64

Almost every web service I can imagine has the user pick the password. Why is this? Couldn't the system choose a better password? It doesn't have to be some complicated mess; see this answer. Do users just find their own choices more convenient? When selecting the password for the user, you know the entropy, as opposed to placing some restrictions that may prevent them from using a low entropy scheme.

Why do we let the user pick the password?

Anders
  • 64,406
  • 24
  • 178
  • 215
PyRulez
  • 2,937
  • 4
  • 15
  • 29
  • 5
    Though it's not a one-to-one relationship, credit card companies in Canada have been choosing (chip card) PIN numbers for users for a long time. – Cat Apr 14 '15 at 01:46
  • 72
    If you make me remember your password, I'll forget your service. – Vercas Apr 14 '15 at 22:15
  • 8
    It doesnt matter how secure a password you force the user to use if they write it down or put it on pastebin because they cant remember it. – Vality Apr 14 '15 at 22:35
  • 10
    @Vality - that's not entirely true. If I pick a weak password on a web service, anyone in the world can try and guess it. If I use a strong password and write it on a post-it note on my monitor at work, a very small number of people I generally have to trust anyway have access to it. If I write it down in a password manager application that's protected by a password I don't write down, it's even harder for anyone else to access. – armb Apr 15 '15 at 10:49
  • 16
    An actual example: My online bank generated a password for my account, which is only 5 characters long and can not be changed. That is not a happy feeling... – Lars Ebert Apr 15 '15 at 15:07
  • 5
    @LarsEbert Don't tell anyone your bank. – PyRulez Apr 15 '15 at 16:32
  • 6
    @PyRulez No worries. I would not have posted that comment if I still was with that bank! – Lars Ebert Apr 15 '15 at 19:31
  • 1
    If you are going to chose a password for me you are going to chose one which is weaker than what I would have chosen myself. A significant fraction of sites where I am allowed to choose a password end up reject the one I chose because they for some obscure reason decided to put an upper limit on password length. If you were to chose one for me, I am sure it would be even weaker than permitted by those arbitrary length limits. – kasperd Apr 15 '15 at 23:06
  • 4
    @kasperd keep in mind the typical audience of Security.SE has nothing to do in terms of security behaviour with that of lay human beings... :-) – Steve Dodier-Lazaro Apr 16 '15 at 02:13
  • @SteveDL My point is that by enforcing a specific password strength you are guaranteed to either lose some users or reduce security for some other users. – kasperd Apr 16 '15 at 07:09
  • 1
    Password entropy for web services is overrated. Limiting login attempts to one per second and/or requiring a CAPTCHA after a few failed attempts is much easier to enforce than high-entropy passwords and provide about the same level of security. – Dennis Apr 16 '15 at 22:35
  • @Dennis Apparently the passwords are used to protect data using encryption. No known encryption scheme incorporates CAPTCHA technology (and good luck designing that.) – PyRulez Apr 16 '15 at 22:37
  • 1
    Well, that's an entirely different matter. For encryption, the 44 bit entropy password from the XKCD comic isn't enough. – Dennis Apr 16 '15 at 22:43
  • @Dennis I noted that in the post. – PyRulez Apr 16 '15 at 22:57
  • 1
    Offer me Single sign-on, and I won't enter any password. :) – Andrea Corbellini Apr 17 '15 at 12:32
  • I use a long, secure password that has special meaning for me and that I've typed a million times so it isn't a hassle. Having a randomly-generated password, even a readable one, wouldn't be as easy to remember or as fast to type as one that has special significance AND high entropy. Instead of generating passwords, force the users to make high-entropy passwords. – Elliot Gorokhovsky Apr 19 '15 at 06:05
  • @Dennis Rate limiting to one password attempt per second wont help the 40% of users who typically chose one of the top TEN common passwords. What would help them is making them use a different password (and here you can argue about HOW MUCH entropy you actually need, but it still comes back to entropy.) – AviD Apr 22 '15 at 09:04
  • 2
    @RenéG that's great, you have a super strong password... that you then went and shared on a few dozen different sites. At that point it doesn't matter how much entropy there is, one of the other sites knows your password. http://xkcd.com/792/ – AviD Apr 22 '15 at 09:06
  • @avid No, I shared a hash of my password – Elliot Gorokhovsky Apr 22 '15 at 14:54
  • 1
    @RenéG you're missing a key point about the reality of IT services: most developers don't know how to implement authentication properly. Many sites you use will be compromised in the future, and probably half of them will use a weak for of hashing that can be reversed. Some might even be compromised to the extent that attackers can actively record what new passwords are being typed, impeding your security even further. Having a single password means accepting total compromise for all of your services -- be strategic and keep a unique password **for your important accounts**. – Steve Dodier-Lazaro Apr 22 '15 at 15:02
  • 1
    @SteveDL or even further, perhaps those developers are themselves malicious towards other sites.... http://xkcd.com/792/ – AviD Apr 22 '15 at 15:40
  • @AviD unimaginable :D – Steve Dodier-Lazaro Apr 22 '15 at 15:54
  • @Eric you sure about that. I picked my own pin for my card in Canada. – ComputerLocus Apr 23 '15 at 13:03
  • @Fogest Yes, it was sent in the mail with my MasterCard. – Cat Apr 23 '15 at 15:00
  • @Eric that must be MasterCard specific. For my visa I chose my own – ComputerLocus Apr 23 '15 at 15:56
  • A similar question: "Why does the user pick the username?" It would be easy to eliminate both by following a different authentication scheme. – Noctis Skytower Nov 18 '16 at 18:44

