r/mildlyinfuriating Mar 08 '16

Overdone Fuck it, hackers win.

Post image
14.6k Upvotes

992 comments sorted by

View all comments

2.0k

u/buttonstoyou Mar 08 '16

How about I just go to a new website, how about that.

1.6k

u/King_Baboon Mar 08 '16

That's what makes it even more infuriating. This is a government site where I have to take mandatory training.

324

u/Jurk0wski Mar 08 '16

I had to use a similar government website with mandatory training and a stupid password system like this. And then after finishing creating my account, they repeated back to me what my password was on the next page, and in the confirmation email they sent me. I don't know if you know, but that should never be possible.

140

u/ElusiveGuy Mar 08 '16

It should never be done, but it being possible isn't necessarily an issue in the way that one might think.

Code-wise, it's simple to show the password and also send an email with it, without saving the password as plain text. You just send off your in-memory copy before hashing it appropriately (bcrypt, pbkdf2, etc.).

Of course, there's still the issue of emails themselves being insecure (unencrypted through many servers out of either side's control), so it should never be sent.

16

u/The_MAZZTer Mar 08 '16

Yeah, the problem is if you request the password later through a form and it's sent to you in clear text then. That's when you know they aren't storing them securely. Even in the best case where the passwords are being encrypted, they aren't using one-way hashing to ensure the original passwords can't be recovered if the database is accessed maliciously.

6

u/ElusiveGuy Mar 09 '16

Yup. It's not the initial one that says there's definitely a problem (bad as it already is) but rather when they demonstrate the ability to retrieve the plain text later.

24

u/space_keeper Mar 08 '16 edited Mar 08 '16

[Snip]

I forgot how websites work, and I should be ashamed of myself.

25

u/ElusiveGuy Mar 08 '16 edited Mar 08 '16

Firing off an email from the browser

You send it from the server. Again, this is a bad idea - but that's because email is unencrypted, not because the password is persistently stored unencrypted.

Should cease to exist the moment the user advances to the next page ... It's either being stored locally

A typical application server pipeline goes something like this:

request => app code => (db access =>) app code => response

At any point during app code execution, you can write to the response stream. It's trivial to write the password to the response without having to store it (again, a bad idea, but it in no way implies any form of persistent storage).

The action of "advanc[ing] to the next page" involves sending the request - containing the password - and receiving a response as part of the same bidirectional stream. You don't store the password from the request then retrieve it for the response. You can send it directly back out the response (making a copy in the very much temporary response stream, that does not last significantly longer than the original in-memory copy). Of course, this is a bad idea because you expose the password on-screen, but it's not significantly less safe than the act of sending the password in the request in the first place.

Basically, the "moment the user advances" actually encompasses the entire request and response. It's not like the password disappears from memory the moment they click submit.

My point is people seem to jump to the conclusion of "password is send in response/email" = "they're storing the password as plain text or reversible encryption". This is not true. It's perfectly possible to send the password while only persisting a properly hashed copy of it. At that point the only copy kept by the server is the hashed copy - there might also be a plain text copy floating around email servers and in the page response, but that's a separate issue (and is transient - so would have to be intercepted real-time as opposed to a database leak months/years later).

Also, there are only two dangers to sending the password in the response. The first is that someone can see the password on-screen. That's obviously bad. The second is that the password exists in memory for longer than just the request would require. That's ... not good, but the security impact is pretty minimal. And as long as the request is secure, the response on the same stream is just as secure.


At the end of the day, doing either of those things is bad practice. But it does not necessarily mean the password storage itself is poorly implemented. It does kinda suggest that is happening, since bad security is usually not in isolation, but this is not definite.

2

u/CrazyPurpleBacon Mar 08 '16

Yeah for me it's the email component that makes it annoying, I don't my password for a website anywhere I won't be using it. Seeing my password chilling in the inbox is irritating.

2

u/space_keeper Mar 08 '16

Yes, I've deleted my original response. I had a moment of complete brain-deadedness and forgot how websites work. I haven't done it in a long time, I had it in my head that hashing is done on the client side.

→ More replies (3)

2

u/badcookies Mar 08 '16

Firing off an email from the browser (without opening an external client or taking advantage of some special feature) is no mean feat, and unless this was very recent, would involve sending the plaintext somewhere else to have it emailed back to you.

Actually its trivial and has been done for a very very long time. The server will always be able to see whatever you send it unencrypted / plaintext. The encrypting is done server side.

2

u/space_keeper Mar 08 '16

You're right, I've had a boneheaded moment and forgotten that passwords are submitted over TLS. It's been a long time since I've built a login page!

→ More replies (1)
→ More replies (1)

11

u/diamond Mar 08 '16

And now you know why the IRS has become a playground for Chinese hackers.

2

u/[deleted] Mar 08 '16

The power of government contracting

2

u/[deleted] Mar 08 '16

The power of government "no matter what you do it's wrong."

