ad: TinyPaddle-1

How Strong is your Password?

Discussion in 'Amateur Radio News' started by AA7BQ, Apr 22, 2023.

ad: L-HROutlet
ad: l-rl
ad: L-MFJ
ad: Left-2
ad: Radclub22-2
ad: Left-3
ad: abrind-2
  1. NU4R

    NU4R XML Subscriber QRZ Page

    TWO FACTOR LOG IN! Code gets sent to my phone. If a web-site doesn't have 2 factor, I don't use it. End of story.
     
  2. KD2BBC

    KD2BBC QRZ Lifetime Member #587 Platinum Subscriber Life Member QRZ Page

    !lMp_2022

    this is much better

    lol

    I love my puppy 2022

    Need a password idea huh ?

    here is one

    5/9_73&Gud_Dx
     
    WQ1C likes this.
  3. K0DUC

    K0DUC Ham Member QRZ Page

    I never lock my car doors, because I live where crime is almost non existent, and I've locked myself out of my car many times. Sometimes the security features just get in the way. Had to pay a locksmith $80 one time to get back into my car, and learned my lesson to just never lock it ever again.

    I'm starting to get the same feeling about a lot of internet accounts. I've lost access to some of my accounts, like Facebook, because of implementing better passwords and not remembering the new fancy one, and having a computer crash and not able to use it to auto log back in. I'm better off with a simple password I remember rather than a 16 character security code that I won't be able to remember when I need it.

    Keys and complex passwords have never saved me once. But they have cost me and caused many problems many times.
     
    K4KYV likes this.
  4. AA3C

    AA3C XML Subscriber QRZ Page

    Exactly!
     
  5. AA3C

    AA3C XML Subscriber QRZ Page

    Unfortunately, too many places including most banks rely on SMS for verification. For the others that I care about, and have a choice of implementation, I use a Yubikey.
     
    Last edited: Apr 24, 2023
    PY2NEA likes this.
  6. KA1BSZ

    KA1BSZ Ham Member QRZ Page

    I use the words " PLEASEHACKMEYOUF^%$#GHACKERSLETSSEEIFYOUCANHACKMEYOUF$#%^&*9DUMBF#$KS" LOL...LMAO!....Actually, I did change my password, and glad I saw this article. My new password contains 30 characters. Thank you for the information!
     
    Last edited: Apr 24, 2023
  7. AD0LR

    AD0LR Ham Member QRZ Page

    No one has mentioned the best password:

    24446666688888888

    it is pronounced: one 2, three 4, five 6, seven 8

    LOL
     
    WZ7U likes this.
  8. KU4GW/SK2023

    KU4GW/SK2023 Ham Member QRZ Page

    My phone uses RCS messaging that digitally encrypts text messages between the phone and server, unlike SMS text messaging. Wouldn't that make it more secure as far as someone being able to get my MFA codes?
     
  9. KT1F

    KT1F Ham Member QRZ Page

    That only works if the hashes are not using salt. When salt is used, users with the same passwords do not have the same hash.

    MD5 has known vulnerabilities. There are better hash functions.

    I'm not arguing against good passwords but your description is a decade or two out of date. There is no excuse for a website today to be using unsalted MD5 hashes.
     
  10. NY4NC

    NY4NC XML Subscriber QRZ Page

    I like using KeePass or specifically for Linux, KeePassXC which is the current version. Since the password database resides on my equipment and not on the web, my passwords can't be hacked by some negligent employee of a cloud based password database. https://keepass.info/
     
  11. K2CAJ

    K2CAJ XML Subscriber QRZ Page

    True, but are we guaranteed that none of today's websites are using unsalted hashes?

    All you need is one site to be misconfigured w/o salt, and a dictionary attack will reveal the passwords used for that site --- and if users there have the same password for their email, they're toast.

    In addition, even with a salt, a compromise of a password file still allows a dictionary attack customized to that site's salt. That is much faster than trying to hack an individual's password, because hashing a large dictionary will simultaneously reveal any bad passwords of any users.

    Incidentally, the vulnerabilities of MD5 are not very relevant to its use for password hashes. MD5 has weaknesses that allow the construction of strong collisions, but collisions usually matter for other applications, like generating two messages with the same signature. MD5 is nevertheless deprecated on the common-sense principle that it's at least a little broken, and there are better hashes.
     
  12. K2CAJ

    K2CAJ XML Subscriber QRZ Page

    This is incredibly good advice.

    One of the big nightmare scenarios we face with passwords is someone using the same password for email that they use on another site. The other site is insecure, an attacker can get into your Gmail ... and then find all your other accounts and reset your passwords for them, through your email. You'll get reset alerts that are sent to your email, that the attacker can delete.

    All of that can be prevented by ensuring your passwords are unique to the site, and you don't need a complex scheme to accomplish that. A simple modifier raises your security a great deal.

    Speaking of which, if you ever find that one of your accounts to anything gets hacked, even something unimportant --- if someone took over a Facebook page you haven't used in years --- it's a good idea to change your email password. Even if your email password is unique. Why? Because you never know how an attacker got your Facebook password. There's always the possibility that they really got into your email, and used that to snag your Facebook page. Because access to your email is so dangerous, it's good to update the password whenever you see any sign of being hacked elsewhere.
     
  13. KT1F

    KT1F Ham Member QRZ Page

    Yes that's true so definitely don't use the same password on multiple sites. A good password manager seems to be the best solution.

    Every user should have different salt. It's just a random string that can be stored in their user record. That defeats searching for matching hashes.

    True.
     
  14. K2CAJ

    K2CAJ XML Subscriber QRZ Page

    You don't even need that: just including the username in the hash with the site-wide salt+password will prevent a simple dictionary attack.

    A salt doesn't need to be complex or hard to guess (it is assumed the attacker has it,) just unique, and the userID is already unique.
     
  15. WI9LL

    WI9LL Ham Member QRZ Page

    I had a password that was over 25 characters long with capitals, lower case, numbers, and symbols, AND had 2 factor authentication turned on. Someone still managed to get into my email account, filter out emails from Amazon, get into my Amazon account and make a large purchase while they email spam bombed me. I knew something was up with the thousands of emails I got in like 2 hours, but it took me a couple days to figure out what it was. I have checked all my machines for keyloggers but found nothing, and cannot figure out how they did my 2 factor authentication(it IS text message based). This is the only time I've ever really been taken with the exception of my WoW account being snagged back in the day by gold sellers. But I think that was just a weak password

    Side Note: Luckily Amazon caught it as fraudulent on their end and stopped shipment. They stopped shipment but wouldn't refund. Said I had to file with my bank for them to investigate and refund it. I thought it was odd that Amazon was able to instantly flag it as fraud, and stop shipment but refunding was out of their control. Had my bank not refunded the purchase, it's not Amazon would have sent me whatever the package was.
     

Share This Page

ad: QuirkyQRP-1