SlideShare a Scribd company logo
1 of 33
Download to read offline
Toward Better Password
Requirements
Jim Fenton
@jimfenton
1
Disclaimer
I’m a consultant for NIST, working on the SP 800-63-3 update
Everything here is my own opinion; I don’t speak for NIST!
I’m discussing a preview draft. Everything is subject to change in the review
process
2
First, some context…
3
A little about SP 800-63
Electronic Digital Authentication Guideline
Defines requirements to satisfy 4 “Levels of
Assurance” (defined by OMB):
Registration (especially Identity Proofing)
Authentication
Assertions
Intended for Federal Gov applications,

used by many others
4
The SP 800-63–3 update
Major rethinking and rewrite
Separates proofing from
authentication
4 documents
Public preview and comments on
GitHub
5
Guiding principles
Strong user experience emphasis. If it’s not user friendly, users cheat.
Realistic security expectations. Many things need 2-factor authentication
Put burdens on the verifier rather than user wherever possible
Don’t ask the user to do things that don’t significantly improve security
6
“Guiding Principles” by Ford-Foundation is licensed under CC BY-ND 2.0
Standards language
SHALL: Requirement to be followed strictly; no deviation allowed

(cf. IETF “MUST”)
SHOULD: Particularly suitable possibility, preferred but not necessarily
required (cf. IETF “SHOULD”)
MAY: A course of action permissible within the limits of the publication
CAN: A possibility and capability, whether material, physical, or causal.
7
Memorized Secrets “Exercise Plays Vital Role Maintaining Brain Health” by
A Health Blog is licensed under CC BY-SA 2.0 8
What’s in and out in 2016?
In:
8 character min, >64 max
Dictionary to disallow common
passwords
Allow all printing characters
(Unicode optional) + spaces
Out:
Composition rules
Hints
Knowledge-based authn (KBA)
Routine password expiration
9
“Can’t help loving that man o’mine”
by darwin Bell is licensed under CC BY-NC 2.0
Minimum length
OLD: 6 characters/4 random digit PIN (LOA 1), 8 characters/6 random digit PIN
(LOA 2)
NEW: SHALL be at least 8 characters or 6 random digits
Rationale
Defends against online attacks (w/throttling)
Defense against offline attacks would require much longer minimums
Consistent requirements at all AALs (LOAs), old LOA 1 requirements too weak
10
Maximum length
OLD: No specification
NEW: SHALL accept (and use) at least 64 characters. No truncation.
Rationale:
Give users maximum flexibility to choose a memorable pass phrase
64 characters fit on many screens
“measuring tape” by areta ekarafi is licensed under CC BY-NC-ND 2.0
11
Space characters
OLD: no specification
NEW: SHALL accept space characters, but MAY canonicalize them out
Rationale:
Spaces are natural to type in passphrases
UI concerns about inadvertently typing multiple spaces, and the space
characters themselves don’t add much entropy
“the burning of the midnight oil” by Robert S. Donovan is licensed under CC BY-NC 2.0
12
Character set
OLD: Alphabet of 90 or more characters
NEW:
SHALL accept all printable ASCII characters
SHOULD accept Unicode, including emojis (1 “character”/code point) 😺
Rationale:
Site-specific constraints on special characters have been a UX nightmare
Verifier SHALL hash the entry anyway, so SQL injection shouldn’t be a concern
“Lead Type (melting in the oven of your mind)”
