Jul 13, 2009, 03:54 PM // 15:54
|
#2
|
Jungle Guide
Join Date: Jan 2009
Location: Imperial Sanctum
Guild: Legendary Drunken Masters [DUI]
Profession: E/Me
|
*runs to the control panel*
|
|
|
Jul 13, 2009, 03:56 PM // 15:56
|
#3
|
EXCESSIVE FLUTTERCUSSING
Join Date: Mar 2007
Guild: SMS (lolgw2placeholder)
Profession: Me/
|
Yep, makes sense. No reason to try and hack your password when I can just steal it.
__________________
All seems lost now, but still we must fight on.
|
|
|
Jul 13, 2009, 04:17 PM // 16:17
|
#4
|
Wilds Pathfinder
Join Date: Jul 2008
Location: Wales
Guild: Order of the Azurelight[OA]
Profession: E/
|
Hasn't this been the case for ages? Ive been keylogged a few times ages ago due to my imbecile of a brother downloading crap.
Still make my passwords "strong" for extra reinsurance which i now see is void.
|
|
|
Jul 13, 2009, 04:23 PM // 16:23
|
#5
|
Ascalonian Squire
Join Date: Jan 2007
Guild: Elite Dragon Bane
Profession: W/
|
Don't use sites that don't have a good reputation, never give your passwords to anyone, if you write your passwords down, keep them under lock and key. Many sites that have bots/hack programs also have trogens/keyloggers in them. if you use high risk sites you will get hacked sooner or later.
|
|
|
Jul 13, 2009, 04:51 PM // 16:51
|
#6
|
Banned
Join Date: Apr 2009
Location: In your dreams
Guild: AoC
Profession: Me/N
|
That's scary. Somebody should send a message to the guys that make those websites.
*stares at gmail*
|
|
|
Jul 13, 2009, 05:10 PM // 17:10
|
#7
|
Jungle Guide
|
Password strength is akin to the lock on your front door. Just because you have a secure lock doesn't mean they can't get into your house; they could break some part of your frame, your lock or your door. They could steal or manufacture a key. They could simply enter via some other unsecured part of your house. They could, given enough time and chances, pick your lock. Nevertheless, you want a lock sufficient to discourage potential intruders.
This article is not an excuse to have weak passwords. Rather, the point is that password strength, as one component of defense-in-depth strategies doesn't have to be particularly high to ensure security, and that policies concerning password strength can be self-defeating.
It should be noted that 21-bits is a ten-character password, assuming that password has sufficient entropy to an observer; that is, another person cannot reasonably guess your password. The reality is that a password's actual entropy is often lower because of things like: number preference (particularly the number one), letter preference / avoidance, number placement (particularly at the end of passwords), use of capitalization (at the start of passw0rd), use of dictionary words, disuse of dictionary words because of letter preference, use of names, simple substitutions (0 for o), use of personal or family information, etc.
|
|
|
Jul 13, 2009, 05:17 PM // 17:17
|
#8
|
Jungle Guide
Join Date: Jan 2009
Location: Imperial Sanctum
Guild: Legendary Drunken Masters [DUI]
Profession: E/Me
|
huh....gotta bookmark this.
|
|
|
Jul 13, 2009, 05:30 PM // 17:30
|
#9
|
Jungle Guide
Join Date: Jun 2008
Location: Australia, what you want my home address?
Guild: [CAT]
Profession: Mo/
|
Suggesting that 'strong' passwords are no longer effective seems like poor logic, the strong password is as effective as it ever was. A weak password is just as likely to be guessed or brute forced as ever...
Just because someone can use the password if you give it to them (phishing) or they steal it (logging) does nothing to discourage the practice of using strong passwords. It just means you need to PROTECT the password, the same as you ever did.
|
|
|
Jul 13, 2009, 05:50 PM // 17:50
|
#10
|
Site Contributor
|
I really like how I link an article and get responses from people who didn't bother to read the article or summary. I only know this because of what some are suggesting. Perhaps they did though and are just focusing on the wrong aspect of it. To clarify a bit, they said that strong passwords are not as fool proof as everyone makes them out to be. This is coming from the side of those who have to manage servers like this by the way, not from an end-user perspective. The title is a bit misleading. Hey, I do it too, I understand. It's a long read but for those who will take the time... they are presenting an interesting scenario where it's not the password but the UserID that needs to be made stronger. Something that I have rarely seen suggested and is really confined for the most part to the hands of the website. How public they want to make those user id's.
I'll post the conclusion so that you can see what the article was getting to:
Quote:
We examine the question of attacks on password-protected web accounts. We conclude that forcing users to choose strong passwords appears misguided: this offers no defence against the common password stealing attacks and there are better means to address bulk guessing attacks. We show that it is the combined size of the userID plus password key-space rather than the password key-space alone that protects large institutions against bulk guessing attacks. Greater security for the institution can be achieved by allowing users to keep relatively short passwords, so long as they choose longer userID's. This reduces the number of break-ins
that an attacker with fixed resources can expect, and reduces the burden on users. For smaller institutions, i.e. those with hundreds rather than millions of users, there appears to be little reason to use strong passwords so long as good lockout (e.g. three unsuccessful logins freezes the account for a time) are in place.
|
|
|
|
Jul 13, 2009, 06:42 PM // 18:42
|
#11
|
Academy Page
Join Date: Jul 2006
Location: amsterdam
Profession: W/
|
didnt we alrdy know this, hard password is pure for bruteforce + guessing.
|
|
|
Jul 13, 2009, 07:29 PM // 19:29
|
#12
|
Jungle Guide
Join Date: Jun 2008
Location: DoA
Guild: Dark Order of Retarded Knights (doRk)
Profession: N/Me
|
I'm glad I'm one of the intelligent people that can handle using "strong passwords" without risking a seizure.
