montebicyclelo 5 days ago

Forced password rotation and expiry seems the bigger problem; given that it causes people to get locked out so often, (e.g. if pw expires when on holiday), — often then requiring travelling to IT, or at least a few hours trying to get IT on the phone to reset, or chasing up colleagues who aren't locked out to get in touch with IT.

Many (most?) companies still do it, despite it now not being recommended by NIST:

> Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically)

https://pages.nist.gov/800-63-3/sp800-63b.html

Or by Microsoft

> Password expiration requirements do more harm than good...

https://learn.microsoft.com/en-us/microsoft-365/admin/misc/p...

But these don't seem to be authoritative enough for IT / security, (and there are still guidelines out there that do recommend the practice IIRC).

  • chillfox 4 days ago

    The requirements usually don’t come from IT.

    It’s usually on the checklist for some audit that the organisation wants because it lowers insurance premiums or credit card processing fees. In some cases it’s because an executive believes it will be good evidence for them having done everything right in case of a breach.

    Point being the people implementing it usually know it’s a bad idea and so do the people asking for it. But politics and incentives are aligned with it being safer for the individuals to go along with it.

    • BitwiseFool 4 days ago

      I belonged to an organization that had password complexity requirements. That's normal and understandable. However one requirement was that no part of my password could contain a three character subsstring that was included in my full name. I won't give my real name here, but sadly it includes some three letter subsequences that are somewhat common in many English words. I can understand a policy that prevents someone from using "matthew1234" as Matthew Smith's password, but this rule also prevents such a person from using "correcthorsebatterystaple" because it has 'att' in it.

      Turns out, this rule was not from IT. It was a requirement from the cybersecurity insurance policy the organization had taken.

      • lesuorac 4 days ago

        > Turns out, this rule was not from IT. It was a requirement from the cybersecurity insurance policy the organization had taken.

        I wonder if some of these constraints are to try to find a way not to pay out on the policy.

        • ang_cire 4 days ago

          It absolutely was/is.

          To bastardize Douglas Adams: For-profit insurance is a scam; breach insurance, doubly-so.

    • beaugunderson 3 days ago

      > Point being the people implementing it usually know it’s a bad idea and so do the people asking for it. But politics and incentives are aligned with it being safer for the individuals to go along with it.

      we've gone through HITRUST several times and I just told them we weren't going to do forced password rotation since NIST had updated their guidance. it was fine!

      and every time we get a vendor security questionnaire I just say "no, we don't do this because it's old guidance" and link to NIST... no one has ever complained.

      • throwaway1854 21 hours ago

        is a judge going to think the same way if insurance doesn't pay and you take them to court though, in the event of a breach, etc.

        After all it's perfectly possible to do interior work in your house that isn't up to code, but if it burns down in a fire, the insurance company will investigate and may not pay out if they find out.

        • beaugunderson 17 hours ago

          in this case I'd be more worried about being in court trying to explain why we knowingly used an inferior approach (forced password changes) when we knew the newer approach resulted in higher security... that is a vastly different analogy than being "out of code". additionally, noting the deviation from the old, less secure standard up front (in our HITRUST submissions) and with our customers (in their vendor questionnaires) provides evidence that we are going above and beyond vs. shirking a duty.

      • Perz1val a day ago

        Should you also question their competence? They should know, right?

        • beaugunderson 17 hours ago

          this is less about competence and more about update schedules... we happen to feel like it's worth incorporating guidance that's newer than what HITRUST or our customers require us to (though the guidance in question was updated by NIST eight years ago... sometimes it takes a long time for this stuff to change)

    • ToucanLoucan 4 days ago

      Just an unbreakable law of the universe.

      "Why did this stupid shit happen? Oh, it's money again."

      • ajmurmann 4 days ago

        It's not money but inertia of very large systems. All these password changes cost money as well. If anything it's a market failure that insurance companies seem to have too little incentive to update their security requirements. This would likely be solved by reducing friction with both evaluating insurers in detail and switching between them.

  • SAI_Peregrinus 5 days ago

    Does anyone not add the year & month of the last password change to the end of their password? E.g. PascalCasePassphraseGoesHere2025-06, then at the next required change in (for example) 6 months: PascalCasePassphraseGoesHere2026-01. It almost certainly fits the inane "letter, number, and special character" requirements they probably have, complies with "different from your last X passwords", and is easy to keep track of the change interval. It also adds no security whatsoever! A user could almost certainly get away with Password2025-06, etc.

    • pcardoso 4 days ago

      I once wrote a script to change my password randomly X times and then back to my original password. Worked like a charm.

      • claudex 4 days ago

        There are policies to prevent changing the password more than once a day to prevent that. I've encountered it in several places

      • HocusLocus 4 days ago

        Password changed.

        Password changed.

        Password changed.

        Error at : broken pipe

    • repeekad 5 days ago

      I’ve personally experienced the password change require that “more than X characters be different than the old password”

      • valleyer 4 days ago

        Um, that's a really bad sign...

      • [removed] 4 days ago
        [deleted]
    • deathanatos 5 days ago

      I just let the keyring roll a completely new password. For some reason, all of my employers do require this insanity, but not on the one password I have to actually type.

      • bisby 4 days ago

        I once had an employer that required us to use passworded SSH, and disallowed SSH keys, because they couldn't enforce that the SSH keys were passphrase protected, so just turned that option off.