by jm3 on Flickr is licensed under CC BY-SA 2.0
13
Hints and prompts
OLD: No requirement
NEW:
SHALL NOT permit subscriber to store a hint that is accessible to unauthenticated
claimant
SHALL NOT prompt subscribers to use specific types of information (e.g., “What was
the name of your first pet?) when choosing memorized secrets
Rationale
These greatly weaken the authentication
14
“whisper” by ElizaC3 is licensed under CC BY 2.0
Throttling
OLD:
SHALL limit failed authentication attempts to 100 in 30-day period per account
MAY use CAPTCHAs, delays, or IP whitelists when approaching the limit
Used for all authentication with ~20 bit authenticator output entropy (e.g., OTP)
NEW:
Substantially unchanged. Adds use of risk-based or adaptive techniques for throttling
Rationale:
Many other techniques (e.g., stronger use of IP address) can be easily circumvented by attackers.
15
“Revs Per Minute” by Michael Gil is licensed under CC BY 2.0
Composition
OLD: Implement dictionary or composition rule to constrain user-generated secrets (LOA 2)
NEW:
SHOULD NOT impose composition rules
SHOULD compare prospective secrets against dictionary of known commonly-used and/or
compromised values.
RATIONALE:
Composition rules are a UX nightmare, and don’t provide as much value as originally thought
Need to study how to ask users to pick something different
16
“Are you freaking INSANE????” by Paige Saez is licensed under CC BY-NC 2.0
Dictionaries: questions
How big should the dictionary be?
Too small: ineffective
Too big: bad user experience (like composition rules, but less transparent)
Will users act predictibly when asked to pick a different password?
Users might just append something like 1 or !
If so, the dictionary is a great resource for offline cracking
17
“Dictionary” by Caleb Roenigk is licensed under CC BY 2.0
Dictionary investigation
What would a good dictionary look like?
How big?
What’s in it?
Started with Burnett’s list of 10M compromised passwords
Limited to >=8 characters
4945022 entries, 3199670 distinct passwords
18
“The Worlds Smallest Dictionary” by Kit is licensed under CC SA-NC 2.0
1"
10"
100"
1000"
10000"
100000"
password"
15041988"
27041987"
motdepasse"
11011994"
06101990"
03081974"
welcome123"
hellrais"
travolta"
bowhunter"
18091968"
gjkrjdybr"
galatasa"
sebring1"
04112002"
5858855abc"
31011999"
Vampire1"
combined"
31423142"
stryker1"
greencard"
30031954"
pointer1"
actually"
jackknife"
asianpus"
griffey2"
pc7fddmh"
yfcnz1994"
Dic$onary*Distribu$on*
19
1"
10"
100"
1000"
10000"
100000"
1" 10" 100" 1000" 10000" 100000"
Rank (log scale)
20
Dictionary distribution (log-log scale)
0"
50000"
100000"
150000"
200000"
250000"
300000"
350000"
1" 2" 3" 4" 5" 6" 7" 8" 9" 10" 11" 12" 13" 14" 15" 16" 17" 18" 19" 20"
Entries(with(>n(occurrences(
Occurrences(
Dic1onary(size(vs(number(of(occurrences(
>=8(characters(
21
Dictionaries: takeaways
It’s pretty simple to build a reasonable dictionary
Dictionary with size of ~100,000 entries is probably good - but need to test
But what do users do when asked to try another password?
BadPassword -> BadPassword1 ??? 😰
22
Verifier storage
OLD: SHALL NOT store plaintext (LOA 1); MAY salt and derive key or encrypt (LOA 2)
NEW:
SHALL be hashed with 32-bit random salt using approved key derivation function
PBKDF2 with SHA-1, SHA-2 family, SHA-3 family