11 Answers11

73

Why, indeed?

Allow me to ignore that question for a moment, and answer your implied question: Should we?
That is, should we continue to have users create their own password, which is often weak, instead of just having the system generate a strong password for them?

Well, I am of the controversial opinion that there is a pretty strong trade-off here - having a secure password, and KNOWING how secure it is (as you point out), on the one hand, and on the other side is the user's feeling of security. "Usability", to some extent.

I think there are several aspects to this feeling of security: some users would want to ensure that they have a strong password themselves (e.g. via a password manager, or diceware); some users would want to select an easy password; and some users want to use the same password everywhere. And yes, many users just plain expect to be able to set their password, for whatever reason - so besides any specific cause, you will still need to fight the re-education battle, which is far from easy.

Also, don't forget that once you get a good strong password to the user, the (often non-technical) user still needs to figure out what to do with it - even passphrases become difficult to remember after the first dozen or so, or if you only use it every 6 months... The non-technical user would most likely save it in a word document on their desktop, or in their email. (And of course write the OS password on a sticky note attached to the screen).

Now, don't belittle these reasons, or these causes for using weak passwords - we the security industry have created this scenario for the simple folk over years. But it really comes down to: how secure do you need your site to be. How much risk can the user decide to take upon himself/herself, and how much of that is system risk that should be taken out of the user's hands.

So bottom line: Yes, I think most sites that have non-negligible security requirements should offer password/passphrase generation. Depending on the profile and architecture, you could offer 3 options when registering an account (or changing password, etc...) - just make sure to only display the password after warning the user against shoulder-surfing:

  • Generate passphrase - with a configured or flexible number of words (default)
  • Generate crazy-strong password with ridiculous entropy, e.g. for saving to password manager
  • Create your own.

In fact this is what I've been recommending for some time now (variants dependent on the specific requirements...).


Going back to your original question, why is the above not done?
I would guess a combination of legacy systems and bad habits; mis-education (the overwhelming majority of sites still have BAD password policies and recommendations); and perhaps just a lack of awareness of a better solution.

Yes, this is why passwords suck. :-)

