In-Depth

9 Perfect Password Pointers

Passwords are often the weakest part of a security infrastructure. Here are nine ways to make them one of the strongest.

Passwords are often the weakest part of a security infrastructure. Here are nine ways to make them one of the strongest.

Passwords are a key part of an overall, in-depth defense strategy. Strong passwords are like a Master Lock -- the ones that don't open even when shot by a rifle. Weak passwords are like those Kryptonite locks, which can be opened with a ballpoint pen. Not good. So here are nine tips that will beef up your passwords, making them nearly pick-proof.

Tip 1: The Longer, the Better
How long should your passwords be? Anyone giving you a specific figure isn't doing the answer justice. The length depends on the value of the data being protected, how often the passwords must be changed, and the security of the authentication system. But in general, passwords should be a minimum of eight to 10 characters to even begin to be considered non-trivial. A password of 15 characters or longer is considered secure for most general-purpose business applications.

Tip 2: Disable the Weak
If you don't disable the storage of weak LM password hashes in Windows (and then force password changes) and an attacker gets the hashes, they'll be simple to break unless the passwords are 15 characters or longer. At that length, they automatically disable the storage of the LM hash.

Reader Tip: Do It Yourself

We don't let the user create them -- we create them and assign them to the users on a routine basis. We only have 60 users, so it's not as difficult as it may appear at first glance.
-- Anonymous, via Redmondmag.com

You can disable LM password hashes by using Group Policy, Local Security Policy or a Registry edit. In the former two, navigate to Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options and enable Network Security: Do not store LAN Manager hash value on next password change.

Tip 3: Create True Password Complexity
Complexity makes passwords harder to guess and crack. Complexity normally means inserting one or more non-alphabetic characters into the password or passphrase, and is generally broken down into "low" and "high" categories. Low complexity means requiring a number or forcing mixed-case capitalization of letters. Higher complexity involves requiring one or more non-alphabetic and non-numeric symbols (e.g. ! @ # $ % &, and so on).

Crackers and automated password cracking tools know that if you're required to use an uppercase character, you're more likely to make the first letter of your password uppercase. They know that if forced to use a number, it will typically be at the end and be either "1" or "2." If you're forced to use special symbols, you're most likely to use the characters listed in the previous paragraph, and you'll substitute "@" for "a," "$" for "s" and so on. Too add true password complexity, do something a password cracker wouldn't expect. For instance, "p7asswOrd" is more complex than "Password2", even though it's no harder to type.

Reader Tip: The Rule of 14

We use Group Policy to enforce 14 character-minimum passwords. In order to help people to remember them, we suggest using a passphrase -- basically a sentence that they can remember. With such a long password we don't feel the need to include special characters. It would take a hacking program a long time (if it's even possible) to crack it.
-- Aaron Castro, IT manager, Hatfield, Pa.

Tip 4: To Decrease Complexity, Increase Length
Crackers keep telling me how easy it is to break dictionary-based passwords. But I send them the password hashes for "frogdogfrogdog" and "passwordhashword" to crack, and they never seem to break them. It's a dirty little secret: If your password is long enough, it doesn't need to be complex. Going 15 characters or longer defeats most password crackers, since the number of possible combinations is too overwhelming for most password cracking engine requirements.

Tip 5: Don't Pass It On
You'd be amazed how many people use the same password to protect their online dating profile that they use at work. It isn't unusual for today's knowledge worker to have dozens of logons across a multitude of Web sites around the Internet. Often their logon name to each Web site is their e-mail address. If a hacker can compromise their password on one site, they can probably use it to compromise a whole lot of others.

Reader Tip: Keep Users in the Loop

In the last year we've enabled a complex password policy for our domain via Group Policy. First, we let our users know about the upcoming plan along with the rationale for the need for complex passwords (i.e. stolen data and so on). The day we enabled the policy we sent out an e-mail with the requirements and a few hints about selecting a strong complex password. So far, our users seem to understand the need for complex passwords and keeping customer data safe.
-- Brett Dodd, Network services officer, Miles City, Mont.