45

u/[deleted] Mar 08 '16

I'm also guessing you have to change your password every 6 weeks.

32

u/[deleted] Mar 08 '16 edited Jan 29 '25

[deleted]

78

u/King_Baboon Mar 08 '16

It's every 30 days. And I forgot to mention there is a 14 digit alpha/numeric identifier number you have to enter also before you enter your password.

93

u/[deleted] Mar 08 '16

[deleted]

→ More replies (1)

15

u/PM_ME_YOUR_BOOK_PLOT Mar 08 '16

This is how you get people writing lists of passwords and leaving them on their desks.

20

u/MERGINGBUD Mar 08 '16

What you do then is just make your password random keys like 93kHYdnia783jsyd7, to remember it you just save that in a file on your desktop named mypassword.txt

36

u/pinkbutterfly1 Mar 08 '16

Password rejected: must have at least one symbol, excluding comma and exclamation marks; must not have consecutive digits (78).

2

u/SullyKid Mar 08 '16

Use a crawl password. Ever since I discovered these (with the government, of course) I've always used them.

2

u/epicshawty Jul 04 '16

ELI5?

2

u/SullyKid Jul 07 '16

So on your keyboard you would start with say 1. Your password could be 1qazXSW@3edcVFR$. So you're starting at 1 working down to Z, then you hold shift, move over to X up to @, release shift, move over to 3, etc. you could do any combination you'd like. For example, instead of hopping over to X, you could go to C. Easy to remember and there are many different combinations.

2

u/epicshawty Jul 07 '16

Huh, that seems cool.

→ More replies (3)
→ More replies (1)

10

u/snowbirdie Mar 08 '16

The government mandate is a minimum of 12 characters. This website is out of compliance and should be reported. Source: work IT for government.

6

u/King_Baboon Mar 08 '16

Local or federal mandate?

2

u/snowbirdie Mar 09 '16

Not sure. I'm federal though.

2

u/tfysertet Mar 09 '16

african or european sparrow?

3

u/bmlbytes It's like rain on your wedding day. Mar 08 '16

How about this then?

2

u/stevewmn Mar 08 '16

Our minimum used to be 15, but then they instituted 2 factor security for everything in such a way that password access is almost never used. Somewhere along the line they scaled password access back to 10 characters.

→ More replies (1)
→ More replies (3)

489

u/[deleted] Mar 08 '16 edited Mar 09 '16

Well there it is. It's a government website. It needs to be secure. Password restrictions have always annoyed me on websites where it's just my shit that going to get fucked. Yes all of these restrictions will make my shit more secure, but if I want my password to be hunter12 then that should be my perogative. But on a government website it makes sense.

Edit: politeness

Edit 2: Jesus fucking Christ I get it. These types of passwords are more susceptible to brute force passwords. I don't need 20 of you motherfuckers to tell me the same damn thing.

153

u/Toribor Mar 08 '16 edited Mar 08 '16

Password strength should be measured by bits of entropy, not arbitrary limitations. These forced limitations actually reduce the amount of possible combinations making brute forcing easier. Also, people are likely to compensate for the difficult restrictions by just writing it down. Maybe not a big deal for a one-off government website, but forcing password restrictions like this for a bank account means someone is just going to write it down on a piece of paper or save it in their phone which makes it that much easier for someone to get access to it.

14

u/Lifeguard2012 Mar 08 '16

My bank requires a "passphrase" instead of a password. Pretty awesome IMO.

11

u/Foef_Yet_Flalf Mar 08 '16

Something like "I fucked OP's mom while majoring in Environmental Science"? With words and such?

→ More replies (1)

15

u/[deleted] Mar 08 '16

Which I why I said it annoys me when it's just my shit. I should get to pick exactly what password I want for my bank account. I agree with that point.

15

u/SaffellBot Mar 08 '16

I was pretty upset work a shit as government website we used to document unclassified training had requirements like that, but my fucking bank was letters and numbers only 8 characters max, no upper case.

9

u/evoblade Mar 08 '16

At least they told you instead of silently truncating at 8 characters.

Maybe that's not a good thing. I'm not sure.

→ More replies (1)

12

u/[deleted] Mar 08 '16

That's reason enough to switch bank

→ More replies (1)
→ More replies (1)

7

u/littlecat84 Mar 08 '16

My bank makes you use your account number as your login name. I have to have a written copy of the number every time I want to access my online account. So secure!

19

u/diamond Mar 08 '16

Well, it's not like your account number is some huge secret. You give it out any time you write a check.

2

u/zanotam Mar 08 '16

All of Europe and a decent amount of the younger adults in North America don't exactly write checks often.....

7

u/diamond Mar 08 '16

But they can. And if they do, their account number is written on the check. Therefore, an account number should never be treated as confidential or secret information.