(NIST SP 800-131A rev 1, Sec 9)
SHOULD do 10,000 iterations
SHOULD use keyed hash (e.g., HMAC) with key stored separately (e.g., HSM)
RATIONALE: Need to require verifiers to protect password integrity
23
Displaying secrets
OLD: No requirement
NEW: SHOULD offer option to display the secret rather than dots or
asterisks
But rehide after some period of time
RATIONALE: Displaying the password when not likely to be observed helps
typing accuracy, and therefore improves user experience
24
“shoulder surfing” by Anne Petersen is licensed under CC BY-NC-ND 2.0
Memorized Secret expiration
OLD: No requirement
NEW: Verifiers SHOULD NOT require memorized secrets to be changed
arbitrarily (e.g., periodically) unless there is evidence of compromise
RATIONALE: Expiration encourages choice of less complex and/or multiple
use secrets.
25
“parking_meter.JPG” by Paul Vladuchick is licensed under CC BY-NC-ND 2.0
Some other authenticators
26
Pre-registered knowledge
OLD: User chosen or personal knowledge questions
NEW: Eliminated!
RATIONALE: Knowledge-based authentication by another name, weak and
likely to suffer from reuse on multiple sites
27
“Pip” by Helen Haden is licensed under CC BY-NC 2.0
First pet?
Out of Band authenticator
OLD: Uniquely addressable, separate from primary authentication channel
NEW:
SMS deprecated (more on this to come)
Response (only) may be over protected channel
OOB device authenticates to verifier using approved crypto
28
SMS as OOB authenticator
SMS is deprecated for OOB — may not be acceptable in next revision
SMS SHALL NOT be to a VoIP number: that doesn’t establish
possession of something you have
Rationale:
Many threats to SMS including smartphone malware, fraudulent
reassignment of telephone number, SS7 attacks, forwarding
Users’ phone numbers also change
29
Biometrics
SHALL be bound tightly to specific device identified using approved crypto
Therefore always part of a multifactor authenticator
New performance metrics for false match and nonmatch rates and presentation
attack resistance
New hard limit (10) consecutive failed attempts
Need backup activation factor, e.g., memorized secret
MAY use central verifier if other requirements met
30
How to participate
31
“soccer” by ..Russ.. is licensed under CC BY-SA 2.0
Join the conversation
Read the preview drafts: https://pages.nist.gov/800-63-3/
Note: continuous update model, expect frequent changes!
Review issues on GitHub: https://github.com/usnistgov/800-63-3/issues
More instructions: https://pages.nist.gov/800-63-3/comment_help.html
Public preview period runs until ~September 17, 2016
“Formal” public comment period will follow
32
“Conversations” by Steve McClnahan is licensed under CC BY-NC 2.0
Questions?
33

More Related Content

What's hot

Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO AuthenticationFIDO Alliance
 
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...日本マイクロソフト株式会社
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告Kuniyasu Suzaki
 
20180421 Issueの書き方と伝えかた勉強会
20180421 Issueの書き方と伝えかた勉強会20180421 Issueの書き方と伝えかた勉強会
20180421 Issueの書き方と伝えかた勉強会Kouichi Akiyama
 
はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して
はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して
はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して Rakuten Group, Inc.
 
適切な Azure AD 認証方式の選択の決め手
適切な Azure AD 認証方式の選択の決め手適切な Azure AD 認証方式の選択の決め手
適切な Azure AD 認証方式の選択の決め手Yusuke Kodama
 
Secure element for IoT device
Secure element for IoT deviceSecure element for IoT device
Secure element for IoT deviceKentaro Mitsuyasu
 
日本語の作文技術は重要
日本語の作文技術は重要日本語の作文技術は重要
日本語の作文技術は重要Takayuki Watanabe
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
金融APIセキュリティの動向・事例と今後の方向性
金融APIセキュリティの動向・事例と今後の方向性金融APIセキュリティの動向・事例と今後の方向性
金融APIセキュリティの動向・事例と今後の方向性Tatsuo Kudo
 
チームのカルチャー形成のための雑談ワークショップ
チームのカルチャー形成のための雑談ワークショップチームのカルチャー形成のための雑談ワークショップ
チームのカルチャー形成のための雑談ワークショップ忠弘 安田
 
楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャーRakuten Group, Inc.
 
Keycloak & midPoint の紹介
Keycloak & midPoint の紹介Keycloak & midPoint の紹介
Keycloak & midPoint の紹介Hiroyuki Wada
 
今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified ID今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified IDNaohiro Fujie
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureMelanie Swan
 
なんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudy
なんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudyなんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudy
なんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudyPOStudy
 
Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2FIDO Alliance
 
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜Masaru Kurahayashi
 

What's hot (20)

Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告
 
20180421 Issueの書き方と伝えかた勉強会
20180421 Issueの書き方と伝えかた勉強会20180421 Issueの書き方と伝えかた勉強会
20180421 Issueの書き方と伝えかた勉強会
 
はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して
はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して
はじめてのスクラム体験ワークショップ 〜 アジャイル時代のテスターを目指して
 
適切な Azure AD 認証方式の選択の決め手
適切な Azure AD 認証方式の選択の決め手適切な Azure AD 認証方式の選択の決め手
適切な Azure AD 認証方式の選択の決め手
 
