back to article Microsoft: Yo dawg, we heard you liked Windows password expiry policies. So we expired your expiry policy

Microsoft has finally decided to get rid of password expiration policies in Windows because forcing people to reset their passwords periodically harms security. Word arrived from Redmond via Wednesday's draft release of the security configuration baseline settings for Windows 10 version 1903. The release, available as a zipped …

  1. hittitezombie

    Yeah, right.

    "our crypto experts tell us that there is no known danger of its being broken in the foreseeable future"??

    When was the last time you wanted less security than more, just because? What's the harm, apart from to NSA and GCHQ?

    1. dnicholas

      Re: Yeah, right.

      I was under the impression modern CPUs are very good at 256bit on the fly encryption...

    2. mark l 2 Silver badge

      Re: Yeah, right.

      Hmm I have a sneaky suspicion that a certain 3 letter government agency might have something to do with the reduction of the encryption from 256 to 128 bit.

      1. Christoph

        Re: Yeah, right.

        Given their known past behaviour, and the ridiculousness of deliberately reducing security that's already working, I would say that it's a damn sight more than a suspicion.

      2. Mark 85
        Black Helicopters

        Re: Yeah, right.

        Nah, they wouldn't do that just and never spy on ordinary folks... err.... I'm hearing a chopper overhead.

      3. Kabukiwookie

        Re: Yeah, right.

        According to the information that Edward Snowden disclosed. Microsoft was one of the first companies to get into bed with the NSA (2007 according to the Powerpoint slide)

    3. Neil Barnes Silver badge
      Black Helicopters

      Re: Yeah, right.

      Foreseeable future == about next Thursday, right?

    4. Bob Vistakin
      Facepalm

      Re: Yeah, right.

      The same experts who held a funeral for the iPhone and Blackberry, both of which are still going strong(ish), unlike Microsoft's mobile offering which has ceased to be?

      https://www.zdnet.com/article/microsoft-celebrates-windows-phone-7-with-mock-iphone-funeral/

      1. doublelayer Silver badge

        Re: Yeah, right.

        Microsoft's mobile offering is assuredly dead, but Blackberry is too. Just because someone's making android phones and calling them Blackberry doesn't mean the system survives. The QNX-based OS is dead, the Blackberry company isn't making those devices fully, and they're just a different hardware type running android.

  2. dnicholas

    Was it Password123 or 123password?

    1. David 132 Silver badge
      Happy

      Puhlease. That was my password 10 years ago - thanks to expiration policies, I'm now up to Password245.

  3. JeffyPoooh
    Pint

    "Change passwords monthly..."

    ... And since you'll never remember the ever-changing passwords, right them down on a small slip of paper and tuck it under your keyboard.

    1. Tim99 Silver badge

      Re: "Change passwords monthly..."

      I installed an early Novell 2 system for our local head of finance. He insisted that each user had a long password changed every 40 days (It was Novell, hence the Biblical 40 days). His staff wrote their passwords on (the new fangled) PostIt notes and stuck them to the front of their 5150 PCs. I had a quiet word with a couple of the senior staff and suggested that this was not a good security practice, only to be told that staff members often logged in as each other (some had higher levels of access than others).

      After our little chat where I told them not to do this, I pretended that I did not know that they started putting the PostIt under their keyboards "In case we forgot, so that we did not have to get our passwords reset by the local admin".

      1. Anonymous Coward
        Anonymous Coward

        Re: "Change passwords monthly..."

        At a certain three-lettered formerly-hi-tech company, we had a test lab with old desktops set up for running test scripts. They weren't connecting to anything critical, so the password was the machine serial number. Conveniently available as a tag on the front of the machine.

    2. jelabarre59

      Re: "Change passwords monthly..."

      ... And since you'll never remember the ever-changing passwords, right them down on a small slip of paper and tuck it under your keyboard.

      Just use the Romaji versions of anime titles. You can do the letter-to-number substitution, and if the Romaji has "no" or "ku" in it, you can substitute them with "@" or "<" respectively.

  4. Anonymous Coward
    Anonymous Coward

    PCI DSS

    Unfortunately anyone who needs to be PCI DSS compliant still has to reset their passwords every 90 days.