        They said it was a PCI requirement, or something.

      • SAI_Peregrinus 4 days ago

        Whenever I don't have to type it, that's what I do. It's the login (or password manager password) needing this counterproductive crap that gets the "append a date" treatment. It's a 10-word diceware passphrase, only used for that login anyway, it's not getting breached if it's stored in even a remotely secure manner (even an unsalted hash would be safe).

      • delfinom 4 days ago

        They do it because their IT departments are checklist monkeys with no actual brainpower there, AND/OR they have cybersecurity insurers that mandate it who also have nobody with actual brainpower working there.

    • kelnos 2 days ago

      When I first set up an account at a new org or whatever, I don't think about the possibility of rotation later, but once I get my first "your password has expired and needs to be reset" message, I just add a counter to the end of the password that I increment each time I'm required to change it. Successive passwords have no less entropy than the original password, anyway.

      Fortunately, I haven't encountered a system that does a similarity check when changing the password.

      • [removed] 2 days ago
        [deleted]
  • lucideer 4 days ago

    > But these don't seem to be authoritative enough for IT / security,

    As someone who's worked for a cybersecurity team that was responsible for enforcing password rotations in a company, trust me when I say that nobody was more eager to ditch the requirement than we were. This is enforced by external PCI auditors & nobody else.

    Fwiw, PCI DSS 4.0 has slightly relaxed this requirement by allowing companies to opt-out of password rotation if they meet a set of other criteria, but individuals employed as auditors tend to be stuck in their ways & have proved slow to adapt the 4.x changes when performing their reviews. They've tended to push for rotation rather than bothered to evaluate the extra criteria.

  • asveikau 5 days ago

    Sometimes when I log into a random website and I see a forced password reset, I wonder if it has been compromised, rather than setting a time-based expiry.

    If a site owner knows that certain accounts are part of a database breach or something, a reasonable step would be to force the users to change the password at next login.

    • mooreds 5 days ago

      Another common reason to do a force password reset is if they've moved authentication providers and were not able to bring their hashes along. Some providers don't allow for hash export (Cognito, Entra).

      • account42 4 days ago

        Or just if they changed to a more secure hash algorithm themselves and want to upgrade users still on the older insecure one.

  • flerchin 5 days ago

    Last time I brought this to our cyber folks, they pointed out that PCI standards require password rotation. So it depends upon which auditors you care about more.

  • efitz 4 days ago

    I’ve always said “lockout turns a possible password guessing attack into a guaranteed denial-of-service attack”.

    Worse, it means that if an attacker can guess or otherwise obtain user names, the attacker needs nothing but network access to deny service to your users.

    My favorite example is the iOS policy where it added more and more time before the next login attempt was allowed; small children kept locking their parents out of iPads and iPhones for weeks or months.

  • brikym 4 days ago

    I think a lot of people in IT know these things but having a 'strict' auth policy makes them seem competent so they just go with that. Besides there is not much incentive to make authentication efficient since the frustrated users are a captive audience not paying customers.

  • ipython 4 days ago

    I just had this argument with a state wide government website. I have to log in to this site maybe once per year to update contact information and update a few fields. Unfortunately, that site silently deactivates your account automatically every 90 days. So I'm forced to change the password literally every time I log into the dumb thing.

    They refused to establish MFA or passkeys - and instead insist that "NIST is the minimum recommendation for cybersecurity... and we take cybersecurity very seriously... to ensure the safety and security of the citizens... therefore we will not change our policy on mandatory account lockouts or password change requirements."

  • thousand_nights 5 days ago

    if my password has not been leaked it's insane that providers think i should rotate it, but this still seems to be standard practice for some completely baffling reason

    • dcow 5 days ago

      There’s weird math that says your password or generally a secret key is more secure if it’s existed for less time (generated fresh) because there hasn’t been as much time to brute force it. I don’t believe it but some hardcore types do.

      • benlivengood 5 days ago

        That might apply to short passwords but passphrases are recommended and if they're >20 characters then brute forcing is not going to make meaningful progress toward them while we are all alive.

      • deathanatos 4 days ago

        > I don’t believe it but some hardcore types do.

        … which is why the password has sufficient entropy such that it will take until the heat death of the universe to brute force it. We're 3 months closer to the heat death of the universe … oh no?

      • efitz 4 days ago

        Time based expiry (“freshness”) is not about likelihood of brute force. Brute force prevention is handled by delay/lockout policy for online systems, and by password complexity rules or key length/cipher combinations. Nobody sane uses such rules in such a way that make brute force “slightly impractical”- security practitioners always choose lifetime-of-the-universe-scale complexity if given a choice.

        Instead, expiry is about “what are the chances that the secret has already leaked” and about choosing an acceptable compromise between rotation frequency and attacker loiter time - assuming that the system hasn’t been back doored, let’s put an upper limit on how long an attacker with the secret has access. And incidentally it also means that if you somehow fail to disable access for ex-employees, that lingering access will eventually take care of itself.

        But as the article points out, expiry has always been controversial and it’s not clear that on balance expiry is a good control.

      • fsckboy 5 days ago

        >I don’t believe it but

        you have to believe it, it's true, you just think it's not the greatest threat or that the response to mitigate it (for example, using a pattern of temporary passwords to facilitate remembering them) would be worse than the disease.