AviD
  • 72,138
  • 22
  • 136
  • 218
  • 34
    And as a user, I want to *choose* my level of security. I reuse a certain (easy) password quite a bit. It's what I use for garbage accounts, or things that otherwise need no protection in my case. – Paul Draper Apr 13 '15 at 21:34
  • @Paul Draper Password reuse = 0 entropy (maybe a bit or two more if you have a list of passwords you randomly select from.) – PyRulez Apr 13 '15 at 21:59
  • Also, about that recommendation, do you have any resources relating to that (case studies, articles, websites)? – PyRulez Apr 13 '15 at 22:01
  • @PyRulez, you may want to show your calculations. – Paul Draper Apr 13 '15 at 22:18
  • @PaulDraper If your "algorithm" is "always use *this* password", then -log2(100%) = 0. – PyRulez Apr 13 '15 at 22:19
  • @PyRulez, that's a poor calculation. If my "algorithm" is "always use *this* password" on example.com, then -log2(100%) = 0. – Paul Draper Apr 13 '15 at 22:25
  • @PaulDraper Even is you use 4 certain passwords quite a bit, that's still only 2^2 = 4 meaning 2 bits of entropy. – PyRulez Apr 13 '15 at 22:27
  • 9
    @PyRulez the reality is a bit more nuanced. Few non-security professionals have more than a handful of passwords, of which they create variations. There are no password strength metrics that fully account for this phenomena, as the security community still hasn't developed the tools to study the effects of password reuse, and the models to plug onto those tools to estimate the risks of different reuse strategies. Read up Cormac's papers on password portfolios and watch our group (http://sec.cs.ucl.ac.uk/) closely if you want to know more. We have a team working precisely on this. – Steve Dodier-Lazaro Apr 13 '15 at 23:19
  • @SteveDL if the password is reused as is (with no formulaic transformations), and reused on any and every site - then entropy is irrelevant and pointless to calculate. Since you've already gone and exposed your password to anyone who asks for it, bruteforce has become pointless (generally speaking). If there IS some "formula", it is usually pretty trivial and transparent, and the *additional* entropy would be a similar calculation to the xkcd's first box - maybe the name of the site, maybe the initials, etc - 3 bits at most for that, then another couple for location - before/after/middle... – AviD Apr 14 '15 at 09:05
  • 3
    One important question is if the password protects the user, or if the password protects the user's access to somebody else's formation (e.g. a company account). – CodesInChaos Apr 14 '15 at 10:57
  • @CodesInChaos absolutely agree, this is what I was alluding to (probably too subtle) with: "How much risk can the user decide to take upon himself/herself, and how much of that is system risk that should be taken out of the user's hands." – AviD Apr 14 '15 at 11:30
  • @AviD that's why I'm saying that what matters is which passwords are reused where. Transformations can be relatively trivial to find too, especially if you've already got several passwords of the victim. – Steve Dodier-Lazaro Apr 14 '15 at 11:51
  • Is there something wrong with storing passwords in a word document on your desktop? – paj28 Apr 14 '15 at 12:17
  • 5
    Storing passwords on your desktop without any kind of cryptography is pretty bad, because an attacker gaining even just a read-only access to your box might get them. You'd rather use a KeyPass or such to mitigate this risk. Regarding the "password on a sticky note", I honestly think that's not such a big deal, physical security is far from being the main concern in most attacks, and if the attacker can read your sticky note, he can most likely have a direct physical access on most of your boxes, it's already game over. – Dillinur Apr 14 '15 at 14:01
  • 24
    "Generate crazy-strong password with ridiculous entropy, e.g. for saving to password manager" -- I'd be interested to know whether anyone actually takes this option, since password managers can generate crazy-strong passwords for themselves. Doesn't do any harm, but seems a bit like offering a barking service to dog-owners ;-) – Steve Jessop Apr 14 '15 at 14:03
  • @Dillinur I think he was joking (hopefully.) – PyRulez Apr 14 '15 at 22:30
  • 1
    @PyRulez - actually I wasn't. All my passwords are in a Word document on my desktop. Are you now able to steal my online identity? – paj28 Apr 15 '15 at 08:42
  • 2
    It makes post-exploitation phase a lot easier.. Any vulnerability that gives Read access to your filesystem will have tremendous more impact. – Dillinur Apr 15 '15 at 12:06
  • 5
    @paj28 Not me, but every single program on your computer can. – Navin Apr 15 '15 at 16:15
  • @Dillinur - I was inclined to agree with your thoughts on post-it notes. However, today I saw [this](http://www.theregister.co.uk/2015/05/01/london_rail_station_exposes_signal_system_passwords/) – paj28 May 04 '15 at 00:34
  • I'd say that this is a more preventable (& less prone to happen) risk. You're more likely to get bruteforced than recorded in my opinion, but your mileage may vary. – Dillinur May 04 '15 at 07:37
30

Getting the password to the user

The only times I have seen systems that set the password for the user, it is send to the user via email (obviously in plaintext), which is obviously a bad idea[*] (and SMS, Mail, etc are not that much better).

So that would leave displaying the password when creating the account (which might also be a bad idea because of shoulder surfing). I would assume that this would lead to a lot of users who would overlook this, or not realize that it is important. Users are used to remember/write down/store passwords when they create them themselves, but they are not used to reading some page after they created an account; many would most likely just ignore it.

[*] because anyone gaining access to the users mail account (brute force, user forgot to log off, etc) will not have access. If an attacker uses password reset to gain access, a user would at least notice this.

Getting the user to remember the password

Users need to know their passwords. Typically, they have a couple of options for this (memory, writing it down, or storing it in a file or password manager). One of the primary ones (memory) would not be practical with your approach[*], which I would assume is the main reason that websites do not generate passwords for users.

[*] even with easy-to-remember generated passwords users will still have a harder time remembering that than passwords they chose themselves.

