9 - Password Security
9 - Password Security
Password Security
john:automobile
mary:balloon
joe:wepntkas
john:9Mfsk4EQh+XD2lBcCAvputrIuVbWKqbxPgKla7u67oo=
mary:AEd62KRDHUXW6tp+XazwhTLSUlADWXrinUPbxQEfnsI=
joe:J3mhF7Mv4pnfjcnoHZ1ZrUELjSBJFOo1r6D6fx8tfwU=
9.2. Hashing Example
Does
My name is john. My password is automobile. h(automobile)
=
9Mfsk4EQ…
???
"<pwdfile>");
}
}
9.5. Online Dictionary Attacks
Attacker actively tries combos on live system
Pronounceable Passwords
Non-dictionary words, but also easy to recall
Syllables & vowels connected together
Gpw package generates examples
e.g. ahrosios, chireckl, harciefy
9.6.6. Limited Login Attempts
Allow just 3-4 logins, then disable or lock
account
Attacker only gets fixed number of guesses
Inconvenient to users if they’re forgetful
Legitimate user would have to ask sys admin to
unlock or reset their password
Potential for DoS attacks if usernames compromised
and attacker guesses randomly for all, locking up
large percentage of users of system
9.6.7 Artificial Delays
Artificial delay when user tries login over network
Wait 2n seconds after nth failure from particular
IP address
Only minor inconvenience to users (it should only take
them a couple of tries, 10 seconds delay at most)
But makes attacker’s guesses more costly, decreases
number of guesses they can try in fixed time interval
Other Approaches:
Image Authentication
One-time Passwords
...