this post was submitted on 26 Sep 2024
91 points (100.0% liked)

Cybersecurity

5482 readers
64 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
top 8 comments
sorted by: hot top controversial new old
[–] linearchaos 39 points 1 week ago (2 children)

The latest NIST guidelines now state that:

Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords and
Verifiers and CSPs SHALL NOT require users to change passwords periodically. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
[–] halcyoncmdr 12 points 1 week ago

Makes sense. Most compromises aren't brute force attacks. Allow all the characters and any brute force that is attempted will have to assume they're part of it.

Removing required periodical changes means people are less likely to use the same password and just increment a number added to the end. A compromised password with a setup like that is still compromised, they can make an educated guess as to what the new number is based on when was compromised compared to now.

[–] [email protected] 7 points 1 week ago (2 children)

Please don’t take those recommendations out of context.

They also recommend MFA, but people only ever bring up the “no rotation” bit.

[–] [email protected] 5 points 1 week ago

Are they at least recommending non-SMS MFA now?

[–] linearchaos 4 points 1 week ago

Emphasis was from the article, not mine.

They also recommend not using knowledge based prompts, allowing at least 64: characters,

[–] AstridWipenaugh 18 points 1 week ago

This is the most excited I've been about a NIST standard in a good while

[–] [email protected] 13 points 1 week ago

My favorite error is "password is too long."

[–] [email protected] 3 points 1 week ago* (last edited 1 week ago)

NIST SP 800-63b already did that several years ago. People just need to follow it.