      • numpad0 4 days ago

        it's BSD /etc/passwd being 666 or something, so anyone could brute force it in 180 days, therefore passwords has to have max complexity within 8 bytes limitation and rotated every 180/2 days... who's even started using computers before it was patched?

  • vrighter 4 days ago

    Stuff like ISO27001 still demands it. We have to rotate passwords, against modern cybersecurity practice, in order to comply with an information security standard.

    • rjgray 4 days ago

      ISO 27001 doesn't say this. The control implementation guidance (ISO 27002) specifically cautions against requiring frequent password changes.

    • qualeed 4 days ago

      Most frameworks, at least most that I am aware of (north america) have removed password rotation requirements entirely, or have exemptions in place if you have MFA, use risk-based access policies, etc.

      Often when people say this, they are parroting their assessor. But not every assessor graduated at the top of their class, or cares to stay updated, or believes that they know better, etc.

  • BrandoElFollito 4 days ago

    These recommendations live in a mythical world, but not in a company.

    In a company, you have individual passwords known by many people. They are written here and there. They are passed to other orgs because something.

    In this ideal world of a non company, you have MFA everywhere, systems with great identity management wher you get bearers to access specific data, people using good passwords and whatnot.

    This is not true in a company. If this is true in yours, you are the lucky 1%, cheers (and I envy you).

    A good cybersecurity team will try to find reasonable solutions, a password rotation is one of them, in a despaired move to mitigate risks.

    And then you have trauma that will say "we cannot change the password because we don't know where it is used".

    Armchair cybersecurity experts should spend 24h with a company SOC to get an idea of the reality we live in.

  • paradox460 4 days ago

    IT seems to be a haven for minor dictators to enact their power fantasies

  • throwaway843 5 days ago

    1234abcd@ it is then for all my accounts.

    • xp84 5 days ago

      Password rotation does nothing more than get you to use

        1234abcd@
        1234abcd@1
        1234abcd@2
        1234abcd@3
      
      I'm becoming pretty convinced that at least in the corporate space, we'd be way better off with a required 30 character minimum password, with the only rules being against gross repetition or sequences. (no a * 30 or abcd...yz1234567890 ). Teach people to use passphrases and work on absolutely minimizing the number of times people need to type it by use of SSO, passkeys, and password managers. Have them write it on a paper and keep it in a safe for when they forget it.

      This is a better use of the finite practical appetite for complying with policies than the idiotic "forcibly change it every 90 days" + "Your 8 character password needs to have at least one number, one uppercase, and one of these specific 8 characters: `! @ # $ % ^ & *`"

      By the way, to quote Old Biff Tannen, "oh, you don't have a safe. GET A SAFE!"

      • tharkun__ 5 days ago

        Don't tell them. I don't want to have to enter 30 characters. And it does not help for the people you'd need it for anyway.

            1234567890a1234567890@1234567890
        
        Better?

        No, just longer to type. You can't fix stupid people by making the life of non-stupid people worse.

        All you do is for non-stupid people to stop caring and do the easiest thing possible too.

      • bigfatkitten 5 days ago

        In the corporate space you should move away from passwords entirely.

        Smart cards have had pretty solid ecosystem support for the past two decades thanks to the U.S. Government and HSPD-12, and now we’ve got technologies like webauthn that make passwordless authentication even easier.

      • osigurdson 5 days ago

        In the enterprise, the cost of inconvenience to users is effectively zero. Perhaps even negative as security theater can be a pretty effective way to convince management that something is being done.

      • eru 5 days ago

        There's one weird trick to get people to have strong passwords (even if you force rotation): don't allow them to pick their own passwords. Randomly generate the passwords for them.

        • pixl97 5 days ago

          Also don't allow them to copy paste the password. And especially don't allow them to use any kind of password wallet. They will really love you for this and you won't get an excessive number of calls to reset forgotten/lost passwords.

      • kobieps 5 days ago

        Preach. Gmail doesn't force password rotation, and one can just imagine the type of attacks they must sustain...

        Unfortunately corporate policies evolve at glacial speeds...

      • TZubiri 5 days ago

        "Your password is too similar to your previous password"

        Hmm, how would you know that.

      • Retric 5 days ago

        I’m doubtful a 30 digit minimum password is a meaningful improvement over a 20 digit password here. Meanwhile actually typing in very long passwords adds up across a workday/year especially with mistakes.

  • mx_03 4 days ago

    Bad habits are hard to kill.

    Sometimes you just cant convince people that something is no longer recommended.

    • viraptor 4 days ago

      You don't really need to convince people who implement it. You need to convince people creating certification/law, so PCI/SOC2/whatever. I'm still posting every time something like "for the record, I know we have to legally do this, but it's pointless and actually makes us less secure" for a few things.

  • b0a04gl 4 days ago

    been thinking same every time it asks me to reset without warning. i just assume breach and rotate everything linked to that email. if it’s not a breach and just some dumb policy, then congrats they made me waste 30mins securing nothing.

  • SpaceNoodled 4 days ago

    It honestly forces me to keep a Post-It on my monitor with a hint to this season's new password suffix.

  • olivermuty 4 days ago

    Most SOC2 vendors still require rotation, it is unbelieveably frustrating.