Secure element for IoT device
Secure element for IoT deviceSecure element for IoT device
Secure element for IoT device
 
Keycloakのステップアップ認証について
Keycloakのステップアップ認証についてKeycloakのステップアップ認証について
Keycloakのステップアップ認証について
 
日本語の作文技術は重要
日本語の作文技術は重要日本語の作文技術は重要
日本語の作文技術は重要
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
 
金融APIセキュリティの動向・事例と今後の方向性
金融APIセキュリティの動向・事例と今後の方向性金融APIセキュリティの動向・事例と今後の方向性
金融APIセキュリティの動向・事例と今後の方向性
 
チームのカルチャー形成のための雑談ワークショップ
チームのカルチャー形成のための雑談ワークショップチームのカルチャー形成のための雑談ワークショップ
チームのカルチャー形成のための雑談ワークショップ
 
楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー
 
Keycloak & midPoint の紹介
Keycloak & midPoint の紹介Keycloak & midPoint の紹介
Keycloak & midPoint の紹介
 
今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified ID今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified ID
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 
なんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudy
なんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudyなんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudy
なんたって”DevQA” アジャイル開発とQAの合体が改善を生む - 永田 敦 氏 #postudy
 
Id基盤構築101
Id基盤構築101Id基盤構築101
Id基盤構築101
 
Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2
 
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
 

Viewers also liked

Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered HarmfulJim Fenton
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
LOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalLOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalJim Fenton
 
Adapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICAdapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICJim Fenton
 
Guide hygiene informatique_anssi
Guide hygiene informatique_anssiGuide hygiene informatique_anssi
Guide hygiene informatique_anssiGaudefroy Ariane
 
Securing Cassandra The Right Way
Securing Cassandra The Right WaySecuring Cassandra The Right Way
Securing Cassandra The Right WayDataStax Academy
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Web performance tools @ WebPerf.camp 2016
Web performance tools @ WebPerf.camp 2016Web performance tools @ WebPerf.camp 2016
Web performance tools @ WebPerf.camp 2016SergeyChernyshev
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsLuca Bongiorni
 
Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...
Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...
Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...Expolink
 
ESORICS 2014: Local Password validation using Self-Organizing Maps
ESORICS 2014: Local Password validation using Self-Organizing MapsESORICS 2014: Local Password validation using Self-Organizing Maps
ESORICS 2014: Local Password validation using Self-Organizing MapsDiogo Mónica
 
2016 share the three headed beast v4
2016 share the three headed beast v42016 share the three headed beast v4
2016 share the three headed beast v4bigendiansmalls
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Santiago Bassett
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Santiago Bassett
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?Jim Fenton
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 

Viewers also liked (20)

Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
 
The Ant Story
The Ant StoryThe Ant Story
The Ant Story
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
LOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest ProposalLOA Alternatives - A Modest Proposal
LOA Alternatives - A Modest Proposal
 
Adapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTICAdapting Levels of Assurance for NSTIC
Adapting Levels of Assurance for NSTIC
 
Guide hygiene informatique_anssi
Guide hygiene informatique_anssiGuide hygiene informatique_anssi
Guide hygiene informatique_anssi
 
Securing Cassandra The Right Way
Securing Cassandra The Right WaySecuring Cassandra The Right Way
Securing Cassandra The Right Way
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Web performance tools @ WebPerf.camp 2016
Web performance tools @ WebPerf.camp 2016Web performance tools @ WebPerf.camp 2016
Web performance tools @ WebPerf.camp 2016
 
Certificate Pinning in Mobile Applications
Certificate Pinning in Mobile ApplicationsCertificate Pinning in Mobile Applications
Certificate Pinning in Mobile Applications
 
La disfunzione erettile (de)
La disfunzione erettile (de)La disfunzione erettile (de)
La disfunzione erettile (de)
 
Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...
Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...
Конфидент. Евгений Мардыко. "Рынок ИБ - тенденции 2016. Взгляд российского ра...
 