    The actual requirement is only for those with access to cardholder data or system login accounts but security policies tend to be implemented as a broad brush "just in case", just like local admin rights

    1. Anonymous Coward
      Anonymous Coward

      Re: PCI DSS

      I'm sure they'll get on board eventually. Standard setting bodies are always the last to see reason.

    2. dougkiwi

      Re: PCI DSS

      Hope might be on the horizon for 2020 ... check out:

      https://blog.pcisecuritystandards.org/pci-dss-looking-ahead-to-version-4.0

      Reviews for 4.0 include:

      "Authentication, specifically consideration for the NIST MFA/password guidance"

      So maybe.

      1. Anonymous Coward
        Anonymous Coward

        Re: PCI DSS

        ".../pci-dss-looking-ahead..."

        hindsight, surely... it's 2020!

  5. RobinCM

    Compromised passwords remain valid for ever...

    ...Unless you force users to change them every now and then. And most places don't monitor for unusual access, so that compromise will continue for as long as the attacker likes.

    Make people change them every now and then, 3-6 months sounds fair.

    Unless you've implemented MFA. Then ignore the above, assuming it's a requirement on every system.

    1. Mark 85

      Re: Compromised passwords remain valid for ever...

      And therein is part of the problem. If the system gets hacked, the bad guys will own it forever.

      1. GnuTzu
        Stop

        Re: Compromised passwords remain valid for ever... -- Voluntary Changes

        Um, I'm pretty sure that users will still be able to voluntarily change passwords, though that's only relevant if you know that you've been compromised.

      2. Tom Paine

        Re: Compromised passwords remain valid for ever...

        Only if you have no other security detection systems - IDS, firewalls, hell even a daily glance at sflow data can show up pwned systems (seen that before!)

    2. Mike 137 Silver badge

      Re: Compromised passwords remain valid for ever...

      Most businesses don't implement MFA - they implement SFA and place the entire burden of authentication security on the end user - the person least equipped to bear that burden.

      I once mapped the responsibilities matrix for the entire regime of password-based authentication security for a client, and it showed that at least two IT or process management functions had to collaborate with each other or the end user to counter each threat.

    3. Keith Langmead

      Re: Compromised passwords remain valid for ever...

      If your computer has been compromised due to the password being cracked/discovered, do you really think the bad guys continue using it to access your machine? Like hackers currently lose access to a load of machines each day when they hit the password reset threshold, and they have to start all over again? No, they'll have used the access to mess with your setup, and changing the password won't impact their access one bit.

  6. Blockchain commentard

    Change your password monthly? So this month it'll be april2019. Next month's one will be? Can anyone guess?

    1. A.P. Veening Silver badge

      Change your password monthly? So this month it'll be april2019. Next month's one will be? Can anyone guess?

      Sorry, I can't as may2019 is only seven characters, missing at least two.

      1. Andy Denton

        Just add 'PW' to the end - simples.

    2. Anonymous Coward Silver badge
      Trollface

      april2020

      I suspect that you fancy a girl named April and you've had to change your password over 2000 times...

  7. Anonymous Coward
    Anonymous Coward

    NIST

    I think it’s NIST. The most recent recommendations from them regarding passwords is that you don’t make people change periodically just because.

    This actually is an admission that it doesn’t work. Hands up everyone when forced to change a password just cycles through the required digit. Or the embedded day or month name. Or swap the first and second halves.

    If — and it’s a big if — it’s a password you never have to type then just generating a new random 16 character password is Easy enough. But a completely random password of that length isn’t going to be brute forced any time soon so why bother?

    Yes, this is still lost on $employer who thinks it is a good idea to make me change a password every 30 days.

    1. A.P. Veening Silver badge

      Re: NIST

      Yes, this is still lost on $employer who thinks it is a good idea to make me change a password every 30 days.

      Not my problem, I get paid whether I remember that new password or not. But we might inform the bean counters about this, they abhor needlessly lost productivity.

    2. Dave K

      Re: NIST

      It gets worse when you have about a dozen systems with no password synchronisation and differing expiry periods for the passwords (no, I'm not kidding sadly). My previous scheme for this was indeed to "cycle the digits" with a post-it reminding me which current digit it was for each system. Of course, the rest of the password was not written down anywhere, but it does illustrate the point thay having regularly expiring passwords will mean either that people write them down, or if a hacker obtains one that doesn't work, he just has to keep incrementing the digits until he gets to "this month's" version of that password...