→ More replies (1)

4

u/TokyoJokeyo Mar 08 '16

Substitute "make an electronic funds transfer" for "write a check" if you like, but it's still true.

→ More replies (1)

2

u/Cobra_McJingleballs Mar 08 '16

I'm not even that old and remember memorizing friends' phone numbers in case you were calling away from home (where your phone book was).

Seems like memorizing something as important as a bank account # wouldn't be too demanding. And if you're worried about having to have a written version of it every time you login, it's already on every personal check in your checkbook.

2

u/[deleted] Mar 08 '16

You should easily to be able to remember your bank account number if you log in with any kind of regularity. I know my bank account number, the login number, and credit card number.

→ More replies (3)

3

u/[deleted] Mar 08 '16

Bits of entropy is a great way of measuring potential security, but a horrible way of measuring actual security.

This all goes without saying, but people won't use a difficult password out of generosity to your system. If you say "make a password" and you make no restrictions, you maximize entropy mathematically - my password could be '$A&FruitBalloon*<F12>@R{Sunglasses Emoji}<pageUp>', or it could be 'password'. And most people are not going to use the first when the second is so much simpler.

If you think of the search space as a one dimensional graph of arbitrary units of complexity, a graph going from 0 to infinity but having most of the passwords between in the first ten 'units', vs a graph going from one to one hundred and having none in the first ten and most in the 50's is a more secure system.

You shouldn't measure password strength by how secure it could be, but by their worst and average cases, because a hacker doesn't succeed when they find every single password, they succeed when they find just one.

→ More replies (6)

30

u/Skirtz Mar 08 '16

I feel like all these restrictions would make it less secure? I mean the more restrictions you add, the less possibilities there are for passwords. Which means less passwords that an intruder would have to guess. Add enough restrictions and eventually 'hunter12' will be the only possible password to use.

28

u/Fonethree Mar 08 '16 edited Mar 08 '16

This is the layman's understanding but (as is often the case) it is incomplete.

Let's say there are no password restrictions, except that the maximum number of characters allowed is 10, and you can't use crazy characters like Unicode - any printable character visible on your keyboard is fair game. The number of possible password combinations is 60510648114517025000. That's a lot - probably too many to reasonably guess any if we assume that the actual users' passwords are randomly generated in this space. But that's the problem, isn't it? They won't be.

On such a site, some portion of the users will opt for no password at all, a password of 1234, a password of 123456, a password of "password", etc. An attacker will guess all of these things first since they know that some people will be using them. If they can get an appreciable amount of users in a very small amount of time, they will. And then they can just move on to the next site and do it all over again, rather than spending time trying to crack passwords.

Adding restrictions like the ones in the OP will reduce the total attack space, yes. But that doesn't really matter when that is so rarely the thing that the attacker is targeting. What a competent attacker is targeting is the user. If you make your users make more "random" passwords, then they're less likely to fall victim by using something that's in the attacker's pre-sorted list of likely passwords.

EDIT: That's not to say this example (in the OP) is perfect. It's definitely a sort of half-baked system, but the spirit of the restrictions is perfectly valid.

7

u/Skirtz Mar 08 '16

I get what you're saying, but in my head I imagine a type of program that enters and runs through every possible password combination (sort of like Wheatley from Portal 2 "Hm, let's try...AAAA...Nope. Alright then, let's try...AAAB...") then adding these restrictions greatly reduces the time it'd take for that machine to guess the right password. It might still take a long time, but you only have to guess it before the next mandatory password change.

Of course, I guess a site like this would flag an account that had too many wrong passwords entered within a period of time, so maybe my point is moot...

11

u/Fonethree Mar 08 '16

What you're talking about is true brute-force attacks. They exist, and they're the assumption in a lot of cryptographic discussion, but only because they're easy to calculate. The fact is that true brute-force attacks are not as effective as other methods, and are therefore almost never used. That was essentially my point. While the OP restrictions will increase the effectiveness of an incredibly ineffective strategy, they will greatly decrease the effectiveness of an otherwise very effective strategy (in this case, I'm talking about dictionary or hybrid attacks). The tradeoff is very often a good one.

→ More replies (1)

2

u/[deleted] Mar 08 '16 edited Mar 08 '16

If you want to encourage passwords with more entropy, just mandate longer passwords.

Also: What characters did you count? I only found 81 useable characters with the "No unicode" rule and with discarding commonly disallowed characters (such as <>):

qwertzuiopasdfghjklyxcvbnm,.-#+1234567890!§$%&/()=?QWERTZUIOPASDFGHJKLYXCVBNM;:_*

Leaving me with only 8110 (+ 819 + 818 ... + 811) combinations.

2

u/Fonethree Mar 08 '16

My character examples were just for ease of communication. If you want to be pedantic, the actual charset I used is

abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-_+=~`[]{}|\:;"'<>,.?/

from the calculator at http://calc.opensecurityresearch.com/.