Tip 6: Rooting Around
The same thing applies to setting passwords on different work systems: Avoid using the same passwords on different systems. To make it simpler to log on to multiple systems, tell your users to pick a common "root" password and make slight changes to it on the various systems. For example, suppose a user has logons to e-mail, billing and accounting systems. Their passwords could be "frogemail32," "frogbilling32" and "frogaccounting32." What's important is that the compromise of one password in one system doesn't immediately lead to other system compromises.

Tip 7: Lure Your Own Employees
One of the most interesting, proactive security education programs involves creating and sending your own employees realistic-looking phishing e-mails, asking for the employee's logon name and password. Most of us have plenty of phishing e-mails in our own Inbox to use as a template. Send the bogus phishing attempt from an outside location, so that it doesn't readily appear as if it's from your company (i.e. the originating e-mail address).

Every employee responding with his logon credentials should be required to attend an employee education program (and the more boring, the better). Then send a follow-up test phishing e-mail. Every time an employee responds, he has to attend the class.

Reader Tip: Token Power

We use a single sign-on product with two-factor authentication using tokens. This allows us to set user passwords on the domain (currently, we're using 20-character, randomly generated passwords) that nobody knows. Only the single sign-on server knows this password and it passes it, encrypted, to the user's computer; it's only good for that session. This means no written down passwords and no forgotten passwords -- users just need their token (made by Secure Computing, called the Silver 2000) and a four-digit pin to access the system.
-- Darryl Doughty, Network Administrator, Wenatchee, Wash.

I've talked to two companies that have done this and both report that initial conversion rates (employees responding to the phishing e-mail with logon credentials) is more than 30 percent. After the mandatory education program was instituted, conversion rates plummeted to less than 2 percent for repeat offenders (although it makes you wonder what it would take for the 2 percent to "get it"). Educating users this way also makes them smarter e-mailers at home, too, benefiting all of cyberspace.

Tip 8: Get the Sniffles
I routinely use a network protocol analyzer to sniff my company's passwords. I sniff in company hallways, on the LAN and in the wireless ether, trying to find out how many people are transmitting their logon and passwords in plaintext. Even in the most secure environments, I'm rarely disappointed.

Reader Tip: Shock Value

The best way to convince users to use strong passwords is to run Lophtcrack, Cain and Abel or another password cracking tool in front of senior management (who tend to have the easiest passwords to crack). In my experience, when they see 50 percent of the passwords cracked within seconds, they get scared. Even better is to do it with a sniffer; then they can see just how easy it is for a guest, maintenance worker or an attacker using social engineering to pick up passwords quickly.
-- Andy (last name withheld by request), Network Engineer, Dublin, Ohio

After sniffing my own traveling laptop, I was surprised to discover that my e-mail client was sending my own logon and password credentials in clear-text. My bank's SSL Web site was transmitting my logon name and PIN in clear-text, despite the pretty padlock icon in my browser. I called my bank, and after a few hours of research, they confirmed my findings. I asked them how long the error had been going on and they said since the Web site had been up.

You may think you have your network locked down and your passwords protected using encryption and VPN protocols, but until you sniff your own network, you won't really ever know. And if you don't do it, the hackers will.

Tip 9: Storing Passwords -- Hint, Hint …
Tracking all these passwords is tough. Make them too easy to find, and hackers can get at 'em. Too tough and you may not be able to use your own passwords!

I keep all my passwords for my different systems on my cell phone/PDA. But what if my phone is stolen? No problem: attackers won't be able to figure out my passwords, because what I store is not my actual password. Instead, I store "hints" to my passwords. For example, the passwords listed in the previous tip might become "femail32," "fbilling32" and "faccounting32." You can even switch things up a bit, for instance using "FEmail34," to indicate that the password includes capitalized letters and a different ending for that system (i.e. FrogEmail34). If you use a password storage program to store all your passwords in a central location, use this tip even when storing your passwords there. Never write down your password.

By applying these nine pointers, you'll make your environment much safer. And that, in turn, will keep your job safer. Consider it an investment in your career.

Featured

comments powered by Disqus

Subscribe on YouTube