      1. A.P. Veening Silver badge

        Re: NIST

        It gets worse when you have about a dozen systems with no password synchronisation and differing expiry periods for the passwords (no, I'm not kidding sadly).

        Been there and done that as just an ordinary user (OK, AS/400 programmer, still an ordinary user on the Windows network). I needed passwords for at least five different systems, when one expired, I replaced them all with the same new password.

        1. Dr. Mouse

          Re: NIST

          when one expired, I replaced them all with the same new password

          I have worked at places where that would take around half a day... Every month... And that was just for one system for which we had several accounts, they had no password synchronisation, and they all seemed to have different password expiry policies and complexity requirements.

          I ended up just using reset password every time I needed to log on to those systems. It was less hassle than trying to keep up with them all.

          1. A.P. Veening Silver badge

            Re: NIST

            I have worked at places where that would take around half a day... Every month...

            Not my or your problem, as long as we get paid for that half a day. Just let the bean counters fight it out with the security policy author.

          2. Robert Carnegie Silver badge

            I play nice.

            Each of my passwords is n1 random non-repeated consonants and n2 numerals. And if that isn't enough then ! at the end, which I tell you freely as you'll never guess the rest except by exhausting all combinations. And where I have them tattooed is a secret as well. I set a new unrelated random password whenever one expires

            ...except for my password for The Register, which I just can't be bothered about. vulturefan it is. (not.)

            1. AndrueC Silver badge
              Facepalm

              Re: I play nice.

              Did the same thing at one of my previous employers. Had a post-it note with crib sheet of application -> suffix number.

              Funniest thing though is that there was only of their systems that was configured to prevent my little scheme from working and that insisted I pick a different password each time. It was the employee training portal.

        2. Tom Paine

          Re: NIST

          Keep it up! This sort of thing is why all us infosec droids make a good steady living cleaning up after users.

    3. Anonymous Coward
      Anonymous Coward

      Re: NIST

      This actually is an admission that it doesn’t work. Hands up everyone when forced to change a password just cycles through the required digit. Or the embedded day or month name. Or swap the first and second halves.

      Or you could type a pattern on the keyboard. When password change time arrives, just shift over one key on the keyboard.

      Of course, I've seen a password checker that even checks for that. Was pretty much impossible to find more than two passwords in sequence that checker would accept.

      1. Adrian 4

        Re: NIST

        Use a convenient book (maybe the co. telephone directory) to translate month/date to page/word. OTP should beat any password checker.

        1. Rich 11

          Re: NIST

          (maybe the co. telephone directory)

          They stopped printing the company directory 20 years ago, after we published it on the company intranet.

          1. doublelayer Silver badge

            Re: NIST

            You can usually find a big book that nobody cares about in any workplace. A place I worked at a few years ago had a multi-volume set of instructions on administering Windows Server 2000, and as this was a software engineering area with few admins, nobody really knew why they were there. I have a feeling a convenient book code can be found when needed.

      2. Tom Paine

        Re: NIST

        Yup. Worked on a project to allow any number of arbitrary sequences to be blacklisted -- not just "qwerty" but "1qaz2wsx" and all the permutations along and across a standard 102 key keyboard.

        When I pointed out to the PM that the two customers who were insisting on this change operated in dozens territories that used different keyboard layouts he nearly cried. #funtimes

    4. Tom Paine

      Re: NIST

      NCSC, 2015: https://www.ncsc.gov.uk/blog-post/problems-forcing-regular-password-expiry

  8. ma1010
    Go

    Actually, even Uncle Sam got a clue now

    Password change requirements have been removed from NIST's recently-released guidelines. They also address complexity requirements and even suggest checking passwords against lists of commonly-used passwords.

    You can see an summary of the changes here.

    1. Anonymous Coward
      Anonymous Coward

      Now someone go tell the IRS

      They recently mandated a max. 60 day expiration window for all downstream entities who receive tax data from them.