2

u/schriepes Mar 08 '16

Wow, what you say actually makes sense and I didn't think about it that way. Thanks for the insight.

→ More replies (2)

3

u/[deleted] Mar 08 '16

Like I said to someone else, I don't know much about hacking so I can't speak to that, but from a non hacker's point of view it makes sense. I can see the point you're making, though.

803

u/[deleted] Mar 08 '16

Restrictions like OPs make the site less secure because meow a hacker has a set of rules they can use to pre filter their attack list. Many less combinations to try meow.

86

u/[deleted] Mar 08 '16 edited Mar 11 '18

[deleted]

15

u/greg19735 Mar 08 '16

That's interesting, thanks.

I think people have a hard time with the scale. They don't realize the 6634204312890625 combinations is from the 8 characters is a huge amount. And then the other restrictions are actually about making sure you don't get caught by a using a stupid password.

→ More replies (1)

2

u/[deleted] Mar 08 '16

The real practical effect is that the user is likely to write the password down instead of memorizing it, resulting in access to the system only requiring access to the user's workspace.

→ More replies (5)

2

u/[deleted] Mar 09 '16

[deleted]

→ More replies (10)

208

u/space_keeper Mar 08 '16 edited Mar 08 '16

In case anyone is interested, here is the information this set of rules is giving a potential attacker, and their consequences:

  • Passwords must be at least 8 characters in length: means that it's safe to assume that a lot of passwords will be exactly 8 characters in length.
  • Passwords must include at least one non-alphanumeric printable character: rules out passwords that consist only of alphanumeric characters (order 109 ); very likely that there will be exactly one symbol, and that it will occur either at the start or at the end of the string; good chance the symbol will be one of the four symbols (#, *, $, @) shown in the rules.
  • Passwords must include at least one number: as above, very likely that there will be exactly one number, and that it will occur at the start or end of the password; good chance that it will be the number 1 or some number between 50 and 98, i.e. year of birth, minus any years with repeated/consecutive numbers.
  • Passwords cannot contain repeated characters: rules out many more (> 1011 ?) potential passwords that feature runs of the same character. Prevents users from using the string password in their passwords, also stops people from using passwords like $password1, $password2, etc.
  • Passwords cannot contain (alphanumerically or not?) consecutive characters: this one is incredibly stupid, intended to prevent combinations like 12345, abc, and the like, but forbids many short (2-3 character) combinations that can easily be generated randomly.

142

u/Skeik Mar 08 '16

Let's also not forget that bullshit rules like these lead to the biggest security hole of all, when someone writes down their password.

51

u/REDDIT_HARD_MODE Mar 08 '16

Who was it that said: Security, at the expense of user friendliness, comes at the cost of security.

17

u/pelhage Mar 08 '16 edited Apr 22 '16

Who was it that said: Security, at the expense of user friendliness, comes at the cost of security.

-- Benjamin Franklin

2

u/Blaaamo Mar 09 '16

Wrong,

Mark Twain

→ More replies (2)
→ More replies (4)

26

u/[deleted] Mar 08 '16

But it's okay! Then, when the hack invariably happens, the IT guy can look at his boss and say, "Hey man, I don't know what else I could have done. Stupid user wrote down his password instead of memorizing a new one that fit my rule every month. In addition to all of his other passwords."

And the boss goes, "Yes, this is certainly the user's fault."

4

u/space_keeper Mar 08 '16

Fair point, but I don't think it's necessarily the worst thing, so long as the person appreciates how important it is to keep the written copy safe and secure.

10

u/SerLaron Mar 08 '16 edited Mar 08 '16

I. e. under the keyboard, not on a post-it on the monitor.
Obligatory edit: /s

→ More replies (5)
→ More replies (3)

2

u/stevewmn Mar 08 '16

That depends on where they leave it. Leave it by your computer and it's easy to find. Stick it in your wallet and it's as secure as your credit cards. Especially if you obfuscate the passwords and/or sites they go to in some way.

2

u/Fonethree Mar 09 '16

What makes you think this is the biggest security hole of all? It's not - very, very far from it.

2

u/Skeik Mar 09 '16

Saying it's the biggest hole of all is a bit of a hyperbole, I was just quoting a professor I used to have, but I still think it's very high on the list. Most other things can be accounted for, a competent IT security worker can defend a server against automated attacks with some effort. Setting some rules to stop people from using passwords like "password" isn't difficult to stop smarter attacks.

But if someone writes down their information the security that IT can provide doesn't matter much anymore. It switches the focus of protection from the IT department to the user; now one of the easiest avenues of attack is just to get that password. If someone leaves their password on their desk, someone with access to the building can just walk in and take it. All they need to do is find one. Excessively frequent mandated password changes only increases the chances of it happening.

Sure for your day to day employee this doesn't matter but in high value situations it's a real risk. I'm pretty sure no one cares if you write down your personal passwords in your own home, I'm talking about in business situations.