But anyway, the best advice I can give people regarding their GW passwords is this:
1) Don't share your passwords with anyone (not your brother, not your gf, not your best friend).
2) Use something you can remember, but is abstract enough that someone else can't guess it.
3) Don't write it down, and don't store it on your computer. Memorize it like you would words to your favorite song. If you have multiple passwords and are afraid you'll forget them, store them somewhere secure, preferrably not near your computer.
4) Don't use the same password for your GW account as you do anything else (for example your guru password or your NCSoft password or your Yahoo Email password, etc). Consider also having different passwords if you have multiple GW accounts.
and 5) Change it fairly often (at least once per month)
|
|
|
Jul 13, 2009, 07:55 PM // 19:55
|
#13
|
Site Contributor
|
*sigh* Maybe I am not being obvious enough. This article is exploring so much more then passwords. It's really an interesting idea that, as I mentioned above, I haven't seen explored. The concept of UserID's needing to be more secure. We've all heard the mantra of strong passwords and clearly it's NOT enough.
Everyone repeats over and over again that if an account is compromised it's because of your password not being strong or giving that out. What if your UserID was also just as secret/strong/hidden. It would increase security. I thought it was an interesting concept but the message is kind of getting lost in this thread. We all ready know about strong passwords, repeating it over and over isn't going to further this discussion as it's not JUST about passwords.
|
|
|
Jul 13, 2009, 10:03 PM // 22:03
|
#14
|
Furnace Stoker
Join Date: Jan 2007
Location: Ohio
Guild: I Will Never Join Your Guild (NTY)
Profession: R/
|
I am intrigued by the concept of stronger/hidden user IDs - it seems logical, but I don't know enough of programming and/or hackin' to verify or disavow their thesis. In any case, basic Internet Safety is just like safe sex - very simple concept but so many ppl just don't do it.
|
|
|
Jul 13, 2009, 11:30 PM // 23:30
|
#15
|
Academy Page
Join Date: Nov 2005
Location: Athens, Greece
|
"What if your UserID was also just as secret/strong/hidden. It would increase security."
Maybe, but personally, as a user, I strongly reject the possibility to change all my usernames just for increased security.
If I was an administrator, having no feelings for the users but only for my precious security, I would enforce it
Other than that...
"Login procedure using image code" (patented?) is an option that is not taken in account in that text.
Besides Phishing, Keylogging and case 5c (which I believe it was put there just to poke me in the eye) it seems to be a very solid and secure way to authenticate a user everywhere, using existing so called "non secure" credentials.
Are there any drawbacks that I'm not considering here ?
(I see it coming "Individuals with Special Needs")
|
|
|
Jul 15, 2009, 01:25 AM // 01:25
|
#16
|
Jungle Guide
Join Date: Jun 2008
Location: Australia, what you want my home address?
Guild: [CAT]
Profession: Mo/
|
Quote:
Originally Posted by Inde
*sigh* Maybe I am not being obvious enough. This article is exploring so much more then passwords. It's really an interesting idea that, as I mentioned above, I haven't seen explored. The concept of UserID's needing to be more secure. We've all heard the mantra of strong passwords and clearly it's NOT enough.
|
That's awesome, and clearly something that is out of the end users hands when our user ID is more or less forced upon us, and often publicly displayed in the case of forums... GW and any game, app or web service that requires a valid email and uses it as the user ID is an example of 'forced upon us'.
Mayhap the article is of interest to those who 'run' web services, sites (such as yours) or similar such things, but clearly isn't relevant to the 'end users' for whom 'strong password' and 'keep your password secure' seem too difficult to understand, by and large.
Phishing and key logging aren't a new phenomenon, having been around for... seemingly for ever, really, certainly longer than a decade now...
Can phishing reveal the User's ID? of course it can, people are stupid. Can a key logger catch a User's ID? Duh! Can a user ID be guessed or brute forced? Same as a password... the other forms of 'obtaining' user passwords mentioned in the article (Shoulder surfing, console access vs stored passwords etc...) all apply just as easily to the User's ID.
User ID's are largely NOT secret, and often considered public information, they've already failed the first the step of being secure.
Much can be done on the authentication side of the login process to make it more secure, little can be done for the end user's short string of characters used to identify themselves (User ID + password) other than keeping them secure, and that is (currently) only an option for the password in the majority of scenarios.
Last edited by Nerel; Jul 15, 2009 at 01:35 AM // 01:35..
|
|
|
Jul 15, 2009, 11:23 AM // 11:23
|
#17
|
Jungle Guide
Join Date: Apr 2006
Profession: W/R
|
for the brute force attacks it would be harder but for those who get hacked via keyloggers it isnt gonna change anything. the old rules are still the most important dont go to nefarious sites watch what you download keep your virus scanner and firewalls up to date and yes dont use easily guessed passwords.
|
|
|
Thread Tools |
|
Display Modes |
Linear Mode
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
All times are GMT. The time now is 05:25 AM // 05:25.
|