    2. Wayland

      Re: Actually, even Uncle Sam got a clue now

      The best password would be a random generated one of 9 characters that you commit to memory forever and never share. If a password is not remembered it's written down or lost and has to be changed. Both security weaknesses.

      1. A.P. Veening Silver badge

        Re: Actually, even Uncle Sam got a clue now

        The best password would be a random generated one of 9 characters

        For the AS/400 I once wrote a password generator, which generated a ten character password and emailed it to the user. Not even the operator using the password reset utility knew the new password.

        1. Baldrickk
          Facepalm

          Re: Actually, even Uncle Sam got a clue now

          and emailed it to the user...

          Because email is clearly secure and no-one could ever find out what the password is.

        2. Tom Paine

          Re: Actually, even Uncle Sam got a clue now

          The mail server specialist, though, got VERY nice pay rises.

      2. Michael Wojcik Silver badge

        Re: Actually, even Uncle Sam got a clue now

        The best password would be a random generated one of 9 characters

        Too short, if any verifiers generated from it use weak algorithms. An LM Hash or unsalted MD5 hash - both of which are still in use, and may be exposed to an attacker - of 9 alphanumerics, or even 9 ASCII graphic characters, is breakable at relatively low cost using contemporary technology.

        A 2015 estimate for MD5 hashing using a single GPU would put it at about a year on average to break an MD5 hash of 9 characters selected from the 94 ASCII graphics. These days it would be much faster, and an attacker would probably just run such hashes through a farm of cloud VMs using stolen accounts anyway.

        A sufficiently-random passphrase of reasonable is likely to have more entropy than a short password and be easier to remember. To generate a phrase we have the XKCD method, the random-headline method (pick a random set of words and arrange them into a phrase that sounds like a newspaper headline), the chimera-quotation method (combine quotations from two or more sources into a new phrase) ...

        Pro tip: The phrase "the best password would be" is nearly always followed by a description of a sub-optimal password-generation scheme. And in any case, it's not meaningful to make claims about "best" passwords without explaining what your criteria are.

  9. Mike 16

    Recent Research?

    IIRC, the first paper about the (negative) effects of frequent mandatory password changes came out in the 80s or 90s. Did the 2010 folks do their research in a library? Probably not, because who the heck looks at paper anymore...

    Meanwhile, upon being borged by a major networking company I attended a mandatory security training session, moderated by the head of corporate security. After the session I chatted with him for a while and mentioned the password expiry issues, and how long they had been known. His answer shocked me: "I know, but it's not my call". In case you missed that, the head of corporate security could apparently be over-ruled on security policy. By whom? Marketing? HR? Catering?

    Of course the whole company was a pack (gang? confusion?) of weasels (apologies to mustelidae everywhere) and I left as soon as my retention bonus vested.

    1. Tim99 Silver badge

      Re: Recent Research?

      A group of weasels can be boogle, gang, pack, sneak, or confusion. For a corporate environment the last two might be appropriate.

    2. Michael Wojcik Silver badge

      Re: Recent Research?

      The article links to the 2010 paper (by Zhang et al.), and section 7 of it lists their references. But who the heck looks at readily-available information before posting their rants anymore?

  10. Anonymous Coward
    Anonymous Coward

    maybe they should ask enterprises first

    our PMO ain't gonna like this one, we've had the 6 week password change policy around for a few years now.

    1. Geoffrey W

      Re: maybe they should ask enterprises first

      Far as I can tell you may continue to do so. They removed it from the baseline policy so it doesn't get tagged by audits. That's it.

      1. Keith Langmead

        Re: maybe they should ask enterprises first

        Yeah, doesn't effect GPO policies etc you've created, just the default behaviour in a standalone copy of Windows.

        Great news, especially since Windows 10 makes simply getting to the "Password never expires" option such a pain in the arse I've resorted to doing it via a command line using wmic rather than hunt for where it's been moved/hidden in each interation of 10.

        1. Kabukiwookie

          Re: maybe they should ask enterprises first

          I've resorted to doing it via a command line using wmic rather than hunt for where it's been moved/hidden in each interation of 10.

          Ah. Thw bliss of Windoze administration. If I would be forced to do this, I'd rather start selling ice cream.

