by bigsassy on 10/23/15, 3:42 PM with 74 comments
by ph0rque on 10/23/15, 4:45 PM
This is my biggest pet peeve. Actually, my second-biggest. My biggest is when registration silently fails because the password was too long.
by aclissold on 10/23/15, 4:22 PM
Relegating you to use a password manager anyway, at which point you might as well just generate random passwords that don't rely on dictionaries?
by 100k on 10/23/15, 4:09 PM
by thinkmoore on 10/23/15, 4:15 PM
Uh...
They went through all the trouble of making a website. Maybe use https and just show me the password on the website?
by ChuckMcM on 10/23/15, 3:50 PM
by ColinDabritz on 10/23/15, 3:55 PM
The phrasing of the title made me think of an Onion article along the lines of: They found the perfect password, it's '42Lemons?' and everyone should use it!
What they found is an excellent password scheme for humans.
by dogma1138 on 10/23/15, 4:52 PM
What people don't realize that professionals who crack passwords for a living use quite sophisticated techniques using known information about the target, common masks, and patterns makes cracking specific passwords easier than just bruteforcing them.
If you use a 300K words dictionary and know or can assume that the paraphrase will be constructed out of 3-5 words the password entropy isn't as large as just thinking this is a single case or mixed case alpha with say 12-16 characters.
When dealing with generic password your basic unit is a character so a 16 char password is made out of 16 units each of those has a specific search space single case alpha it's 26, mixed alpha it's 52, single alpha numeric it's 36 and so on.
Here you have 3-4 units each has a fixed search space and that's the dictionary you use, the search space can be even more restricted if we can assume certain things about the algorithm that generated the passphrase.
If we take the poem example we can assume that words will not appear more than once in the passphrase and that they might need to rhyme this alone can reduce the password entropy considerably.
If we take other examples like story based passphrases e.g. "the quick brown fox jumps over the lazy dog" then we can base our assumptions based on what we know of the English language for example that words like "the" will appear at least once in such sentences as well as take some estimates about how many verbs, nouns, and pronouns will appear on average in each sentence based on their common distribution which allows you again to reduce the search space considerably.
Passphreases are still great when you need to ensure that your passwords won't be broken in bulk when a breach happens because unless your account is admin@ijustgothacked.com you most likely won't be a target and those types of datadumps are still usually broken through basic dictionary, masked and cheap bruteforce attacks.
If you might be targeted directly or phished than passphrases might not offer any sufficient level of protection and could actually be weaker than an annoying mixed-alpha-num-special password.
That of-course will change if everyone will start using passphrases if you expect that 50% of your hashed passwords dump is passphrases you will adapt your password cracking techniques accordingly.
by jobu on 10/23/15, 4:19 PM
by LoSboccacc on 10/23/15, 4:10 PM
I think we should held a competition to find out how old this tibit of knowledge really is and also the oldest article about security experts demonstrating passphrases are wide open to dictionary attacks.
1982 reference on passphrases http://www.sciencedirect.com/science/article/pii/01674048829...
by codemac on 10/23/15, 4:08 PM
Once you see them as tokens that 3rd parties will probably lose, then you know our efforts should be in secure token management software (keepass, lastpass, 1password, etc).
by kisstheblade on 10/23/15, 4:28 PM
Eg 10000^4 or even 1000^4 (for those types who would use "password" otherwise)? Isn't that quite bad or am I understandig something incorrectly?
by kristopolous on 10/23/15, 4:27 PM
by zeveb on 10/23/15, 4:48 PM
by samstave on 10/23/15, 4:38 PM
FeetFourMonkey
by syoc on 10/23/15, 4:43 PM