User Experience

Security is not the main business of most web services. It's often more important that users are happy, and many users will not be all that happy if they cannot chose their own passwords (because they do not want to remember generated passwords, and they do not want to write them down, and they also do not want to use a password manager). Users just want to use a service, and anything that makes that more complicated can potentially lead to a percentage of people using a competing service.

Conclusion

Passwords are always a tradeoff between usability and security, and not letting users chose passwords reduces the usability of a service too much for most of them (and because of the problems of actually getting the generated password to the user, it might not even add all that much security).

tim
  • 29,018
  • 7
  • 95
  • 119
  • 4
    +1 for the first point, the average human brain still remains the most secure storage of raw sensitive data. (from an architectural point of view of course) ;) – Ceiling Gecko Apr 14 '15 at 13:36
  • 2
    I find the first point pretty dubious, with access to the user mail account, you can already reset his password for basically any website. – Dillinur Apr 14 '15 at 14:03
  • 1
    @Dillinur yes, I did mention that. But resetting is different than knowing the password because the user notices it and can then take measures (like changing passwords, etc). Also, I could imagine that users would reuse passwords that are generated for them at websites that do let them chose their own password (so that they have to remember less passwords). – tim Apr 14 '15 at 14:36
  • 3
    +1 For user experience. I've not used services because they restricted my password choice too much. If I wasn't even given the option to choose my own then I'd give up straight away and give the screen the middle finger. Rule number one, don't piss off users, let them do what they want. – Novocaine Apr 15 '15 at 11:18
17

Organisations want users to be responsible.

If the user chose the password, they can be blamed for choosing a bad one.

Unfortunately, in the real world, organisations may have to be more concerned about seeming to take some of the responsibility for intrusions than about insuring they can't happen.

Users want to choose something they can remember

Many users will not write down their passwords (setting aside whether this is a good idea or not). They prefer to choose something they think they can remember. (This is especially important for the thousands of sites that shouldn't need a password but force users to pick one).

MGOwen
  • 271
  • 2
  • 7
  • 5
    Your point about blame is spot on. Most web sites tell you to pick a unique strong password and never write it down. No-one is actually going to be able to do that for all their online accounts. But now it's their fault, rather than the web sites! The solution? Password managers! – paj28 Apr 14 '15 at 12:19
11

One respondent touched on the right answer, but didn't expand on it enough, so I will.

You are asking the question from a computer- or IT-centric perspective. But why does that IT exist? To serve the customer. Let me repeat this: The customer is not there to serve you, you are there to do what they need you to do.

So with that in mind, let's revisit the question: Why do we still allow customers to choose their own passwords? Why don't we set passwords for the customers?

Because if we force passwords on customers, what do you suppose they are going to do? We imposed something immemorable on them that they need to know later. I guarantee they are going to grab a Post-It and write that password down.

You have failed. Passwords written down on paper are a security failure. You never want that to happen. And before you blame the customer in this case, you're the ones who forced them to use a password they had no hand in creating. They had no chance to make it memorable. You told them "Memorize 'F82$fVq9' and don't write it down." As a customer my first reaction would be "F*** you." Companies don't get to tell customers what to do. Customers will find ways to rebel, including writing down your random passwords. Don't fight human nature. You. Will. Lose.

This is why we let customers choose passwords. If your site is worth any salt, it does as most sites do today, it checks the chosen password strength. It ensures the password is 8 characters long, has two digits, an uppercase character, and a symbol.

And you've still failed your original objective because today's computers can brute-force 8-character passwords in seconds. Just sayin'.

You want real password security that the customer chooses and where you're also happy with the strength? Here you go: https://xkcd.com/936/