          1. Geoffrey W

            Re: maybe they should ask enterprises first

            I'll have a 99 please. With strawberry syrup. And a tub, with 100s and 1000s. Ta!

  11. Anonymous Coward
    Anonymous Coward

    So, its only taken them 20 years to stop listening to idiotic "security experts" telling us we need a password that is changed at least every 60 days, is between 8 and 128 characters long, uses at least 3 of the following types of characters: (a) uppercase letters, (b) lowercase letters, (c) numbers, and/or (d) special characters and must be unique and cannot be re-used.

    What next? re-release Windows 7? an O/S that people want to use?

    1. Geoffrey W

      Microsoft and a majority of the rest of the IT industry. I'm tired of having silly password policies forced on me by countless web sites and companies, not to mention poorly implemented explanations as to why my chosen password does not fit their criteria leaving me to try randomly and endlessly until one works. I hope they all follow Microsoft, and soon.

    2. Anonymous Coward
      Anonymous Coward

      So, its only taken them 20 years to stop listening to idiotic "security experts" telling us we need a password that is changed at least every 60 days, is between 8 and 128 characters long, uses at least 3 of the following types of characters: (a) uppercase letters, (b) lowercase letters, (c) numbers, and/or (d) special characters and must be unique and cannot be re-used.

      Yeah because we all know that if those policies were not enforced, whinging twats like you would just keep using '1234' everywhere, and then complain when you get hacked.

      1. Dave K

        Password expiration requirements != Password complexity requirements.

        1. veti Silver badge

          Sure, but GGP devoted a lot more words to complaining about complexity than expiry.

        2. Anonymous Coward
          Anonymous Coward

          @Dave K

          Did you even read what I was replying to?

          The other AC was complaining about password complexity requirements.

    3. Mike 137 Silver badge

      20 years...

      "Microsoft cites recent research that casts doubt on the efficacy of password expiration policies"

      Actually there's been plenty of research for at least the last 20 years that makes the point about regular (medium period) password changes being counter-productive, and it's also self-evident to anyone with their eyes open and their brain engaged. So not only "listening to idiotic &c." but not taking note of genuine expert research for all this time and not using common sense.

      This is just one more indication that the majority of infosec practice has for ages been, and is still, driven by thought substitute mantras, because the training does not include how to think for oneself from first principles, but only the ability remember and regurgitate "stuff".

      1. Anonymous Coward
        Anonymous Coward

        Re: 20 years...

        and it's also self-evident to anyone with their eyes open and their brain engaged.

        Obviously most of you have never considered network security in any detail.

        If someone, a legitimate user on a network, has their credentials either stolen or successfully hacked, then as long as the malicious actor doesn't do something overtly stupid, they can use those credentials with impunity to extract data or otherwise compromise the network.

        There is no effective way to detect that the individual logging in with those credentials is malicious.

        The only defence that works is to limit the time that those stolen credentials will be usable, and you do that by adopting a policy of password changes allied with complexity requirements that disallow just changing a number or letter of the password.

        1. Joe W Silver badge

          Re: 20 years...

          If a determined attacker gains access to your system the first step is to gain elevated privileges as I understand it. The password is needed at first, but not forever.

          Plus you should really implement 2FA... solves at least this issue.

        2. Adrian 4

          Re: 20 years...

          Most of these password policies are enacted on machines not accessible over the internet. Their protection is only against colleagues, not outside agencies.

          Maybe you should just employ trustworthy people and not just shackle all your employees ?

        3. doublelayer Silver badge

          Re: 20 years...

          Thanks for the broad insult to everyone here. Let me enlighten you on a bit of user behavior.

          Here's how passwords usually go when the security policy you mention is instated. Minimum 10 characters, at least one number, both cases, and a symbol. Password changes every month and the algorithm checks against old passwords so you can't duplicate and thoroughly checks against the last one so you can't just change it slightly.

          New employee: Uses password anC9@mlzcQ)AX;1mbz

          One month in: Changes password to fjZv83na.1/f8a

          Two months in: Changes to E8zvhan3oz&

          Three months in: Changes to Fnoazlh92*

          Four months in: Changes to Thisisthe12thsystemI'vehadtochangethison!