ESORICS 2014: Local Password validation using Self-Organizing Maps
ESORICS 2014: Local Password validation using Self-Organizing MapsESORICS 2014: Local Password validation using Self-Organizing Maps
ESORICS 2014: Local Password validation using Self-Organizing Maps
 
Cast
CastCast
Cast
 
2016 share the three headed beast v4
2016 share the three headed beast v42016 share the three headed beast v4
2016 share the three headed beast v4
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
 
Password management
Password managementPassword management
Password management
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 

Similar to Toward Better Password Requirements

User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondJim Fenton
 
Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructurewebhostingguy
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsSlawomir Jasek
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With RailsTony Amoyal
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security mythsDan Houser
 
Security Theatre - PHP UK Conference
Security Theatre - PHP UK ConferenceSecurity Theatre - PHP UK Conference
Security Theatre - PHP UK Conferencexsist10
 
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...Dakiry
 
AuthN & AuthZ testing: it’s not only about the login form
AuthN & AuthZ testing:  it’s not only about the login formAuthN & AuthZ testing:  it’s not only about the login form
AuthN & AuthZ testing: it’s not only about the login formDiana Pinchuk
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.Jakub Kałużny
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
 
The Client is not always right! How to secure OAuth authentication from your...
The Client is not always right!  How to secure OAuth authentication from your...The Client is not always right!  How to secure OAuth authentication from your...
The Client is not always right! How to secure OAuth authentication from your...Mike Schwartz
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchainsDmitry Meshkov
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?Blockchain Council
 

Similar to Toward Better Password Requirements (20)

User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security myths
 
Security Theatre - PHP UK Conference
Security Theatre - PHP UK ConferenceSecurity Theatre - PHP UK Conference
Security Theatre - PHP UK Conference
 
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
AuthN & AuthZ testing: it’s not only about the login form
AuthN & AuthZ testing:  it’s not only about the login formAuthN & AuthZ testing:  it’s not only about the login form
AuthN & AuthZ testing: it’s not only about the login form
 
Iot Security
Iot SecurityIot Security
Iot Security
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 
The Client is not always right! How to secure OAuth authentication from your...
The Client is not always right!  How to secure OAuth authentication from your...The Client is not always right!  How to secure OAuth authentication from your...
The Client is not always right! How to secure OAuth authentication from your...
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchains
 
Windows network
Windows networkWindows network
Windows network
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
 
Network security
Network security Network security
Network security
 

More from Jim Fenton

REQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsREQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsJim Fenton
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication OverviewJim Fenton
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More UsableJim Fenton
 
IgnitePII2014 Nōtifs
IgnitePII2014 NōtifsIgnitePII2014 Nōtifs
IgnitePII2014 NōtifsJim Fenton
 
OneID Garage Door
OneID Garage DoorOneID Garage Door
OneID Garage DoorJim Fenton
 
Identity systems
Identity systemsIdentity systems
Identity systemsJim Fenton
 

More from Jim Fenton (8)

Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
 
REQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsREQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS Requirements
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication Overview
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
 
Notifs update
Notifs updateNotifs update
Notifs update
 
IgnitePII2014 Nōtifs
IgnitePII2014 NōtifsIgnitePII2014 Nōtifs
IgnitePII2014 Nōtifs
 
OneID Garage Door
OneID Garage DoorOneID Garage Door
OneID Garage Door
 
Identity systems
Identity systemsIdentity systems
Identity systems
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Toward Better Password Requirements