  • free652 5 days ago

    Jesus, it was so annoying so I kept appending a letter after each password reset -> a through z

    thankfully my current company let me keep my password for the last 3 years

    • sakesun 5 days ago

      Password similarity rule was not enforced ?

      • lytedev 5 days ago

        Doesn't enforcing this require storing the password in cleartext somewhere, which is a much more dangerous concept to begin with?

      • [removed] 5 days ago
        [deleted]
  • tzs 4 days ago

    > Forced password rotation and expiry seems the bigger problem; given that it causes people to get locked out so often, (e.g. if pw expires when on holiday), — often then requiring travelling to IT, or at least a few hours trying to get IT on the phone to reset, or chasing up colleagues who aren't locked out to get in touch with IT.

    That is extremely annoying.

    On the other hand if I was a manager and that happened to someone I managed we'd definitely have a conversation where I would acknowledge that forced password rotation is idiotic, but also point out that our password expiration is 90 days after the most recent change, which is 12 weeks and 6 days, and ask how come they don't have a "deal with stupid password expiration" event on their calendar set to repeat every 11 weeks?

    That gives them 13 days warning. Vacations can be longer than 13 days, but I'd expect that when people are scheduling vacations they would check their calendar and make arrangements to deal with any events that occur when they won't be available. In this case dealing with it would mean changing the password before their vacation starts.

    I don't expect people to go all in on some fancy "Getting Things Done" or similar system, but surely it is not unreasonable to expect people to use a simple calendar for things like this?

    • londons_explore 4 days ago

      The fact is that you might have an employee who is a real expert in 3rd century archaeology, but scheduling and password changes just aren't what they are here to do. They don't want to do it, don't know how to do it, and don't want to learn how to do it.

      • tzs 4 days ago

        So when they accept an invitation to give a lecture six months from now on the discoveries at the Gudme Hall Complex in Denmark how do they arrange to make sure they will show up?

  • Xss3 4 days ago

    Hot take, password requirements are a necessity to prevent id10t errors.

    Another hot take, calling them passwords instead of pass phrases was a mistake.

    People have no problem making a secure pass phrase like 'apophis is coming in 2029’.

    It uses special chars and numbers, but some websites would reject it for spaces and some for being too long.

    I say these are hot takes despite aligning with NIST because I've never seen a company align with them.

    • afiori 4 days ago

      "password too long" for password shorter than a megabyte is the most idiotic error ever created.

      It only makes sense in HTTP basicauth and other system that keep plaintext passwords.

princevegeta89 5 days ago

I hate Apple products for this. I see this pattern across all apple products - not one.

On my mac, I setup my touch ID, and log in to my Apple account on the App Store. Time and again, when I try to install apps, it keeps repeatedly prompting for my password, instead of letting me just use my touchID. This applies to free apps as well, which is again silly beyond what is already enough silliness.

I briefly see this on my spouse's iPhone as well. Almost felt like Apple hasn't changed a bit after all these years. It keeps fucking prompting for password over and over, randomly when installing apps. although the phone is secured with a touch ID. This happens especially when you reset the phone and starting from scratch - it keeps prompting for the Apple password again and again.

  • paxys 5 days ago

    And it's even worse if you are accessing Apple services on a non-Apple device. No matter how many times I click "trust device" when logging in to icloud.com it will still make me do the password + one-time code song and dance the next day.

    Another pointless annoyance - if Face ID fails when making a payment or installing an app (like it frequently does for reasons like sleeping in bed or wearing sunglasses) it won't fall back to PIN but ask you to enter your Apple account password. Why?? And of course when you're on that prompt there's no way to open your password manager without cancelling out of it entirely. Makes for a fun experience at the checkout counter...

    • whiplash451 5 days ago

      In 2025, I don’t think that accessing apple accounts on a non-apple device is a happy path for apple anymore.

      • apitman 5 days ago

        "Trust this device" is the modern day elevator door close button.

    • mlinhares 5 days ago

      Why in the world does it need you to type a code id you have already accepted it at the other device? This whole flow is stupid, I guess they want to cover their asses.

      • reddalo 5 days ago

        I agree with you, but it's the same reason why Microsoft asks you to type a numeric code generated by their Outlook app in order to login. It's to prevent people from dismissing the alert by clicking "OK" without even reading (especially if they're in the middle of something else, e.g. during a scam phone call).

      • felipeerias 5 days ago

        To prevent an attack where someone steals your username and password, triggers the 2-factor notification, and waits for you to accept it. This can be automated and repeated until you eventually click the wrong button for one reason or another.

        By requesting a short-lived code, attackers now need to communicate with you at the same time of the attack and somehow convince you to give them that code. Much harder.

      • munk-a 5 days ago

        It does also increase friction for non-first party applications and Apple has a strong history of using product design to discourage non-first party apps.

    • altairprime 5 days ago

      It often falls back to PIN if you retry faceid three times. But if the app is using faceid as a biometric second factor, in addition to or instead of as a password caching mechanism, then a device PIN is not biometric attestation and so it downgrades to full password.

    • thyristan 5 days ago

      Microsoft crap is similarly broken. After each and every login there is the question whether it should remember me and whether it should ask that question again. It doesn't matter at all what you answewr there, it changes absolutely nothing.

      • wycy 5 days ago

        I wonder how many millions of productivity hours have been lost due to millions of people having to click through these stupid, useless prompts countless times per day.