2

u/Fonethree Mar 09 '16

Yeah, it's definitely a bigger risk in a business environment. With that context in place, I'd agree that it's important to physically secure passwords. But how much that matters also depends on the physical security posture of the whole building, your floor, your area, etc. Generally speaking though, averaging out the entire internet population, I would argue that writing down your password is way less dangerous than using a weak one.

→ More replies (1)

44

u/pintofale Mar 08 '16

could still do pas$w0rd though

45

u/CSMastermind Mar 08 '16

Better to do Pas$word1 so you can increment the number each time they make you generate a new password

4

u/jay212127 Mar 08 '16

It's kind of sad that is quite close to how i do my work password, but with A1, B2, C4, F1, F5, are some of my favorites and I get excited when i use them (make the same stupid joke every time i do my password).

2

u/CSMastermind Mar 08 '16

I worked for a Fortune 100 company where the logins to the production databases (which housed all sorts of sensitive information) were:

username: <company name>1, <company name>2, etc

And all the passwords were P@ssword1!

→ More replies (2)

11

u/lapin0u Mar 08 '16 edited Mar 08 '16

abcdefg ? ain't no time for that, my password will be qwerty#1

edit: on the bright side, the two last rules may prevent many users from reusing their "standard" password

2

u/rabidbasher YELLOW Mar 09 '16

Qwerty#01

Qwerty#02

Qwerty#03

...

9

u/Giacomand Mar 08 '16

I would like to see the regex which validates the password..

..on second thought, maybe I don't.

→ More replies (1)
→ More replies (15)

897

u/Bwuhbwuh BLUE Mar 08 '16

I don't know if I should up or downvote you because you are absolutely right but the meows are stupid

29

u/[deleted] Mar 09 '16

I didn't realize that was happening, actually. I friend setup a now => meow shortcut on my iPhone. I keep forgetting to remove it and now I never even see it anymore.

Edit: meow

→ More replies (1)

263

u/AthleticsSharts Mar 08 '16

Do I look like a cat to you boy? Am I jumpin' around all nimbly-pimbly from tree to tree?

2

u/elesdee Mar 08 '16

pretty sure it's bimbly but fuck it have an upvote.

38

u/MoarVespenegas Mar 08 '16

Are they perhaps mildly infuriating?

97

u/Nine_Tails Mar 08 '16

Not so funny meow, is it?

14

u/aerostotle Mar 08 '16

Do ya see me drinkin' milk from a saucer??

19

u/Chaosfreak610 Mar 08 '16

I didn't even see the meows.

20

u/Konekotoujou Mar 08 '16

It replaced a word that was unnecessary. I just thought he was adding meow in randomly at first.

2

u/seal_eggs Mar 08 '16

Your username is what my brother called me when he was a baby.

6

u/Luizltg Mar 08 '16

You wanted a straight answer and got meow'd instead, if I were you I'd take it like a champ and upvote, just saying

→ More replies (7)

42

u/[deleted] Mar 08 '16

I don't know anything about hacking so I can't speak to that. Why are you meowing at me?

17

u/Fonethree Mar 08 '16

You'd think so, but the fact is that without these restrictions a high number of people would use passwords that are extremely easy to guess (i.e. abcd1234 or some such). With these restrictions, yes, they give a small amount of additional information to the attacker, but they ultimately increase the security of the average user.

45

u/pulley999 Mar 08 '16

Restrictions are a double edged sword: It stops stupid people from making stupid passwords, but each one makes the whole system orders of magnitude less secure. The no consecutive characters alone eliminates billions, possibly trillions of combinations within a reasonable length. Ideally there are other ways to try to prevent stupid people making stupid passwords than to compromise the whole system for everyone.

Relevant XKCD

11

u/sarge21 Mar 08 '16

each one makes the whole system orders of magnitude less secure. The no consecutive characters alone eliminates billions, possibly trillions of combinations within a reasonable length.

Reducing the password space by billions or trillions is not making it orders of magnitude less secure.

Even if you excluded 999 trillion passwords from all possible 8 character passwords (with caps/noncaps,symbols,numbers) you'd only be excluding 15% of the possible combinations. I don't really have the time to figure it out, but just go to a random password generator and take a look at how many times you'd have to regenerate a password, on average, to hit one of these exclusion policies. It will be extremely rare.

The XKCD is absolutely correct though, because one of the important parts of a password is being able to remember it. A long passphrase with some randomness thrown in will make a password which is impossible to brute force.

19

u/xkcd_transcriber Mar 08 '16

Image

Mobile

Title: Password Strength

Title-text: To anyone who understands information theory and security and is in an infuriating argument with someone who does not (possibly involving mixed case), I sincerely apologize.