  • 2. Disclaimer I’m a consultant for NIST, working on the SP 800-63-3 update Everything here is my own opinion; I don’t speak for NIST! I’m discussing a preview draft. Everything is subject to change in the review process 2
  • 4. A little about SP 800-63 Electronic Digital Authentication Guideline Defines requirements to satisfy 4 “Levels of Assurance” (defined by OMB): Registration (especially Identity Proofing) Authentication Assertions Intended for Federal Gov applications,
 used by many others 4
  • 5. The SP 800-63–3 update Major rethinking and rewrite Separates proofing from authentication 4 documents Public preview and comments on GitHub 5
  • 6. Guiding principles Strong user experience emphasis. If it’s not user friendly, users cheat. Realistic security expectations. Many things need 2-factor authentication Put burdens on the verifier rather than user wherever possible Don’t ask the user to do things that don’t significantly improve security 6 “Guiding Principles” by Ford-Foundation is licensed under CC BY-ND 2.0
  • 7. Standards language SHALL: Requirement to be followed strictly; no deviation allowed
 (cf. IETF “MUST”) SHOULD: Particularly suitable possibility, preferred but not necessarily required (cf. IETF “SHOULD”) MAY: A course of action permissible within the limits of the publication CAN: A possibility and capability, whether material, physical, or causal. 7
  • 8. Memorized Secrets “Exercise Plays Vital Role Maintaining Brain Health” by A Health Blog is licensed under CC BY-SA 2.0 8
  • 9. What’s in and out in 2016? In: 8 character min, >64 max Dictionary to disallow common passwords Allow all printing characters (Unicode optional) + spaces Out: Composition rules Hints Knowledge-based authn (KBA) Routine password expiration 9 “Can’t help loving that man o’mine” by darwin Bell is licensed under CC BY-NC 2.0
  • 10. Minimum length OLD: 6 characters/4 random digit PIN (LOA 1), 8 characters/6 random digit PIN (LOA 2) NEW: SHALL be at least 8 characters or 6 random digits Rationale Defends against online attacks (w/throttling) Defense against offline attacks would require much longer minimums Consistent requirements at all AALs (LOAs), old LOA 1 requirements too weak 10
  • 11. Maximum length OLD: No specification NEW: SHALL accept (and use) at least 64 characters. No truncation. Rationale: Give users maximum flexibility to choose a memorable pass phrase 64 characters fit on many screens “measuring tape” by areta ekarafi is licensed under CC BY-NC-ND 2.0 11
  • 12. Space characters OLD: no specification NEW: SHALL accept space characters, but MAY canonicalize them out Rationale: Spaces are natural to type in passphrases UI concerns about inadvertently typing multiple spaces, and the space characters themselves don’t add much entropy “the burning of the midnight oil” by Robert S. Donovan is licensed under CC BY-NC 2.0 12
  • 13. Character set OLD: Alphabet of 90 or more characters NEW: SHALL accept all printable ASCII characters SHOULD accept Unicode, including emojis (1 “character”/code point) 😺 Rationale: Site-specific constraints on special characters have been a UX nightmare Verifier SHALL hash the entry anyway, so SQL injection shouldn’t be a concern “Lead Type (melting in the oven of your mind)” by jm3 on Flickr is licensed under CC BY-SA 2.0 13
  • 14. Hints and prompts OLD: No requirement NEW: SHALL NOT permit subscriber to store a hint that is accessible to unauthenticated claimant SHALL NOT prompt subscribers to use specific types of information (e.g., “What was the name of your first pet?) when choosing memorized secrets Rationale These greatly weaken the authentication 14 “whisper” by ElizaC3 is licensed under CC BY 2.0
  • 15. Throttling OLD: SHALL limit failed authentication attempts to 100 in 30-day period per account MAY use CAPTCHAs, delays, or IP whitelists when approaching the limit Used for all authentication with ~20 bit authenticator output entropy (e.g., OTP) NEW: Substantially unchanged. Adds use of risk-based or adaptive techniques for throttling Rationale: Many other techniques (e.g., stronger use of IP address) can be easily circumvented by attackers. 15 “Revs Per Minute” by Michael Gil is licensed under CC BY 2.0
  • 16. Composition OLD: Implement dictionary or composition rule to constrain user-generated secrets (LOA 2) NEW: SHOULD NOT impose composition rules SHOULD compare prospective secrets against dictionary of known commonly-used and/or compromised values. RATIONALE: Composition rules are a UX nightmare, and don’t provide as much value as originally thought Need to study how to ask users to pick something different 16 “Are you freaking INSANE????” by Paige Saez is licensed under CC BY-NC 2.0