      • antod 5 days ago

        That is the single most useless dialog/question in IT. I wonder how much money that costs the global economy a year.

      • count 5 days ago

        Disable anti-tracking features and ad blocks, it turns out cookies and temp storage for ad tracking are how IDPs track your choice to trust the device too.

    • vachina 4 days ago

      Dismiss the password prompt and reinitiate the auth, FaceID will work again. I’m not sure why Apple doesn’t let us retry FaceID on the get go, but at least theres this method.

    • chrisweekly 5 days ago

      related pet peeve: faceid is often (but unpredictably) really slow - like, I'm looking at the phone and in a hurry and would prefer to enter my pin but touching the screen goes back to the lockscreen, and swiping up starts faceid again.

    • KennyBlanken 5 days ago

      > if Face ID fails when making a payment or installing an app (like it frequently does for reasons like sleeping in bed or wearing sunglasses) it won't fall back to PIN but ask you to enter your Apple account password.

      What? FaceID will prompt for a re-try. Always. It will never fail once and then refuse to do FaceID.

      If you can't figure out to lift the sunglasses off your face or sit up in bed for a second, that's not anyone's fault but your own.

      Also, FaceID will never fall back to your account password for Apple Wallet transactions with a physical credit card reader.

      • apenwarr 5 days ago

        You’re right except in the very specific case of the App Store purchase or download process. You only get one chance at FaceID and then it demands a password. But, if you cancel and do it again, you get another chance at FaceID. It’s mystifying why they’d make that UX choice.

  • sangeeth96 5 days ago

    Are you sure you have enabled TouchID for purchases (Settings > Touch ID & Password)? If you don't, I guess it might prompt for passwords. I just need to authenticate once on restart but can pretty much use TouchID almost all the time after that anywhere auth is expected.

    • crazygringo 5 days ago

      I have on mine, and yes it always prompts for a password anyways if I haven't used the App Store extremely recently (like within the past 24 hours).

      I'd assume it's a straight-up bug on Apple's part, but they haven't fixed it for years and years, so at this point I think they're just being sadistic.

      Because yes TouchID works everywhere else. This is App Store-specific. It's literally the only reason I keep a password manager app on my home screen, since it autofills everywhere else but not there so I have to always copy my Apple password manually from the password manager app.

      • dwaite 5 days ago

        Are you using a single Apple Account for both the primary account on device (iCloud, etc) and for iTunes? That is the other scenario where I see people hitting this.

      • sangeeth96 5 days ago

        Hmm, might be worth reporting if you haven't already. I just tried installing something with IAPs, which usually triggers the prompt. I had the option to use FaceID on my phone. I tried the same on macOS and I had the prompt to use TouchID. I'm on Tahoe beta right now but it worked the same even while on Sequoia. It's once in a blue moon I see the password prompt, not sure exactly what causes it to appear.

  • socalgal2 5 days ago

    Also, every time I plug my iPhone into my Mac for syncing it asks "Trust this Device" both the Mac and the iPhone. I click "yes" and yet it asks again next time.

    • grishka 5 days ago

      Remembering things reliably must be the most unsolvable problem in computer science.

      Unless it's related to advertising. Then it works flawlessly and sometimes survives device transfers and factory resets.

      • falcor84 5 days ago

        "The best minds of my generation are thinking about how to make people click ads."

        -Jeff Hammerbacher

      • duxup 5 days ago

        I feel like advertising relies on getting it right "enough" not for everyone and ... they don't care.

        Auth and settings people will tell you when it is wrong and that is generally thought of as a problem. Yet advertising doesn't care.

        For years Amazon kept showing me women's products. I never once bought any or looked them up but man they were sure I wanted to buy some.

        Google thought I was a Nebraska Cornhuskers fan but really I'm a fan of a rival, that's why I had to google a few things about them, but my old google news feed was sure I was a fan... even when they gave me a chance to say "no news about this team" they kept doing it ...

      • babypuncher 5 days ago

        I hate how in macOS, I can double click a window's title bar to maximize it, and five minutes later the original window size will be forgotten so you can't restore it.

        Windows 95 had this shit figured out on systems running a 486 and 6MB of RAM.

        • happymellon 5 days ago

          Not just the window size, but if you have more than one monitor, it won't always remember the screen.

          Oh, you double clicked to make it bigger? How about making it postage stamp sized in the bottom left of a different monitor...

    • daneel_w 5 days ago

      Help yourself to the system setting "Privacy & Security -> Allow accessories to connect". The sane default is "ask every time", and you probably want "ask for new accessories".

      • phire 5 days ago

        That stops the computer asking, but it doesn't stop the phone asking.

        Apple changed this a few years ago, because of a potential security venerability: https://imazing.com/blog/ios-backup-passcode-prompt

        • socalgal2 4 days ago

          It's a known solvable problem though. Both devices can exchange public keys and every time they're connected they can validate those keys with each other.

    • hamburglar 5 days ago

      It’s worse if you say no. It just keeps asking you. I don’t plug my phone into my Mac to charge it anymore. It’s just too annoying.

  • CamperBob2 5 days ago

    I'm not surprised that it occasionally prompts for a password (about once or twice a week for me), because otherwise people will forget their passwords and bug them about it.