Comic Explanation

Stats: This comic has been referenced 2103 times, representing 2.0499% of referenced xkcds.


xkcd.com | xkcd sub | Problems/Bugs? | Statistics | Stop Replying | Delete

6

u/Fonethree Mar 08 '16

It's difficult to calculate what the change would be (it may be more than I'm estimating). Like I said in another post, this particular strategy is sort of half-baked, but still, the logic is sound.

For an example of someone that did do the math on how restrictions effect the time to brute-force a password (which, remember, is almost never the method actually used), see https://www.physicsforums.com/threads/keyspace-of-a-password.230537/#post-1701799

→ More replies (1)
→ More replies (3)
→ More replies (6)
→ More replies (20)

21

u/[deleted] Mar 08 '16

All I see is ********? Probably would be a secure password though.

13

u/booty_pictures_pls Mar 08 '16

Hunter2

E: it's not working

10

u/NewbornMuse Mar 08 '16

It is, all we see is *******.

8

u/King_Baboon Mar 08 '16

I assume you didn't read the additional post reference the rest of the site.

→ More replies (12)

2

u/CallingOutYourBS Mar 08 '16

Yes all of these restrictions will make my shit more secure

Sure, minus the massive threat of social engineering and post-its under keyboards.

→ More replies (3)

1

u/ztsmart Mar 08 '16

Well there it is. It's a government website. It needs to be secure.

OP should just become Sec of State and then store all files on personal servers

1

u/Frostiken Mar 08 '16

97% of government passwords are guaranteed to be some variation of '1qaz1qaz!QAZ!QAZ'.

1

u/[deleted] Mar 08 '16

[deleted]

→ More replies (1)

1

u/golbezza Mar 08 '16

My IRC password!

1

u/[deleted] Mar 08 '16

This just means he's going to write his password on a sticky note or word file, making it that much easier to get at.

→ More replies (1)

1

u/[deleted] Mar 08 '16

So is hunter 12 your password then?

1

u/thebornotaku Mar 08 '16

That's like 6x better than hunter2

1

u/[deleted] Mar 08 '16

What's funny is that any 3 or four word phrase is more secure than whatever bullshit this site is cooking up. And easier to remember. Hackers rarely use method thinking to figure out your password, it's pretty much bot programs and such. We as a people have made passwords harder and harder on people while actually making it easier for computers

1

u/[deleted] Mar 08 '16

What's funny is that any 3 or four word phrase is more secure than whatever bullshit this site is cooking up. And easier to remember. Hackers rarely use method thinking to figure out your password, it's pretty much bot programs and such. We as a people have made passwords harder and harder on people while actually making it easier for computers

1

u/FightingPolish Mar 08 '16

Not if the passwords are so complicated and hard to remember that everyone writes their password on a post it note and sticks it on their monitor.

1

u/ScrithWire Mar 08 '16

Tight passwords may be more secure, but its a matter of scale. If you had to bail water out of your boat, you could choose a number of different vessels, each with a different efficiency. Your hands, a cup, a large cup, a bucket, a large bucket, etc.

Or, you can realize that you'll only ever get to a certain level of efficiency and you need to re approach the problem with a different system.

So you install a robust pump system and never need to worry about water filling your boat again, no matter how hard it pours.

The passwords are the things you're using to bail out your boat. The size of the vessel corresponds to the different "password guidelines." The pump system would be something like 2-step verification.

1

u/[deleted] Mar 08 '16

this is stupid though. if you want to make it secure, add more characters. some semi-random combination of characters with defined limits is stupid - more so when you want to have the passwords rolling.

1

u/KishinD Mar 08 '16

You want secure passwords? real freakin' simple.

#1 Important Thing: make your password long (12+ characters)
#2 Important Thing: don't use dictionary words
#3 Important Thing: mix it up. Every capital letter, number, or symbol will help your PW be slightly harder to crack.

These are in order of magnitude of importance. 100, 10, 1.
A 20-character PW with no dictionary words is a nightmare to crack, even if it's entirely lower-case letters.

1

u/[deleted] Mar 08 '16

Make that hunter12! and it's take it

1

u/[deleted] Mar 08 '16

Having worked for the government and had to abide by those restrictions, i can personally verify that most people had their password written down next to there keyboard.

Which is why I always prefer the B@ttery_h0rse approach to passwords. Easy to remember, pretty secure, and no writting it down.

1

u/DrMasterBlaster Mar 09 '16

"This password is so complicated. Let me write it down on a piece of paper so I remember it"

1

u/-Dragin- Mar 09 '16

There are ways to make more secure passwords that don't involve shit that will make the user constantly have to make a new one.

1

u/deecewan Mar 09 '16

These types of passwords are more susceptible to brute force passwords.

→ More replies (1)
→ More replies (5)

3

u/FuckedByCrap Mar 08 '16

This is a government site

As the financial contact at my office, the government sites are the worst. It's like they hired everyone who flunked out of UX school.

