possible passwords reduced several thousand fold, he achieves his goal much quicker.
Originally posted by: Rogue
Mach,
Correct me if I'm wrong, but a top of the line system that's used for cracking just dictionary words on a hash will take mere minutes, right? So if a dictionary attack will take just minutes, can't we just say that allowing dictionary words is pointless? If all it's going to do is buy minutes, but allow the cracker to get the password anyway, then why the hell permit dictionary words in the first place? You're basically trying to say that because it's easy to crack a dictionary word, but it takes time to do so, that it's okay. Yes, we may save the cracker time by publishing a policy preventing dictionary words, but I'll give him/her a few minutes saved time to make it more difficult in the long run to try and crack good, multi-faceted passwords of more than 8 characters.
Just remember not to be so harsh with it that your users start writing them down because then you defeat yourself if you get too draconian.Originally posted by: xchangx
I need to come up with a proposal to justify password security justification for a global corporation?
What I mean by password security is 90 day password changes and 3-6 level deep restrictions (can't use the same one for 3-6 times)
Any suggestions?
Thanks!
Michael Chang
Originally posted by: Utterman
Just tell them you will have to follow this procedure with passwords🙂
Originally posted by: Utterman
Just tell them you will have to follow this procedure with passwords🙂
lol03/08/2001 06:43p 5.0.2195.3351 331,536 Msgina.dll
Originally posted by: Rogue
Mach,
Correct me if I'm wrong, but a top of the line system that's used for cracking just dictionary words on a hash will take mere minutes, right? So if a dictionary attack will take just minutes, can't we just say that allowing dictionary words is pointless? If all it's going to do is buy minutes, but allow the cracker to get the password anyway, then why the hell permit dictionary words in the first place? You're basically trying to say that because it's easy to crack a dictionary word, but it takes time to do so, that it's okay. Yes, we may save the cracker time by publishing a policy preventing dictionary words, but I'll give him/her a few minutes saved time to make it more difficult in the long run to try and crack good, multi-faceted passwords of more than 8 characters.
But this is what I'm saying:
Active Directory can't do this?There is nothing in NT that allows you to ban dictionary words without using third party software.
Originally posted by: bunker
Active Directory can't do this?There is nothing in NT that allows you to ban dictionary words without using third party software.
I'm only asking because I know that's what we use and our pwd restrictions are a minimum of 8 characters, at least two numeric, changed every 90 days, no repeats....ever.
I hate the no repeats one, but c'est la vie.
(btw, I'm a dba, I try to stay far away from you sysadmin bastards 😉 😛)
Originally posted by: bunker
Pardon my craking ignorance, but doesn't forcing alphanumeric eliminate the dictionary attack?
Haha, yeah, most of my customers have their password on a post-it note at the side of the monitor.Originally posted by: Soybomb <Just remember not to be so harsh with it that your users start writing them down because then you defeat yourself if you get too draconian.