    The problem I have is that it doesn't explain who wants the password or why, and the prompts aren't associated with any particular action on my part. Instead, Apple is conditioning people to mindlessly type in their password on demand. Why in the world are they doing a stupid, dangerous, counterproductive thing like that?

    • carlosjobim 5 days ago

      People are supposed to have extremely complicated passwords, which are impossible to remember. The security is in your biometric ID. There is no reason for a person to ever have to remember any password except their login password, as long as they are using a device with biometric ID. And as far as I know, almost all Apple devices currently for sale have biometric ID.

      iCloud is the only login that regularly breaks biometric ID functionality, and it's super annoying.

      • makeitdouble 5 days ago

        People are _required_ to have complicated passwords in most services.

        Yet they'll still make you type it out in so many situations, including on account creation confirmation where some service will even block copy/paste to push you to type it.

        Services will accept losing an user over password grating issues ("no compromise on security"), so it just gets worse and worse.

    • hamburglar 5 days ago

      Yes, it’s really bad for security. I just deny it if I don’t know what it’s for. I’m sure I’m missing out on some very important functionality.

      • CamperBob2 5 days ago

        My understanding is that iCloud backup requires it, among who-knows-what other things. So I've been reluctant to hit "Not now."

        I just have to trust their security model to not allow random apps to pop up and issue those prompts.

    • [removed] 5 days ago
      [deleted]
  • dcow 5 days ago

    Something is mis-configured. This isn't the default experience. TouchID works just fine for AppStore purchases.

  • sircastor 5 days ago

    I have a very old iPad that my kid uses. It’s stuck to iOS 10.3. Also, it can’t use my password manager. The browser is so old that the website won’t load (32-bit app). And the PW manager app isn’t made for this old a device.

    So Apple wants me to type in my 50+ character password every time I use the App Store app. It’s such a pain.

    • paxys 5 days ago

      If it helps there's no security advantage of a 50+ character password over a suitable 16 character one.

      • mbreese 5 days ago

        Yeah, but passphrases don’t require switching keyboards as often in mobile. And if you’re using a 16 character P@s5w0R6, a 50 character passphrase can be just as secure.

        What I can’t stand if when I’m prompted to type a password on my Apple TV and can’t use my phone for some reason. Scrolling across the alphabet for a passphrase is torture.

        • happymellon 5 days ago

          My work switched our passwords from minimum 8 digits of upper, lower, numeric and special (requires all 3 present) to a passphrase.

          Now its 21 minimum but requires upper, lower and numeric. I guess at least I don't have to stick an exclamation on the end.

      • mikepurvis 5 days ago

        Remember how 1Password used to install itself as a custom keyboard that could "type" your passwords into arbitrary text fields anywhere in the OS, before password management specific hooks were added?

        It would be nifty if your phone could just connect to other devices as a BT keyboard and type in passwords there too. Probably not worth the actual fuss of pairing a BT device, but if that part were not so painful it could be quite a nice solution.

    • Xevion 5 days ago

      Then why'd you pick a 50+ character password? No one made you do that. That's your fault, not Apple's.

      - As you said, it's a multi-platform account, so probably multiple devices in multiple locations will need the password. Meaning you won't have easy access to your password manager. - Popular account, so you'll likely be using it often, probably re-typing or pasting it.

      Common sense says that manually typing out a password was a likely scenario.

      Switch to a phrase-based password. It'll still be really secure, and you'll be freed from your self-inflicted woes.

      • crazygringo 5 days ago

        > Switch to a phrase-based password.

        I assume that's why it's 50+ characters long, as opposed to 20 gibberish characters. Because phrase-based passwords are longer. And whether it's 40 or 50 or 50+ doesn't even matter, the point is it's not short like a 6-digit PIN.

        I have the exact same problem. It's still incredibly annoying to type on a touchscreen keyboard. If you mistype one character...

        So no, it's not the commenter's fault. And it's certainly not mine. I'm doing the best with the tools I have available. It's Apple's fault, mainly.

  • Terretta 4 days ago

    This is not Apple's intended default behavior.

    The various stores use their own biometric auth (the abstraction over touch ID and face ID) settings, which can cause this based on user config, particularly if you're using family accounts of any kind.

    The most likely issue is one of these is set to ask every time as many families that share devices with kids consider that a feature, not a bug.

    If all possible places are set to accept biometric ID (there's always one more setting than you think to check), it can be something about your network or device itself, particularly if for some reason you show up as if rotating through random geographies or from "unknown" devices.

    Modern-ish auth systems (e.g., authentication mechanisms for Google, Microsoft, and Apple) also have a "risk based authentication" ratchet that re-prompts if enough data points are abnormal. Depending on your level of access to admin panels, you may be able to identify what is flagging to re-prompt.

    Usually this sort of thing can be traced to something like a per-request VPN with no geographic affinity option, or an ISP (especially mobile ISP) that exits you from random cities across border lines.

  • NL807 5 days ago

    I don't have a problem with reauth if the action(s) in question requires a sudo-like operation with a time-out window. It's just a matter of grouping such actions together in manner that requires the least amount of reauth prompts.

  • SchemaLoad 5 days ago

    At least for Apple I can see this being a way to avoid account lock out. Your Apple ID password would otherwise almost never be used so when people finally go to factory reset their device or something they would realise they long since forgot their password and now have an expensive brick.