          Five months in: Changes to: Gottiredtyping2$

          Six months in: Changes to Authenticate0^

          Changing passwords can be useful, but forcing people to change them so frequently means that many will degrade the entropy of their password because why bother memorizing a long string of random characters when the information will be useless in a month? It will become obsolete faster for an attacker, but the attacker can gain access to systems and install back doors that do not need a password, so expiring credentials doesn't always help. Meanwhile, users use less random passwords that can be broken more easily, meaning you have a higher likelihood of getting an attacker. Also, the users are less happy.

  12. Kevin Johnston

    Bank web security

    A few years ago I was working in Ireland and had to have a local bank account while I was there. The bank I chose had online banking but I was having trouble with the password which had to be 6 to 8 characters, all letters. It turns out my problem was because not only did they have to be letters, they also had to be lowercase letters.

    1. Anonymous South African Coward Bronze badge

      Re: Bank web security

      Some systems don't take kindly to % and $ in passwords...

      1. Dan 55 Silver badge

        Re: Bank web security

        The only thing I can think which would cause a problem with $ and % is plaintext passwords being held in poorly written scripts, which sounds like a WTF moment.

        1. Ken Hagan Gold badge

          Re: Bank web security

          The same goes for length limits, which appear to be hugely popular nevertheless.

      2. Ken Shabby
        Facepalm

        Re: Bank web security

        A system I was using the other day gave a long list of special characters that could be used in a password (you know the numbered list of things that just about guarantees you all end up being onlyable to enter the same password). On close inspection as to why it did not like the passwords I tried was that it seemed only $ was missing from the list (but may % as well)

    2. Anonymous Coward
      Anonymous Coward

      Re: Bank web security

      Aside from throwaways, my least secure password is for my bank, as per their policies.

    3. tinman

      Re: Bank web security

      well why didn't you do that from the start?

      Oh yes, because it'll have been one of those systems that has lots of requirements for your password such as letters AND a number, or at least one upper case, but doesn't tell you that beforehand and instead waits until you get the first attempt wrong and then points out only one mistake!

      1. Adrian 4

        Re: Bank web security

        Numbers have less entropy than letters (10 vs 26 or 52 possibilities). So systems insisting on a number are LESS secure than those that can be any combination.

        (Yes, you should use both letters and numbers in your password. Requiring that some characters are chosen from a smaller set is not the way to do that).

        1. Baldrickk

          Re: Bank web security

          Maybe, but if an attacker has no idea how many digits you use a number for, any more than one digit would increase entropy, wouldn't it? You would have at least one alpha, one numeric - somewhere in the password, but all others could be alphanumeric.

          Without requiring at least one numeric, you would allow alpha only passwords, which would have less entropy than one that has to be even slightly alphanumeric.

      2. Anonymous Coward
        Anonymous Coward

        Re: Bank web security

        I used a system that accepted my choice of initial password but failed when I tried to log in again... turned out there was a login password policy but not on the initial password entry!

  13. Anonymous South African Coward Bronze badge
    Trollface

    Dear World+Dawg

    My password is password123$

    my IP is 127.0.0.1

    kindly haxx0r me

    kthanxbai

    1. Michael Wojcik Silver badge

      Give me my IP address back, you bastard.

  14. Drew 11

    Gaaaaaa

    The only thing more annoying than password complexity rules that requirre at least 1 capital, one number and one punctuation, is when they have those rules but don't tell you until AFTER you've made up a password, entered it twice, saved it to your password manager and THEN had it rejected.

    Fucking tosser UI programmers.

    1. FrogsAndChips Silver badge
      FAIL

      Re: Gaaaaaa

      Yeah, hate it when those rules aren't clearly stated from the start, and even worse when you have to guess them step by step ("hey, your password is too long!", "OK, now you're missing a special char", "Actually, % is not allowed as a special char, try again", "Good, can you add an uppercase letter, dear?").

      Good thing about password managers is that you can store this rules for the next mandatory reset, although by Murphy's law they will have changed by that time.