schroeder
  • 123,438
  • 55
  • 284
  • 319
Kurt Tappe
  • 211
  • 1
  • 4
  • 5
    I think you missed the point of the question, if you even read all the way through it. The OP specifically refers to xkcd-style passphrases (even linked to it), and explicitly mentions how your "Memorize 'F82$fVq9'" is broken, and typically what users do anyway - *which is what the OP is trying to fix*. This whole password requirement thing is something that *IT* came up with and enforces, its definitely not something for serving the customer. – AviD Apr 15 '15 at 06:31
  • I mostly agree with this answer, but I don't think written down passwords are as bad as suggested. Extending this answer, we can say that some of our users are customers and some are employees. In certain circumstances, it might make sense to generate passwords for our employee users. – emory Apr 15 '15 at 21:06
  • @AviD - What you can memorize/use easily is emphatically *NOT* what I can memorize/use easily; *NOBODY* can generate an easily-remembered passphrase for another person (without then going on to habituate the user by making them jump through that particular hoop frequently over an extended period). Whatever you generate for me may as well have been 'F82$fVq9'; it just requires more keystrokes per character, so to speak. – Stan Rogers Apr 16 '15 at 03:24
  • 1
    @StanRogers that's actually a good point there - generic wordlists are generic, and do not take into account things like culture differences, language barriers, and globalization issues in general. Not to mention personal idiosyncrasies... That's why I recommended to *offer* generated passphrases, and never to *enforce* them. So it would be better in the general case, and revert to the status quo in the exceptions. – AviD Apr 16 '15 at 07:34
  • I think this answer points out some very good/important points. We in IT often put our needs in front of the user needs. It is far better to let the user choose a password they are comfortable with and meet their security requirements. The other point to consider is how difficult it is to actually create a system which generates 'random' passwords that are user friendly (i.e. rememberable) AND don't exhibit a bias/pattern which could result in overall weaker security should someone guess the pattern – Tim X Apr 16 '15 at 23:03
6

Think about it this way, if you choose the user's password for them, they will forget it, and have to use password reset systems.

The 'forgot my password' is usually less secure than the password, so making the password more secure, but causing more password resets makes the entire system less secure as it would be harder to detect fraudulent 'forgot my password' attempts.

Edit: I am assuming you don't work for a bank or nuclear weapons silo. If you do, please disregard my advice.

Scott
  • 192
  • 4
  • 1
    Why wouldn't a system be able to make a memorable password? Its a simple task. – PyRulez Apr 13 '15 at 22:25
  • 4
    Count up how many passwords you have, I'm going to guess it's in the range of 50+. No-one can remember that many passwords, even if they are memorable. – Scott Apr 13 '15 at 23:03
  • Well you certainly aren't reusing them are you? – PyRulez Apr 13 '15 at 23:16
  • 6
    @PyRulez Define "memorable". Your usenet provider (which you use mostly through an exposed API and key between used by your software interface) gives you the passphrase "Blue elephants, only eat 12 green turnips" (punctuation and numbers intentional). You come back after not using the user-side interface for 6 months, because you want to change plans or buy more download quota. Dangit, what was that passphrase? Something about pink dinosaurs and onions? – killermist Apr 13 '15 at 23:16
  • 10
    @ PyRulez Yes, I reuse passwords. If you work out how to post cat pictures for me on my reddit account, then you will also be able to post cupcake pictures for me on my instagram. I will live with either of these dire consequences. Unimportant services need to focus on taking up as little of my brain as possible, so that I can focus on remembering high entropy passwords for work, banking, and other things that have a consequence if the password is made public. – Scott Apr 13 '15 at 23:49
  • 2
    If you work in a nuclear weapons silo, then the password is "00000000" (seriously!). – Simon B Apr 15 '15 at 15:56
4

I don't pick my own passwords. I use a password manager that generates random passwords for me.

However, most web sites are based on the idea that users will memorise their passwords. It's much easier for a user to memorize a password they picked themselves, rather than one assigned to them. In practice as well, users typically use the same password on many sites, and while the small print will tell them not to, the sign up process can't stop them.

I strongly feel the "memorize your passwords" model is flawed, and a password manager is a better choice for just about everyone. But this is not the reality; I don't have figures, but even among my tech-savvy friends, using a password manager for everything is rare.

paj28
  • 32,736
  • 8
  • 92
  • 130
  • 2
    The problem with the password manager approach is that either you only have it on your main computer, or you trust a third party with all of your passwords (at least that they have the right crypto). I've not managed to overcome the fear of letting some sync service sync my passwords to _everything_. – RomanSt Apr 15 '15 at 13:00
  • 2
    @romkyns - you can use your own password manager and sync the encrypted file through a cloud service, or a USB stick – paj28 Apr 23 '15 at 08:36
2

Despite this question already having a billion answers, very recent proposals for browsers make it worth mentioning another possibility. Yes, the current password solution sucks. However, the answer isn't to do passwords better. The answer is to ditch passwords. A new proposal is out from W3C and Fido to push for native browser support of external user authentication - hardware keys, biometrics, etc... Here's just a couple articles:

https://techcrunch.com/2018/04/10/fido-alliance-and-w3c-have-a-plan-to-kill-the-password/amp/ https://fidoalliance.org/fido-alliance-and-w3c-achieve-major-standards-milestone-in-global-effort-towards-simpler-stronger-authentication-on-the-web/

Obviously this is a long way from being in common use. It's also worth a mention that it will be a long time (if ever) before login options like these completely replace passwords. Passwords will be around for a long, long time. However, if I were building a system that needed top notch user security, I wouldn't bother providing an alternate password-generation option. I would simply support current password best-practices, and I would provide support for alternate authentication schemes such as the above as soon as the technology is feasible.