  • duxup 5 days ago

    Is this for a particular situation(s)?

    I do not run into this at all across my apple products.

  • nofunsir 4 days ago

    It literally is Jennifer Lawrence's fault. No joke.

    Same with the forced emails you get ANYTIME you login to iCloud via web.

  • everforward 5 days ago

    I think free apps are still scrutinized because they don’t want attackers to install known-compromised apps or trackers. Like a controlling spouse sneakily face IDing a sketchier Life360 while “making a phone call”.

    Could be wrong, but that’s the only thing I can think of.

    • xp84 5 days ago

      For sure. They don't really need to protect your credit card in that way, since if a silly kid bought $300 worth of Super Gems or installed a paid app (are there even any normal paid apps now?) Apple has full control, if you call support, to just say "nope" and take the money back and refund you. But sneaking any random app onto the phone of someone else for nefarious reasons is something Apple is super paranoid about.

      Which is also why I will get random popups every few weeks for the rest of my life saying things like "Google Maps has been using your location for 179 days." with a "scary" little map of where I've been. No amount of saying "yes, i meant to do that" can convince Apple that it's intentional.

  • xp84 5 days ago

    Indeed. And I have several Apple mobile devices around the house that just decide they need the password entered just for general reasons, without any specific triggering action! And those pop up modal dialogs in front of what you're doing (super dangerously, as that teaches users that it's plausible that they might be on the Web, and get a popup asking them to enter a password, that they should click on to lead them to a password-entering place!)

    The Mac pops those up too, now. Utter insanity.

  • closeparen 4 days ago

    The extreme security of iCloud accounts is good, given that iMessage, photos, etc. are all in there. The need to re-authenticate your iCloud account to purchase $0.99 app is eyebrow-raising but understandable. But the need to 2FA to download a free app is insane.

  • b0a04gl 4 days ago

    apple’s auth team optimises for their own paranoia, not the user’s threat model. i’m sitting there trying to install a damn app, and the system treats me like an intruder on my own phone. if the goal is friction, mission accomplished. but if it’s trust and safety, they lost me at the 7th password prompt

  • daneel_w 5 days ago

    I wonder if what you're seeing is geographic. I'm in Scandinavia and authentication lasts a decent while for me, with strict settings. I tried a few things with my SO's iPhone and iPad and they behaved the same.

  • 1oooqooq 3 days ago

    this is only because of all the lawsuits about apple store chargebacks because they allowed kids to make purchases.

    article is shot Enterprise software and you're talking about games and predatory dark patterns in consumer devices. or do you company distribute software to employees via app store?

  • ValleZ 5 days ago

    It's because an average Apple engineer has to enter his password at least 10 times a day and it's kind of no big deal for them. Source: I was an Apple eng.

  • Wowfunhappy 5 days ago

    The really annoying thing is that when I purchase an app on my watch, it makes me type the password on my watch...

    How is this a thing?!

  • MBCook 5 days ago

    Really? I never have to re-auth unless I get a new device.

    • quesera 5 days ago

      Same behavior here.

      I use TouchID to log in several times per day, and am required to enter a password "to enable TouchID" about once per week. iOS and macOS both.

      This feels reasonable to me.

      • ziml77 5 days ago

        It's annoying to ever have to enter a password manually, but it does make sense every 1 or 2 weeks to force it. Not even as a security thing but as a memory thing. It's incredible how something that you seem to know so well can get flushed from your memory after you stop recalling that knowledge regularly.

        • quesera 5 days ago

          Exactly. I have enabled TouchID for a couple of banking apps, and I am dreading the likely need for the password reset dance when the time comes (it's been years).

          I use a password manager, but I've always kept the actually important passwords in wet memory only. When I used the web interface regularly, that was not a problem. However... :-/

  • out-of-ideas 5 days ago

    > it keeps prompting for the Apple password again and again

    pro tip (for mac desktop, not iphone): drag the dumb prompt off to the edge of the screen ( i drag from top left of the window and drop it to the bottom right of the monitor )

    it will not give a 2nd prompt if the first prompt is closed

    => i do this specifically when the 'apple accounts' crap has some issue and forever prompts me to re-login.

    edit: clearification

  • mountainriver 5 days ago

    I have to change my apple password every single time I need to download an app.

    It seems like insane friction for something that is making them a lot of money

    • croemer 5 days ago

      Same. And annoyingly you're not allowed to reuse old passwords, so you have to keep inventing (and remembering) new ones.

  • grishka 5 days ago

    Also, on both macOS and Android, there's a time component to device unlocking. You would sometimes get this stupid "your password is required to enable touch ID" or "extra security required, pattern not used in a while" thing with no way to disable it. It's beyond infuriating to me. It's my device. It should not tell me what to do. I get to tell it what to do and it obeys, unquestionably. I'll evaluate my own risks, thank you very much.

    • 1718627440 5 days ago

      > macOS and Android

      > It's my device.

      There is your dissonance.

    • yard2010 5 days ago

      This is just enshitification in a mask. Next thing you know, guess what? Your device is not yours, you just rent it from the feudal.

twodave 5 days ago

The people who need to read these articles are the auditors. Until they change their expectations, the many businesses who have to pass audits are still going to be stuck doing a lot of things that are industry-standard but also very stupid. This is the case even for small businesses in certain fields where security audits are valued. We have at least half a dozen measures in place that we know aren't actually helpful but we also know auditors won't budge on right now.

