Educause Security Discussion mailing list archives

Re: NIST SP 800-63B and Passwords


From: "Jones, Mark B" <Mark.B.Jones () UTH TMC EDU>
Date: Tue, 1 Aug 2017 18:59:23 +0000

I would agree except that ‘the ground has shifted under our feet’.  It is my opinion that no amount of complexity makes 
a password good.  It has become so easy to guess or phish passwords that single factor password authentication is only 
appropriate for protecting trivial resources.  Ideally, resources of any consequence should be protected by MFA.

If MFA is not implemented it may be prudent to forge ahead with complexity and expiration, but I believe it is time to 
unburden users with respect to complex passwords that frequently expire and shift to widespread use of MFA.

“Through 20 years of effort, we’ve successfully trained everyone to use passwords that are hard for humans to remember, 
but easy for computers to Guess”  xkcd: Password Strength (https://xkcd.com/936/)

From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Emery 
Rudolph
Sent: Tuesday, August 01, 2017 11:59 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] NIST SP 800-63B and Passwords

Good day everyone,

Please note that my comments do not reflect those of my institutions security office, but are instead my own.

I trust that many institutions follow NIST guidelines and rely on them for both general and specific guidance. I would 
still caution you to make your analysis based on multiple sources. The rationale that was noted within the NIST 
document referred to the need to memorize complex passwords resulting in poor behavior, such as writing or storing in 
an unsafe manner. To combat this behavior, the recommendation is to relax the complexity to allow the passwords to be 
more easily memorized.

This may hold true for users who only have 2-3 accounts to remember, but the reality is most people today have 
tens-hundreds of accounts. This means that even if you relax requirements, people will more than likely use the same 
password or iterate it by a digit. And the more accounts users have, it becomes inevitable that they will need to 
document their passwords regarless. Additionally, logic dictates that limiting password complexity severely decreases 
the attack vector requirements from bad actors, since they can now effectively eliminate an entire set of characters 
from candidate attacks. This becomes a more critical point when you consider that more attacks are coming from 
automated mechanisms using much more robust computing nodes. Without complexity involving special characters (including 
non-traditional ASCII), passwords will revert to standard or compound dictionary words, which are easily cracked. I 
would hope that we recognize this as a step backward.

I think that it is a good recommendation to use a common and regularly updated blacklist to challenge for weak 
passwords, but the recommendation to not periodically expire passwords is not good practice, because it does not take 
into account that password stores are handled or accessed by multiple people and code, thus there is always the 
possibility that such stores will be unintentionally (or intentionally) compromised. Changing/expiring passwords in a 
manner that is not inappropriately burdensome on the user community is a reasonable mitigation policy.

I believe that instead of focusing on relaxing complexity, standards organizations should continue to investigate, 
strategize and promote standards and recommendations for encrypted password stores. Ultimately, providing users with a 
way to efficiently and safely store passwords is the true answer to most complexity issues.

In summary, I like the fact that we are constantly investigating policy and evolving thought around technology, but I 
think that we have come to our current position on password security through decades of study and experience and any 
drastic changes that have the potential to circumvent security should be undertaken with extreme caution.


----------------
Very Best Regards,

Emery Rudolph
Director, PDAA
Division of Information Technology
University of Maryland
(301) 405-9379


On Mon, Jul 31, 2017 at 8:11 PM, Miguel Hernandez <miguel.hernandez () domail maricopa edu<mailto:miguel.hernandez () 
domail maricopa edu>> wrote:

Colleagues,


A question about the latest version of NIST SP 800-63B (Authentication and Lifecycle Management) 
(https://doi.org/10.6028/NIST.SP.800-63b<https://urldefense.proofpoint.com/v2/url?u=https-3A__doi.org_10.6028_NIST.SP.800-2D63b&d=DwMFaQ&c=6vgNTiRn9_pqCD9hKx9JgXN1VapJQ8JVoF8oWH1AgfQ&r=jgMu8DNgV_dycz0rYwkNbEQq36F0BI5_Zpblz7C5LhM&m=JZBCfNmmRN5nV99TveorJc7QNVO6_dJK0IXSts1xilA&s=C76oGQhd7fmUFT4DELVCLwFUsBQriQtOLXdmOiq-Eh4&e=>).


Since its release in June, not a week has gone by without a handful of IT folks stopping by and asking when we are 
going to (1) disable all password complexity requirements and (2) stop requiring periodic password changes.


As I’ve reviewed the NIST publication I note the two recommendations quoted below which has fueled the above questions:


“Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or 
prohibiting consecutively repeated characters) for memorized secrets.”


“Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically).“


So my question is: Do any of you have a sense of urgency to disable your password complexity checks and disable 
password expiration?  Is this something you plan to implement over time?  Will you create some relaxed version of your 
current password rules (for example, maybe require at least upper and lower case, and extend password expiration to 1 
year).  Or will you just continue with business as usual and make no changes.


The use of the word “SHOULD” is of course non-mandatory language and is only a recommendation.  There are some though 
who think these recommendations are actually requirements and must be implemented immediately.  I’d just like to get an 
idea of what my fellow higher-ed institutions are doing.

[eSig Logo]

Miguel Hernandez IV, Ph.D. CISSP, CISA
Associate Vice Chancellor ITS
Chief Information Security Officer
2411 West 14th Street, Tempe AZ 85281
email | miguel.hernandez () domail maricopa edu<mailto:miguel.hernandez () domail maricopa edu>
website | 
https://www.maricopa.edu<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.maricopa.edu_&d=DwMFaQ&c=6vgNTiRn9_pqCD9hKx9JgXN1VapJQ8JVoF8oWH1AgfQ&r=jgMu8DNgV_dycz0rYwkNbEQq36F0BI5_Zpblz7C5LhM&m=JZBCfNmmRN5nV99TveorJc7QNVO6_dJK0IXSts1xilA&s=98X3PWaUOcF3DfJyZQNmctkMbXB-PbXR7rqPSfJnyrk&e=>

Follow me on 
Twitter<https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_mh4phd&d=DwMFaQ&c=6vgNTiRn9_pqCD9hKx9JgXN1VapJQ8JVoF8oWH1AgfQ&r=jgMu8DNgV_dycz0rYwkNbEQq36F0BI5_Zpblz7C5LhM&m=JZBCfNmmRN5nV99TveorJc7QNVO6_dJK0IXSts1xilA&s=0JW2fwAu7hSokZaX0EzuGLHy07XDo_Nx4DzxKgIf0k8&e=>.

This message contains information which may be confidential and/or privileged. If you are not the intended recipient of 
this message, please notify the sender, delete and do not use or disseminate this information.


Current thread: