170 lines
14 KiB
Plaintext
170 lines
14 KiB
Plaintext
|
|
Episode: 4047
|
||
|
|
Title: HPR4047: Change your passwords once in a while
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr4047/hpr4047.mp3
|
||
|
|
Transcribed: 2025-10-25 18:59:42
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
This is Hacker Public Radio Episode 4,047 for Tuesday 6 February 2024.
|
||
|
|
Today's show is entitled, Change Your Passwords Once in a While.
|
||
|
|
It is hosted by Delta Ray and is about 16 minutes long.
|
||
|
|
It carries a clean flag.
|
||
|
|
The summary is, Delta Ray provides compelling arguments for why you should change your
|
||
|
|
passwords periodically.
|
||
|
|
Hi I'm Delta Ray and welcome to Hacker Public Radio.
|
||
|
|
Have you ever accidentally typed in your password into the username field and then pressed
|
||
|
|
enter and hope that nobody saw that or that it was logged in place?
|
||
|
|
I remember back in the 1990s, I was in a college class and a college professor did just
|
||
|
|
that.
|
||
|
|
They had their login screen on a Sun Solaris workstation projected over onto the screen
|
||
|
|
for the whole class to see and then they proceeded to type in their password into the username
|
||
|
|
field and everybody could see it.
|
||
|
|
I kind of looked around, see if anybody was writing this down or something.
|
||
|
|
I didn't write it down because I thought that was a bad mistake but you never know who
|
||
|
|
knows your password now or maybe you've gone to some free unencrypted hotel Wi-Fi at
|
||
|
|
a conference or at a hotel or maybe at a public park or something like that and then you
|
||
|
|
use that to type in your password to get back to some unencrypted HTTP website that you
|
||
|
|
run or something like that.
|
||
|
|
Change your passwords every once in a while.
|
||
|
|
I know that there's this nist recommendation that in the past would tell companies that
|
||
|
|
they should force their employees to make a password change every 90 days or whatever.
|
||
|
|
This isn't what I'm really talking about and so if your first instinct when I tell you
|
||
|
|
to change your password is to say, oh, that doesn't actually work.
|
||
|
|
Well, I'm not talking about a forced password change policy.
|
||
|
|
I'm talking about you personally in order to reduce the risk of your accounts being compromised.
|
||
|
|
You should consider changing your passwords maybe every couple years or once a year or
|
||
|
|
something.
|
||
|
|
If you find yourself saying, I like my password, I'm attached to it.
|
||
|
|
It's probably when it's time to change it because that kind of attitude leads to holding
|
||
|
|
on to that password for much longer than you need to.
|
||
|
|
As time goes by, your risk of your password being known through some means only increases.
|
||
|
|
Have you been using the same password for five years, 10 years, 15, 20 years?
|
||
|
|
Who knows?
|
||
|
|
Maybe 20 years ago, you picked a really strong password that has been able to meet the requirements.
|
||
|
|
That's great.
|
||
|
|
You're able to meet the requirements of what is a strong password and it's held up over
|
||
|
|
20 years.
|
||
|
|
There's a good chance that you've exposed that password somehow over the past 20 years,
|
||
|
|
whether it be system administrators, logging, clear text passwords for the purpose of debugging
|
||
|
|
and your password ending up in a log file somewhere or shoulder surfing or typing in
|
||
|
|
while there's surveillance cameras watching you and somebody behind the surveillance camera
|
||
|
|
can see what you're typing.
|
||
|
|
Maybe you got infected with malware and a keystroke logger recorded your password.
|
||
|
|
One of the more extreme pieces of research that was done was that some cybersecurity researchers
|
||
|
|
were able to do audio analysis of somebody typing and produce a list of likely candidates
|
||
|
|
for what you typed in based on the distance between keystrokes that were pressed and so on.
|
||
|
|
Maybe you've said your password in your sleep, especially if it's like a pass phrase,
|
||
|
|
you might have actually set it out loud and you just don't know it.
|
||
|
|
Or being able to guess it, somebody might be profiling you,
|
||
|
|
somebody might see what your personal interests are and maybe you like some sports team
|
||
|
|
or some soft drink or something like that and you work that into your password or your kids'
|
||
|
|
ages or all kinds of things that people use in their passwords.
|
||
|
|
There's a great Jimmy Kimmel episode where they interviewed people on the street
|
||
|
|
and they're able to basically get their password out of them just by asking them some personal
|
||
|
|
questions. But over time, there's the likelihood that you've exposed it just goes up.
|
||
|
|
In my own experience, I've been a system administrator since the 90s working at an internet
|
||
|
|
provider and running a web hosting company and working as a system man in other locations,
|
||
|
|
large enterprises and stuff like that. I've had people tell me their passwords just outright because
|
||
|
|
they're trying to be helpful in solving their problem. I've seen passwords. People accidentally
|
||
|
|
typing them into username fields and stuff like that. Or I've turned on clear text password logging
|
||
|
|
for the purpose of debugging one account, maybe just for a short time, but turning it off to afterwards
|
||
|
|
and then clearing the logs. But just to say that somebody just didn't just leave that on all the time.
|
||
|
|
You don't know. You don't know what the system administrators are doing where you're using services.
|
||
|
|
One of the biggest problems that people have is that they reuse their passwords in multiple
|
||
|
|
places. This is one of the number one reasons why accounts are compromised because
|
||
|
|
you maybe log into some tech forum someplace and you use the same password that you do for your
|
||
|
|
email or your bank account or your workstation at home or laptop. That forum got compromised
|
||
|
|
because they weren't that careful with the security at that forum. Maybe it was just some small
|
||
|
|
forum that was run by somebody who didn't have a lot of time to secure it. Then now the malicious
|
||
|
|
actors have a log of your password and maybe the forum even had a tie back to your email account
|
||
|
|
where you get your email normally and stuff. Over time, they might sit on those things for a long
|
||
|
|
time and then walk through all the security controls for online password protection just bypassing
|
||
|
|
them and getting into your account. 10 years later, you're like, how did they just get into my account?
|
||
|
|
Well, it's because they've been keeping track of all this stuff for years. There's a great website
|
||
|
|
called Have I Been Pawned by Tony Hunt that you can go there and you can type in your email address
|
||
|
|
and see if your account has been compromised someplace and where your password might be known
|
||
|
|
from various different data breaches that have happened over the years.
|
||
|
|
So, yeah, don't get too attached to your passwords. When they say choose a strong password and
|
||
|
|
they usually give you all these requirements, upper lower case letters, length, matters and so on,
|
||
|
|
you make a longer password. It's less likely to be guessed because they have to go through more
|
||
|
|
combinations to figure it out and doing that kind of brute force guessing is all about
|
||
|
|
getting a copy of the database and doing that attack offline instead of doing an online attack.
|
||
|
|
You know, it's like when you hear about people's passwords being compromised, there's a few
|
||
|
|
different ways that they might do it. If they have to try to do an online attack, of course,
|
||
|
|
they're going to, you know, like where they have to try to log into the service. Of course,
|
||
|
|
there's hopefully going to be controls in place that will make it so that they can only try so many
|
||
|
|
tries before they get blocked in the firewall or something like that. But an offline attack is where
|
||
|
|
they use some other vulnerability of the system to grab a copy of the database and then run a
|
||
|
|
brute force password guesser like John the Ripper or Hashcat or something like that against the
|
||
|
|
database, trying maybe millions or even billions of combinations per second to try to crack your
|
||
|
|
password. And that's more than you can hope to protect against. So you have to choose one that's
|
||
|
|
very strong and long. You know, I say at least 12 characters or more, but probably even 16
|
||
|
|
characters or more at this point. And the whole point of those requirements is really, and this
|
||
|
|
is what they don't really tell you, the whole point of strong passwords is to make it so that
|
||
|
|
the password is unguessable. That's it. You know, it's like not guessable by humans either by,
|
||
|
|
you know, them guessing what your password might be based on your interest or guessable by
|
||
|
|
computers just doing, you know, combinations or maybe guessable by AI trying to profile you and
|
||
|
|
doing combinations as a combination of tactics. But it's really about making it so it's not guessable.
|
||
|
|
And the reason why I say this is because you might say, well, I choose this passphrase that's
|
||
|
|
really long, but it turns out it's a quote from a movie, you know, or something like that. And so
|
||
|
|
it may be a 16 or 24 character passphrase, but it really is important that it's not guessable.
|
||
|
|
And so you, you know, maybe your best bet is to use what's called a dice where passphrase where you
|
||
|
|
choose four different words from the dictionary by rolling a dice and like choosing the page of
|
||
|
|
the dictionary or something like that can also use the look command where, you know, you can use
|
||
|
|
look and combination with grip and XRs to generate a dice where passphrase.