→ More replies (1)

2

u/[deleted] Mar 08 '16

Sounds like IMDS to me.

2

u/Zetsumei101 Mar 08 '16

Ohh and wait until you start messing with SIPR. I have a 42 character SIPR password lol

1

u/greengrasser11 Mar 08 '16

If that's the case then I'd probably just go for LastPass.

1

u/softawre Mar 08 '16

what makes it even more infuriating. This is a government site where I have to take mandatory training.

So use a password generator...

1

u/manbrasucks Mar 08 '16

XKCD password should work if you throw a 1! at the end.

1

u/[deleted] Mar 08 '16

I forget those passwords all the time.

1

u/Zetsumei101 Mar 08 '16

Most of the government sites are CAC enabled once you register.

1

u/crushcastles23 Mar 08 '16

Government sites have an excuse for this, they really have to be secure, nowhere else needs to be this secure.

1

u/OgreHooper Mar 08 '16

Aha! I knew that looked familiar. I've felt this pain.

1

u/Doctor_Riptide Mar 08 '16

I knew I recognized this horse shit.

1

u/misconfig_exe Mar 08 '16 edited Mar 08 '16

2Fish@home

Fulfills the requirements. Easy to remember. Need another? Make another variation of this.

4Dogs!ateit

giant?Lizard5

9birds"in"Aflock

I could do this all day.

1

u/Bobums Mar 08 '16

Gov. site I'm required to be a part of makes me change the password every 30 days with the same restrictions. I just open up a sticky note and randomly smash the keyboard copy/paste until one is accepted. Then I leave the sticky note open to copy/paste from any time I log in.

1

u/misconfig_exe Mar 08 '16

If you find this frustrating, how do you feel about the entire database of Government workers getting released during hacks of the Office of Personnel Management, or citizens' personal info getting released in hacks of the IRS?

The price of security is less accessibility.
The price of accessibility is less security.

1

u/duffmanhb Mar 08 '16

You will, no doubt, forget that password. It's so annoying how overly secure they are. You know how many times my account has been broken into via bruteforce? Zero. Zero times. You know how many times my password has leaked because of the database was hacked and my password revealed, is something like 20 times.

I'll use a difficult password for important shit, that is high priority, thank you very much. But for you fucking fitness forum, eat a dick if you are going to make me jump through hoops like that.

1

u/LazyTheSloth Mar 08 '16

O fuck I thought this was Photoshoped or sending. This is just fucking ridiculous. Chances are it would take me forever to come up with one I liked and would remember.

1

u/[deleted] Mar 08 '16

Do something like 8h6G@7hP4s.

1

u/FlorianPicasso Mar 08 '16

government site

Oh, just use everyone's go-to password for sites like that, then... qwe123!@# and variations on it.

1

u/[deleted] Mar 08 '16

Just pick a line and go top to bottom on the keyboard. Figure 99% of government passwords like that are: 1qaz!QAZ2wsx@WSX

1

u/Nexious Mar 08 '16

Sort of reminds me of the how the government FAFSA site operated when I had to apply for student loans several years ago. It literally blocked you from continuing if your browser version was above what they explicitly checked against, which were very obsolete versions at the time. The staff recommended I somehow downgrade to IE 7 or go to a public library to find an older browser for their site access. What a joke.

1

u/RoboNinjaPirate BLUE Mar 08 '16

It's this kind of security that made Hillary setup her own server.

1

u/CuteThingsAndLove PINK Mar 08 '16

Acegikmo1!

Skipped every other letter.

1

u/brownix001 Mar 08 '16

LastPass. Plug in for all browsers and works for mobile (but mobile is paid) .

1

u/AllnamesRedyTaken Mar 08 '16

Ah the lean mean government machine of instant solutions, ingenuity and forward progress....wait where am I?

1

u/Letchworth Mar 08 '16

That's easy. Just request everything in paper form so that you can protest against their draconian anti-freespeech measures of forcing you to type a weird password against your will.

1

u/Phylar Mar 08 '16

Create a random ass password, select "forgot password" and see if it allows you to make it whatever you like. This little trick likes to work on many academic systems.

1

u/DammitDan Mar 08 '16

Oh, then just write it down and tape it to your monitor.

1

u/The_Celtic_Chemist Mar 08 '16

Alternative title to this post would be simply: "Government Websites"

1

u/[deleted] Mar 08 '16

I'm going to help you out. For government passwords it's really easy to make a pattern instead of a password. Easy to set. Duplicate. Remember. Really hard to crack with an algorithm and damn near impossible for someone to guess.

Pattern. Look at your keyboard. Make a pattern while holding shift.

!Q@W#E$R

Then release shift and do the same thing again.

1q2w3e4r

So the whole password is:

!Q@W#E$R1q2w3e4r

You can do different patterns but this was to just show you an idea of what you can do to satisfy these crazy passwords. I have a different pattern password for all of my stuff now and a very intricate one for my bank in case anyone catches onto my patterns.

Good luck!

Source: government employee for over 5 years.

1

u/bmlbytes It's like rain on your wedding day. Mar 08 '16

Then on another government site, I get this.

Exactly 8 characters!

1

u/EaglesBlitz Mar 08 '16

Then there's American Express. When I created my online account it didn't recognize capital letters or allow symbols of any kind. Night/Day

1

u/doneski Mar 08 '16

Ahhh, Knowledge Online... been there. I knew what it was right away.

1

u/GHNeko Mar 08 '16

Is that fucking MyPay? It looks like fucking MyPay.

1

u/Imforeveryoung Mar 08 '16 edited May 23 '24

stupendous pocket languid knee boast selective materialistic husky bright plate

1

u/HillTopTerrace Mar 08 '16

I have one for you! Acegikm1! It meets just the bare minimum.

1

u/khafra Mar 08 '16

Wait 'til you get to the government site that has all that, plus your password has to be exactly 14 characters long. Not "at least." Exactly.

1

u/6745408 Mar 09 '16

Did you end up with !1qwertyui?

1

u/tcpip4lyfe Mar 09 '16

It's a regulatory requirement if they are going to be storing or transfering "X" type of data. Could be FIPS, HIPPA, PCI, etc...

We (sysadmins) hate it just as much as you but it works.

1

u/erikpurne Mar 09 '16

Wait wait wait. This is a real thing that exists? I honestly thought it was an exaggeration to illustrate how absurd it's gotten, and was thinking how dumb all these people were for thinking it was real.

1

u/Runaway_5 Mar 09 '16

Yup, my student loans had similar requirements. I made my password a nasty thing out of spite and it worked

1

u/Phoequinox I can grow pubes all over my body Mar 09 '16

Well, that's kind of unfair. I mean, how many government websites are you going to be visiting regularly in your life, compared to the amount of social media and bullshit sites? If this were a site like reddit, yeah, fuck that noise. But this is a matter of National security. Hardly the same thing.

1

u/Pipthepirate Mar 09 '16

I tried applying for a job at the post office and it had crazy requirements like this. If anybody ever wants to go onto my account and apply for post office jobs for me I am totally okay with it

1

u/BeHereNow91 Mar 09 '16

I work for a state, and this is similar to our password rules. Mandatory change every 30 days. Most people just change one character at the end.

1

u/RTM_Matt Mar 09 '16

Surely enforcing all these rules just narrows down the number of passwords hackers have to try to bruteforce their way in. "Ok, take out all the words with consecutive alphabetical letters and repeating letters, that narrows down the pool a bit, now try them all with a capital letter at the start and a 1 and a # at the end... Aaaaand we're in."

1

u/[deleted] Mar 09 '16

What I really hate is passwords like1qaz2wsx#EDC$RFV meet the criteria perfectly but are so much less secure than something like "1234BottleBooke*&&!" because a dictionary attack will rape the "good" password (as the site evaluates it) but will do nothing on the repeating t's, o's, and &'s.

1

u/Belladen Mar 09 '16

The past two banks I worked for were almost this bad. I currently have about 12 different passwords that are similar to these rules. I understand why they do this but seriously...it gets annoying

1

u/protestor Mar 09 '16

A government website is storing your last 10 passwords? Wow..

1

u/[deleted] Mar 09 '16

Some are reasonable but the no consecutive character thing is just fucking with you. I get not allowing "abcd" or "1234" but "steet". They think "&%127h4x0rstEEt()*JHFHJ" is too weak.

1

u/James11637 Mar 13 '16

Sounds like the post office cyber security password qualifications.

→ More replies (11)

23

u/rkrismcneely Mar 08 '16 edited Mar 09 '16

Full disclosure: This is my site - but I think it would help

www.passwordsarehard.com

5

u/prettycode Mar 09 '16

My bank doesn't allow passwords to start with a number. Game over by step 1, for me. :(

2

u/rkrismcneely Mar 09 '16

Well, the system still works. Just switch the first and last step.

BE YOUR OWN PERSON! I'M NOT THE BOSS OF YOU!

2

u/Runixo You now blink manualy Mar 09 '16

Don't tell me what to do, you're the boss!

1

u/ellimist Mar 08 '16 edited May 30 '16

...

4

u/dennisisspiderman Mar 08 '16

Worse when you're forced to use the site, like the university I went to. Password requirements as strict as this and you had to renew them every few months. Ended up with stuff like o9p0O(P) and such. Just four keys and switching between no-shift and shift.

1

u/tsJIMBOb Mar 08 '16

Just use the password "Hackerswin1!"

1

u/radu_sound Mar 08 '16

That's why it's so annoying. My bank requires the same kind of password requirements AND you have to change your password every month. It's nerve wracking.

→ More replies (3)