This story appeared on Network
World at
http://www.networkworld.com/columnists/2007/021207bradner.html
Passwords and the
limitations of people
By Scott Bradner Network World, 02/08/07
One of the biggest impediments to
good security is an understanding of what people can and cannot do.
I found one of the best examples
of this the other day, when I was asked to review a security plan presented by
a potential vendor. Overall, the plan was quite good, but in a number of places
the company seemed to forget that humans were going to need to follow the
rules. I'll use this company's password rules to make some points about the
need for vendors developing security rules to remember the limitations of the
people in the loop.
At this company, passwords must be
at least six characters long (the vendor is working on a revision that will
require 30-character passwords); they must have a reasonable degree of
complexity (they must include at least one nonalphabetic character and must not
be simple words, names or digit strings); and they must be changed every 90
days. After three failed attempts, accounts are locked out and have to be
reenabled by a system administrator.
The basic purpose of a password is
that there be a piece of information that in theory is known only by the
legitimate user of a particular account. For this to work, passwords should be
memorized -- not written down where others can find them. Humans have a hard
time memorizing nonsense, so to facilitate memorization, passwords should make
some kind of sense to the user, but not so much sense that people who know the
user can guess them.
It is very difficult to come up
with hard-to-guess but easy-to-memorize, six-character passwords, especially
when at least one of the characters cannot be a letter. Most security geeks
suggest that the minimum reasonable length for passwords these days is eight
characters. It may be far worse to require very long passwords. Most normal
users would be hard put to type a 30-character password reliably. So to ensure
they do not get locked out, they will choose an easy-to-type password and type
it very slowly -- so slowly that it would be easy for someone to watch over
their shoulder when they are trying to log on at Starbucks, and find out this
"high-security" access control.
The worst part of this company's
password plan is the automatic lockout after three failed attempts. Auto
lockout is used to make password-guessing attacks hard. If a password is at all
well-formed, it will take a lot of guesses to break it by brute force (for some
numbers see >>).
Setting the auto lockout to 10,
for instance, instead of three means there would be an infinitesimally small
additional chance that an attacker would guess the right password before being
locked out. From the users' point of view, however, a "three tries and
you're dead" rule means they must use the same password for all their
applications because of the risk involved with not remembering the password.
Requiring reset by a systems person provides little if any additional protection
compared with an automatic reenable after 30 minutes -- and it irritates the
heck out of users.
Finally, the requirement that
every 90 days users have to come up with new passwords they can memorize makes
life very hard for some and does not solve many security problems.
All in all, these rules would be
great if a computer had to follow them. With people in the loop, however, the
rules will in general significantly reduce security rather than increase it.
Disclaimer: Harvard does not
comment on the record about vendor security plans, so the above critique must
be mine.