  • 17. Dictionaries: questions How big should the dictionary be? Too small: ineffective Too big: bad user experience (like composition rules, but less transparent) Will users act predictibly when asked to pick a different password? Users might just append something like 1 or ! If so, the dictionary is a great resource for offline cracking 17 “Dictionary” by Caleb Roenigk is licensed under CC BY 2.0
  • 18. Dictionary investigation What would a good dictionary look like? How big? What’s in it? Started with Burnett’s list of 10M compromised passwords Limited to >=8 characters 4945022 entries, 3199670 distinct passwords 18 “The Worlds Smallest Dictionary” by Kit is licensed under CC SA-NC 2.0
  • 20. 1" 10" 100" 1000" 10000" 100000" 1" 10" 100" 1000" 10000" 100000" Rank (log scale) 20 Dictionary distribution (log-log scale)
  • 21. 0" 50000" 100000" 150000" 200000" 250000" 300000" 350000" 1" 2" 3" 4" 5" 6" 7" 8" 9" 10" 11" 12" 13" 14" 15" 16" 17" 18" 19" 20" Entries(with(>n(occurrences( Occurrences( Dic1onary(size(vs(number(of(occurrences( >=8(characters( 21
  • 22. Dictionaries: takeaways It’s pretty simple to build a reasonable dictionary Dictionary with size of ~100,000 entries is probably good - but need to test But what do users do when asked to try another password? BadPassword -> BadPassword1 ??? 😰 22
  • 23. Verifier storage OLD: SHALL NOT store plaintext (LOA 1); MAY salt and derive key or encrypt (LOA 2) NEW: SHALL be hashed with 32-bit random salt using approved key derivation function PBKDF2 with SHA-1, SHA-2 family, SHA-3 family
 (NIST SP 800-131A rev 1, Sec 9) SHOULD do 10,000 iterations SHOULD use keyed hash (e.g., HMAC) with key stored separately (e.g., HSM) RATIONALE: Need to require verifiers to protect password integrity 23
  • 24. Displaying secrets OLD: No requirement NEW: SHOULD offer option to display the secret rather than dots or asterisks But rehide after some period of time RATIONALE: Displaying the password when not likely to be observed helps typing accuracy, and therefore improves user experience 24 “shoulder surfing” by Anne Petersen is licensed under CC BY-NC-ND 2.0
  • 25. Memorized Secret expiration OLD: No requirement NEW: Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically) unless there is evidence of compromise RATIONALE: Expiration encourages choice of less complex and/or multiple use secrets. 25 “parking_meter.JPG” by Paul Vladuchick is licensed under CC BY-NC-ND 2.0
  • 27. Pre-registered knowledge OLD: User chosen or personal knowledge questions NEW: Eliminated! RATIONALE: Knowledge-based authentication by another name, weak and likely to suffer from reuse on multiple sites 27 “Pip” by Helen Haden is licensed under CC BY-NC 2.0 First pet?
  • 28. Out of Band authenticator OLD: Uniquely addressable, separate from primary authentication channel NEW: SMS deprecated (more on this to come) Response (only) may be over protected channel OOB device authenticates to verifier using approved crypto 28
  • 29. SMS as OOB authenticator SMS is deprecated for OOB — may not be acceptable in next revision SMS SHALL NOT be to a VoIP number: that doesn’t establish possession of something you have Rationale: Many threats to SMS including smartphone malware, fraudulent reassignment of telephone number, SS7 attacks, forwarding Users’ phone numbers also change 29
  • 30. Biometrics SHALL be bound tightly to specific device identified using approved crypto Therefore always part of a multifactor authenticator New performance metrics for false match and nonmatch rates and presentation attack resistance New hard limit (10) consecutive failed attempts Need backup activation factor, e.g., memorized secret MAY use central verifier if other requirements met 30
  • 31. How to participate 31 “soccer” by ..Russ.. is licensed under CC BY-SA 2.0
  • 32. Join the conversation Read the preview drafts: https://pages.nist.gov/800-63-3/ Note: continuous update model, expect frequent changes! Review issues on GitHub: https://github.com/usnistgov/800-63-3/issues More instructions: https://pages.nist.gov/800-63-3/comment_help.html Public preview period runs until ~September 17, 2016 “Formal” public comment period will follow 32 “Conversations” by Steve McClnahan is licensed under CC BY-NC 2.0