|
||
|
|
Yeah, I mean, come up with a dice where passphrase that way. You're not tying it to your personal
|
||
|
|
interests that way. It's not based on, for instance, things that are in front of you like, you know,
|
||
|
|
that you're reading off of or whatever that could later be determined and so on. And use a password
|
||
|
|
manager. This one is kind of a touchy subject for some people. A password manager, even though some
|
||
|
|
of them, you know, have had security problems over the years, is generally a better option than
|
||
|
|
just reusing the same password everywhere or using a weaker password everywhere. So find a trusted
|
||
|
|
vetted password manager, you know, there's like one password and bitward and in the past,
|
||
|
|
you know, last pass was considered really good, but they've done some stuff that over the years
|
||
|
|
has become more questionable. Initially, you know, it wasn't such a big deal for the URL to be known
|
||
|
|
and be unencrypted, but of course, they started back in the 2000s when before a time
|
||
|
|
that authentication tokens were showing up in URLs and stuff like that. And so that practice that
|
||
|
|
they had has over time become more questionable. But for a long time, last pass was doing things
|
||
|
|
the right way and was considered a safe option. But now, you know, things have kind of changed.
|
||
|
|
And I would caution you about just running away whenever there's a security problem in a
|
||
|
|
password manager. There's going to be security problems in password managers, but it's all about
|
||
|
|
were they doing the right thing and managing the way the binary blob of your passwords was being
|
||
|
|
handled? Are they responding to it well? Is the security vulnerability that came up? Is it really
|
||
|
|
affecting your password being seen in clear texts or not? If you, if we get into this habit of
|
||
|
|
running away from a password manager just because I had a security problem, we're going to run out
|
||
|
|
of good options for security managers for password managers because only so many people know how
|
||
|
|
to make them properly. Some companies, you know, they put the password on their end and they have a
|
||
|
|
key to it and stuff like that. That's no good. You don't want them to have a key to it. And there's
|
||
|
|
plenty of other articles and podcasts that talk about this thing. But what I'm here to say about it is
|
||
|
|
we can't just, you know, blindly run away every time there's a security problem with a password
|
||
|
|
manager because unlike a lot of airsoftware, there's it's hard, you know, it's hard to make a good one.
|
||
|
|
And there's only so many people who are going to make good ones. If we keep on running away from
|
||
|
|
ones that are good just because they have a security problem, we're going to run out of good options
|
||
|
|
because we're going to end up boycotting, you know, all the good ones or something. So don't just
|
||
|
|
quickly run away without really thinking about is this really a problem or, you know, is it just a
|
||
|
|
vulnerability that doesn't actually expose my credentials, you know, it's just like they had a
|
||
|
|
hack, sure, but it didn't really expose my credentials. And just to be safe, you know, you might
|
||
|
|
transfer, you know, change your master password on your, on your password manager or something.
|
||
|
|
And the other thing I recommend is don't click on the checkbox that says save your master password.
|
||
|
|
That's the one that you need to remember. Don't click on the checkbox that says save your master
|
||
|
|
password. You have to memorize that because when you do check on the box that says save your master
|
||
|
|
password, now you're putting your password database at risk by making it so that if somebody gets
|
||
|
|
access to your browser cache or your browser configuration, they might be able to just turn on
|
||
|
|
the password, you know, load up your browser and access your password manager database.
|
||
|
|
I've tested this before, like, with last pass and it actually worked. So don't do that. I wish
|
||
|
|
they wouldn't even put that there. And unfortunately, they probably get complaints from, you know,
|
||
|
|
users that say, why do you have to, you know, why do I have to memorize this master password? I
|
||
|
|
thought you were supposed to make this easier and stuff. And so then they change it. And then they
|
||
|
|
put this bad option in there. Also use two factor, you know, try to use two factor authentication
|
||
|
|
where you can. I know it's, it can be a pain sometimes, but it really is protecting you from
|
||
|
|
the pot, you know, it's reducing your risk of having your first factor password compromise
|
||
|
|
taking over your account. That doesn't mean that two factors are silver bullet. There are,
|
||
|
|
you know, ways that attackers are able to get around two factor by social engineering
|
||
|
|
attacks and so on. So you still have to be careful, but it's definitely a lot better than
|
||
|
|
not having it. And yeah, okay. So thanks and I'm curious to hear your comments and feedback about
|
||
|
|
this and change your passwords once in a while. Okay. Bye.
|
||
|
|
You have been listening to Hacker Public Radio at HackerPublicRadio.org. Today's show was
|
||
|
|
contributed by a HBR listener like yourself. If you ever thought of recording podcasts,
|
||
|
|
you click on our contribute link to find out how easy it really is. Hosting for HBR has been
|
||
|
|
kindly provided by an onsthost.com, the internet archive and our sings.net. On the Sadois status,
|
||
|
|
today's show is released on their creative commons, attribution 4.0 international license.
|