Conor Mancone
  • 29,899
  • 13
  • 91
  • 96
2

In many situations, the user is expected to be their own security watchdog because the user of the system is not the threat to the system. The threats to the system are administrators and employee-grade operators that by virtue of position have elevated exposure and permissions/rights within the system.

Without a seriously flawed system already, James Random Person won't be able to generate and add to his account $4 million out of bits and bytes, all by himself. He, or someone acting as him can only really damage his own account. The real threat is from those with elevated privileges/rights, that are on the inside. If James Random Person has a password of "xxxx22", and his account gets compromised, that's on him, not on you.

Yes, secure passwords/passphrases are a great idea. But as soon as you start forcing users to use them, users will get upset, and users will leave.

killermist
  • 171
  • 5
  • In a bug-free world, you may be right. However, I don't think we are yet to the point that we can dismiss privilege escalation as unimportant. – George Cummins Apr 14 '15 at 01:51
1

Other people have mentioned it before- but I feel that a user is expected to have control over the security of their account.

That being said, I do agree that many passwords aren't very strong and should certainly should be checked by a client-side (so we're not sending raw passwords through the network) checker for complexity, and if the password doesn't score high enough, we require the user to create a stronger password.

Even if the password has a required change the user is still coming up with the change, and like you've always heard back in school, "if you write it you won't forget it," and I think the same is true in this circumstance with creating passwords.

Off topic, but I highly recommend 1Password for users having trouble remembering passwords.

0

When selecting the password for the user, you know the entropy, as opposed to placing some restrictions that may prevent them from using a low entropy scheme

In order to have the best of both worlds, you could also compute the entropy (or whatever mechanism you deem appropriate) while they type their chosen password. This is the mechanism used on many sign-up pages:

enter image description here

enter image description here

There are several advantages of this method (the user picks his password, he is aware that this is a "good" or "bad" one, ...).

Just make sure that your philosophy of what constitutes a good and bad password makes sense and that your implementation is password managers-friendly (I simply HATE these sites which break Lastpass in the name of god-knows-what)

WoJ
  • 8,957
  • 2
  • 32
  • 51
  • Password entropy is a function of generation method. Assuming you generated it the obvious way, piepiepiepiepiepie is not a good password, and there is intrinsically no way to determine entropy from the password. – PyRulez Apr 15 '15 at 16:36
  • @PyRulez: the password entropy is a [mathematical function](https://en.wikipedia.org/wiki/Password_strength#Entropy_as_a_measure_of_password_strength) and can be computed on the fly. This is a terrible indication of the strength of the password and your example is very good: the entropy is 84 bits (good!) but if the attacked knows how this particular password is built (the same word repeated several times) then it becomes a bad one. If the enforced rule is that it is made up of 6 words, lower case - it is very good, etc. – WoJ Apr 16 '15 at 07:01
  • Its a mathematical function of process, not password. (-sum(p log p)). Assuming I got pie randomly from randalls list, its slightly more than 11 bits (the number of times I repeated it is somewhat random.) All the attacker has to do a simple dictionary attack, except he tries repeating the word multiple times. – PyRulez Apr 17 '15 at 09:39
0

Ok passwords suck. I actually have found more evidence of early password failure than well designed password systems when looking at passwords as an access control method prior to computers. There is unfortunately three methods I have seen to "address" the problem.

  1. cost risk analysis: Decide that the risk is small and the cost is large so do nothing (there are a lot of answers that argue from this point of view on this question).

  2. better passwords: At the core your question is looking for a way to do this. Unfortunately this is hard and expensive (opportunity cost at a minimum). For example I made an effort in my spare time over a period of months to setup a password generator integrated into the login password expiry of my computer using pam. I have made no significant progress and the base components have been removed from my chosen distribution for bugs.

  3. something other than passwords: I have made a effort to setup smartcard based login on my computer before recommending it to my boss. I have not found anyone to sell me one to test. Hopefully this has changed in the last year, but last time I checked they were less available than previously in the US.

I find this depressing.

hildred
  • 449
  • 1
  • 4
  • 9