The Mercury News

Ditch that password in favor of a ‘passphrase’

- Larry Magid

There has been some rethinking among security experts over what constitute­s a good password and how often — if ever — you should change your passwords. Even the word “password” is being morphed into “passphrase.”

Experts have always agreed that it’s a bad idea to use a simple password like “password” or the name of your dog, and that you should avoid using the same password on multiple sites. Simple passwords — especially dictionary words — are easy for hackers and machines to guess and if you use the same password on different sites, a hack of one site could make all your other sites vulnerable.

There is also a longheld consensus that longer is better. Many sites require your password to be at least 8 characters long, but now many experts are saying it should be much longer.

Most experts also agree that it’s a good idea to include symbols along with at least one or two uppercase letters and a number or two. But, the FBI’S Oregon Field Office recently posted advice that suggests you use a passphrase instead of a password. Though their advice didn’t say that you should necessaril­y include symbols or numbers, I still think that’s generally a good idea.

Those smart enough to avoid simple passwords would often come up with complex ones but those can be hard to remember and, unless they’re long, they’re not necessaril­y as secure as you might hope. The current thinking from government security experts is that length is more important than complexity.

There was a time when people were advised to change their passwords every six months or so, but if you follow the advice below, the common consensus is that you don’t need to do that unless one of your sites was breached.

The Oregon FBI’S examples (please don’t use these verbatim) include a phrase such as “Voicesprot­ected2020w­eare” or “even better,” a passphrase that combines multiple unrelated words, such as “Directormo­nthlearntr­uck.”

One thing they didn’t say was how you might vary this passphrase so that you could use a version of it on multiple sites. My recommenda­tion is to add a string of characters that are unique to each site or app. I won’t suggest examples, but figure out a way to scramble the spelling of the name (or a portion of it) to add to the passphrase so that if a person or machine does get one of your passphrase­s, they can’t get into all of your accounts.

The FBI’S suggestion­s are based on advice from the National Institute of Standards

and Technology, which in a long and rather technical post aimed at people who develop password verificati­on schemes, outlined some of the concerns with previous password recommenda­tions.

For example, it’s long been assumed that your passwords be complex and hard to guess. While being hard to guess is a good recommenda­tion, a single password that is hard to guess might also be hard to remember, or, if it contains special characters, might be rejected by some sites.

“Users also express frustratio­n when attempts to create complex passwords are rejected by online services. Many services reject passwords with spaces and various special characters,” the report said.

The rejection of some special characters is a pet peeve of mine. I use a certain symbol in some of my passwords and while most sites accept that symbol, there is one I use that doesn’t. Many sites don’t accept spaces that would make sense to use in a phrase, though I don’t have much problem simply using the words in the phrase and leaving out the spaces.

Advice for site operators

Both NIST and the FBI have advice for site and app operators, urging them to accept longer passphrase­s with whatever characters the user wants to include.

NIST rather firmly recommends that verificati­on systems “SHALL require subscriber­chosen memorized secrets to be at least 8 characters in length. Verifiers SHOULD permit subscriber-chosen memorized secrets at least 64 characters in length.” And, based on NIST’S recommenda­tions, the Oregon FBI suggests that site and app operators require everyone to use longer passwords or passphrase­s of 15 or more characters without requiring uppercase, lowercase or special characters. NIST also suggests that operators only require password changes when there’s a reason to believe their network has been compromise­d. They advise that services don’t lock a user’s account after a certain number of incorrect login attempts and that they don’t allow password hints. This advice is all new and at least partially contrary to the way most sites currently operate.

Other forms of protection

In addition to strong, long and unique passphrase­s, another protection is dual-factor authentica­tion such as having to enter a code sent to your phone via SMS (or email in some cases) if you try to access a site from a device or browser that you haven’t used before. This isn’t perfect, but it does offer protection if someone else tries to get into your account because, chances are, they won’t have access to your device or email to be able to retrieve that code. Many financial institutio­ns require you to use dual factor authentica­tion and many sites and apps, including those operated by Google, Facebook, Twitter, Apple and Microsoft, make it optional.

Another tool is a password manager like Lastpass or Roboform, which store your passwords and enter them for you. I use one and think they’re great. But as the Oregon FBI points out, “The downside of using a password keeper program is that if an attacker cracks your vault password, then he or she knows all of your passwords for all of your accounts.” Still, the FBI points out that “many IT profession­als agree, the benefit of a password keeper program far outweighs this risk.” If you use a password manager, make sure that it has a very secure passphrase that you can remember.

Perhaps the best level of protection, though not necessaril­y convenient in all cases, is a physical key such as the Yubikey from Yubico. This is a small device that you can put on a keychain and insert into the USB port of a computer or data/charging port of a phone to verify your identity. Not all sites and apps work with Yubikey but a growing number do. Keys vary in price depending on the device they’re used for, ranging between $20 and $69.

Finally, consider biometrics. Many phones and computers allow you to use a fingerprin­t or facial recognitio­n to access your device along with an optional password or PIN. Most Windows computers, for example, have built-in cameras that can recognize your face. While no form of protection is foolproof, biometrics are quite secure and usually very convenient. There are times when my Windows PC fails to recognize my face, so I type in my PIN or password, but for the most part, it knows who I am and welcomes me in when I smile at the camera.

 ??  ??

Newspapers in English

Newspapers from United States