Passwords are dead.

Full disclaimer: this is just a preliminary article to get a bit of a feel for the LinkedIn Blog Platform. Somewhere in 2015 I will make a more concerted effort.

A lot of internet security revolves around passwords. Of late we see more and more of these being compromised in various manners.

So let me give a few reasons (by no means an exhaustive list) why I think passwords are dead and the concept of username/password should be retired asap.

  • The username/password paradigm introduces an uncontrollable factor in the authentication cycle: the user.
    It mandates the user to remember or store the combination of username/password and because of the myriad of services now available this almost invariably boils down to either the same username/password combo (crack one old disheveled abandoned webstore and you may have the login for social media or banking) or storage in an often insecure way (spreadsheets...).
  • The previous (and the fact that it must be processed by humans) also makes for a limitation in entropy; most passwords are in the 8 to 16 character range. And the fact that it is characters limits the passwords again.
    I once made the calculations for brute force cracking using custom made boards (hashing is not the same as encrypting...) and came to a neat 8 seconds average for 12 character passwords. Just brute force, no rainbow tables, statistical distributions or anything.
  • Most password systems send something over the wire that can be calculated back to it's original value (this is not a password paradigm flaw but rather that implementing passwords badly is ridiculously easier, and cheaper, and faster, than implementing a good scheme). Just listen to all the traffic on public WiFi and you are bound to get some passwords. Combine this with the first point and well, you get the idea.
  • Passwords are easy to transfer. If I give you my login/password combo then for all intents and purposes, to the system, you are me. This seems like a major glaring problem with something we call 'authentication'. I would personally just call it 'access', because a username/password combo tells me nothing about the person accessing the data.

And I could go on for a good few points more, but you get the idea I guess.

Since this is just a trial run on LinkedIn, I am not going all out with references, possible mitigation etc. That will be for a later time.

Mattijs Schurink

Manager bedrijfsvoering Youz Twente (IMH, Kind en Jeugd, i-psy en 18+)

10 年

Are we 'somewhere in 2015' yet?

回复
王瑞德

Global I-Banker

10 年

Good start - what is next?

回复
Mohamed Metalsi

Directeur primair onderwijs

10 年

Nothing new so far. What's your solution?

回复

要查看或添加评论,请登录

Adrianus Warmenhoven的更多文章

  • There's a hole in the bucket dear EU, dear EU

    There's a hole in the bucket dear EU, dear EU

    I am going to try and explain why tackling the CSAM (Child Sexual Abuse Material) problem with technical/surveillance…

    14 条评论
  • Who am I to blow against the wind?

    Who am I to blow against the wind?

    These are my seasonal wishes to you, thinly wrapped in a story about my past. Nothing really of any cybersecurity…

    21 条评论
  • Master List of Logical Fallacies (part 2 of 2)

    Master List of Logical Fallacies (part 2 of 2)

    LinkedIn has a limit on content, so this list is split into two parts. First part here The list is not mine (original…

    3 条评论
  • Master List of Logical Fallacies (part 1 of 2)

    Master List of Logical Fallacies (part 1 of 2)

    LinkedIn has a limit on content, so this list is split into two parts. The list is not mine (original URL), but I find…

    1 条评论
  • A primer on finding your own 0days

    A primer on finding your own 0days

    Disclaimer: This article does not show you anything you could not have found out yourself by using search engines…

    9 条评论
  • Secure and private conversations. Online.

    Secure and private conversations. Online.

    Disclaimer: this is going to be advocating the usage of IRC. If for whatever reason you vehemently oppose the usage of…

    2 条评论
  • Complexity is not the main enemy of security, it is lethargy.

    Complexity is not the main enemy of security, it is lethargy.

    Of late I see a lot of 'security' people mumbling about how complexity is the main enemy of security. That is just like…

    4 条评论
  • PGP, a pretty good new year's resolution.

    PGP, a pretty good new year's resolution.

    But why wait until then? No, really..

  • Abundance; IT Security's SNAFU

    Abundance; IT Security's SNAFU

    I have gotten permission from RedSocks to re-publish articles I wrote for RedSocks. They will be republished after they…

    1 条评论
  • The electronic theatre of war

    The electronic theatre of war

    I have gotten permission from RedSocks to re-publish articles I wrote for RedSocks. They will be republished after they…

    4 条评论