  • smallerfish 5 days ago

    I've been pushing NIST on SOC2 auditors for years. They always accept it once given a link.

    • ShakataGaNai 4 days ago

      Makes sense. The thing people forget about SOC2 is that it's very not-technical and very much so written by CPA's. No two SOC2's are identical. Hell the same companies SOC2 done by different auditors will be different.

      Saying "The United States of America National Institute of Standards and Technology says X on page 423 of Special Publication 800-53 revision 5" is a really awesome "We're doing things the RIGHT way".

    • notTooFarGone 4 days ago

      Yes, it's this rolling on your back and preemptively trying to cover all eventualities that does stuff like this.

      It seems like none wants to actually justify their decisions to auditors as its more time critical when the audit happens.

      • HauntedKiwi 4 days ago

        If only everyone involved with security compliance could learn the lesson that John learned in The Phoenix Project, developers and ops folks would experience a lot less pressure to treat the pantry like Fort Knox. There is not only evidence that goes against the expectations of many auditors, but there's also no requirement that compliance of everything be implemented through costly software and network changes, because physical security and process can be used for compliance as well.

  • mooreds 5 days ago

    The auditors aren't writing the compliance guidelines, are they? Just enforcing them.

    I'd say you want to send these articles to the people writing such guidelines.

    What am I missing?

    • twodave 4 days ago

      No, you’re right. Though I think there’s definitely a gap between standards bodies like NIST and the AICPA or whoever sets the SOC2 standards these days. I think some of the answer is just momentum. Customers have come to expect it of their vendors, specifically because it is security theatre, something they can point to if anything goes wrong.

      • mooreds 4 days ago

        > because it is security theatre, something they can point to if anything goes wrong.

        Yeah, there is space between "this is a good practice and it's nice to be able to check the box" and "this is a standard someone else dictated but it will cover my butt if anything happens" unfortunately.

        I get it, I depend on standards all the time (food safety, equipment certification) so I understand the desire, but darn it's frustrating when they are viewed as a cure-all.

  • dstroot 5 days ago

    Came here to say this, upvoted. Both Apple and Microsoft have "corporate IT" settings that can be used to turn off "trust my device", "remember me", etc. Auditors and CISO offices tend to lean in on checklist security - in other words it doesn't matter if it's actually more secure, it only matters that it passes the checklist audit. Many of the settings are user hostile and incentivize users to work around them. Making real security worse of course...

    • Henchman21 5 days ago

      I’m not sure how one changes the mind of auditors who are just there for a job and who aren’t actually interested in the field? IME, the only auditors who are knowledgeable are those overseeing the folks with checklists — and they rarely seem to have the time to correct the folks they’re overseeing.

      • twodave 5 days ago

        Customers need to ask for these changes, which is why this is hard to solve. At least in my field, many of the measures we end up having to fall in line with are the result of our customers deciding that those who bid on their contracts must have these certain credentials. If those same customers had more competent decision-makers determining technical qualifications then this would be less of an issue. Unfortunately, that also means that we will be stuck with these audits in their current form until the vast majority of our customers first decide they’re not needed.

      • nightpool 5 days ago

        Stop paying them, I guess, and find a different audit firm that's more knowledgeable. Just like anything else—you get the level of competence you pay for. (Although I guess there's probably a "sweet spot" at which you can pay less AND get better first-level auditors if you're not looking at the biggest firms that are going to charge the most money and also have the most churn)

      • immibis 5 days ago

        In a free market, you don't - you start your own company that doesn't waste half of everyone's time on security, and do stuff twice as efficiently, for half the price and outcompete the other one.

        Then you get outcompeted by a company with no security at all, which is twice as efficient as you until they get hacked.

    • rainsford 5 days ago

      It seems like the problem here isn't the use of checklists, it's that the checklists in question contain questionable stuff like "enforce frequent reauth". Systematically checking for the presence of good things and the absence of bad things seems like a good idea both from a security and consistency perspective. Of course the trick is making sure your "good" and "bad" lists are well thought out and appropriately applied.

aljgz 5 days ago

Something related that's barely touched in the post:

Bad UX is potential security vulnerability. If your system behaves in unreasonable ways, users are much less likely to notice when it behaves in a slightly different unreasonable way, this time because of a spoofing/phishing, etc.

The obvious example: if your system frequently asks for passwords, re-entering passwords becomes a habit (read system one from "thinking fast and slow"), and the user is less likely to use judgement each time they enter the password.

But also, if an OS makes it hard to find all startup applications, allows untrusted code to run in the background without any visible signs, allows terminal code to access all local files by default, etc etc these all can be abused.

One problem is that human psychology is rarely considered as important a factor as it should be by the average security expert. The other is the usual suspect: incentives. The right chain of responsibilities is missing when things go wrong for people because of mistakes that would be avoidable by proper product design.

Regulation should enforce that, but while everyone would benefit from regulation, no one likes the regulation that will regulate the product/services they offer, and the supplier has upper hand when a change in regulation is being considered because they are focused and motivated.

  • benrutter 4 days ago

    This is a great take! Similarly, I've seen shadow IT and sneaky work around type stuff crop up a lot before because the "official" way of doing something has picked up too much friction.