      1. Mark Morgan

        Re: Gaaaaaa

        I've had ones that don't tell you the maximum length, so you generate a 30-char random password using a password managed and store it. Website accepts it whilst creating a user profile and lets you in. The next time you try and log in it fails. Turns out after much forum digging that max length is 16. Create user screen had just truncated it and let you in but logon screen doesn't truncate and flags a mismatch. Doh! Had that more than once.

  15. Blade918rr

    Seems odd that we think of passwords and not the resulting hash. Change one character of the password and the hash will change significantly. I thought we wanted to disrupt the attacker and not give the attacker longer to replay or crack passwords from hashes.

    1. Keith Langmead

      They generally don't crack passwords from hashes, that takes a long time. They hash the password they're testing* and compare that hash with the one for your password. If the hashes match they know what your password is. So even if the hash for MyPassword123 is completely different to the one for MyPassword456, if the hacker already has the hashes for each interation of MyPasswordnnn it'll take no time for them to find it. Or, if they know your old password was MyRe@lly10ngP@55w0rdRocks1 it doesn't take Einstein to try hashing MyRe@lly10ngP@55w0rdRocks2 and seeing if that matches the new one.

      * or more likely have a pre-prepared collection of hashes to run comparisons from

      1. RFC822

        * or more likely have a pre-prepared collection of hashes to run comparisons from

        Rainbow Tables.

        1. Blade918rr

          The point is that the attacker would need to take an additional action to generate the correct password, disrupting the process. Significant if the attacker has purchased the passwords / hashes and therefore would need to go back to point of extraction. Changing one character anywhere in the password would not be as easy to guess.

  16. EnviableOne

    "our crypto experts" - I thought all these became surplus to requirements, I know the bitlocker team are all ex-microsoft.

    killing Password expiry is only ok if you monitor logon patterns for risky behaviour and force changes when it occurs.

    Length trumps complexity, i was going to try enforcing 14 character minimum and no complexity, with a common word component filter.

    26^14 > 95^8 and the common 8 char patterns no longer apply

    complex passwords are easy for machines to guess and hard for humans to remember.

    1. Robert Carnegie Silver badge

      Some favour composing a short sentence to remember, and setting that as password.

      I generate random letters, preferably consonants, and numbers, and then compose a sentence to remember most or all of the password.

      For instance: Tfrydl50 - "Thanks for yodeling" (not real, generated as demonstration) and after a couple of repeats the numbers come up in my mind with the letters, and I don't have to look at the written copy hidden in my xxxxxx xxx xxx xxx xxxxxxx, which is awkward in the office environment.

      The drawback of actual words is that one letter = one random bit approximately. My letters are fewer but randomer.

      Consonants mean I generally don't run into a word filter, as if a password would be rejected because Mwsfukgst contains a three-letter rude word.

  17. MassiveBob

    Words of Satan

    "Periodic password expiration is an ancient and obsolete mitigation of very low value, and we don’t believe it’s worthwhile for our baseline to enforce any specific value," said Margosis.

    For our company "information security officer", these are words of Satan himself.

    He swears by the concept of regular password changes. He would force you to change your personal debit/credit card PIN number if he could somehow vaguely relate it to compromising the company security.

    Yes, everyone in the company hates him. Not because of the job he does but because he is generally a nasty person all together.

    1. Blade918rr

      Re: Words of Satan

      Maybe he pretends to be Nasty so that you remember what he says. Normally being nasty is the only way any one takes anything seriously (until the business is on its knees then everyone want to know what the security officer has to say). Security Pro's do not expect to be liked but are expected to secure the business.

      1. Ken Hagan Gold badge

        Re: Words of Satan

        You can turn that on its head. If you are just a nasty piece of work, become a security pro and no-one will ever know.

      2. Mike 16

        Re: Words of Satan

        -- being nasty is the only way any one takes anything seriously --

        Or you could try the approach of the IT manager at one place I worked. He was generally quite polite, but did have a concealed carry license and the .45 automatic pistol it applied to. And we all knew it. (also drove a Dodge Viper and wore cowboy boots, non-ironically). I later heard he went to work for MSFT.

  18. G*
    Megaphone

    Old news

    Amazing that no one seems to remember that this was advised 3 years ago by none other than GCHQ

    https://www.ncsc.gov.uk/blog-post/your-password-expiry-policy-may-have-reached-its-expiry-date

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like