d4mi3n 5 days ago

Frequent reauth doesn't meaningfully improve your security posture (unless you have a very, very long expiry), but any auth system worth it's salt should have the capability to revoke a session, either via expiry or by user/device.

In practice, I find that the latency between when you want to revoke a session to when that session no longer has access to anything is more important than how often you force reauthentication. This gets particularly thorny depending on your auth scheme and how many moving parts you have in your architecture.

  • antihero 5 days ago

    This is why you have refresh tokens - your actual token expires regularly, but the client has a token that allows you to get a new one. Revoking is a case of not allowing them to get a new one.

    • ars 5 days ago

      You only have to do that if you must validate a token, without having access to session data.

      I doubt most systems are like that, you can just use what you call "your actual token" and check if the session is still valid. Adding a second token is rarely needed unless you have disconnected systems that can't see session data.

      • fastball 4 days ago

        Not having to start all my API handlers with a call to the DB to check token validity significantly improves speed for endpoints that don't need the SQL db for anything else, and reduces the load on my SQL db at the same time.

    • d4mi3n 5 days ago

      This is an implementation detail in my opinion. There are cases where having the capability to force a refresh is desired. There are also cases where you want to be able to lock out a specific session/user/device. YMMV, do what makes sense for your business/context/threat model.

      • SOLAR_FIELDS 5 days ago

        It is, but its an architectural decision that forces expiry by default. So you should probably even have both. AWS runs 12 hour session tokens, but you can still revoke those to address a compromise in that 12 hour gap. The nice thing that forced expiry does is you just get token revocation For Free by virtue of not allowing renewal

    • kevincox 4 days ago

      This is really just an optimization. It means that you don't need to do an expiry check on the regular token, only on the refresh token. It doesn't change the fact that you should be able to revoke a session before it naturally expires.

      • catlifeonmars 4 days ago

        Having a short session expiry is a workaround for not being able to revoke a token in real time. This is really the fault of stateless auth protocols (like OAuth) which do offline authentication by design. This allows authentication to scale in federated identity contexts.

      • antihero 4 days ago

        Yeah but depending on how you set it up, you could have a very short expiry. If your auth system is as simple as: Verify refresh token -> Check a fast datastore to see if revoked -> Generate new auth token, this is very easy to scale and and you could have millions of users refreshing with high regularity (<10s) at low cost, without impacting on your actual services (who can verify the auth token offline).

        Say you had 1,000,000 users, and they checked every ten seconds, that's 100,000 requests per-second. If you have 1,000,000 users and can't afford to run a redis/api that can handle an O(1) lookup with decode/sign that can handle that level of traffic, you have operational issues ;)

        It's all a tradeoff. Yes, it means some user may have a valid token for ten more seconds than they should, but this should be factored into how you manage risk and trust in your org.

    • kevin_thibedeau 5 days ago

      That's a great way to interfere with local work when the network goes down.

      • freedomben 5 days ago

        If you've built a local app that has to authenticate you against a remote web service even when offline, and all the actual work is being done locally, you have much bigger design issues than authn IMHO

      • rafaelmn 5 days ago

        Access tokens are used for network calls so if the network is down nothing works anyway ?

  • dheera 5 days ago

    Frequent reauth only makes people figure out hacks to work around it.

    Passwords get written down, passwords end up in Google Docs, Arduinos with servos get attached to Yubikeys, SMS gets forwarded to e-mail, TOTP codes get sent over Wechat, the whole works

    • zer00eyz 5 days ago

      Because much of what passes as "security" is a bunch of theater.

      > SMS gets forwarded to e-mail, TOTP codes get sent over Wechat,

      Here we are deep into 2FA land. Where you have institutions blocking SMS/MMS to IP telephony because they want to capture real people (and this locks out rural customers). Using your cell phone was never a suitable 2nd factor and now it is evolving into a check to make sure you're not a robot/script.

      Passkeys are adding another layer to this... The police department getting a court order and forcing you to unlock your phone and then everything else is coming. Or here if you live in some place with fewer laws.

      • jesseendahl 4 days ago

        Whether or not you can be compelled to unlock your phone doesn't really have anything to do with passkeys. If you can be compelled to unlock your phone, then whatever you have on your phone (including the stuff in your password manager/credential manager) is potentially up for grabs. In this threat modeling scenario there's nothing unique about a passkey vs. a password.

        And if you're against using credential managers at all, because you only want to have the password stored in your brain and nowhere else.... then that creates different problems, namely it dramatically increases the odds that you will use the same password across multiple services, which is bad because then attackers can steal your password from one service and use it to login to a bunch of other services.

      • yawaramin 4 days ago

        > The police department getting a court order and forcing you to unlock your phone

        If you live under a tyrannical regime, neither passkeys nor passwords will help you. The police state will find a way to do what they want with you.

    • catlifeonmars 4 days ago

      > SMS gets forwarded to email

      This hop is actually more secure than receiving an SMS natively. Your mobile network provider can already read all of your SMS and there are tons of exploits for modifying the receiver of SMS in the wild. SMS is a terrible way to send information securely.

    • [removed] 4 days ago
      [deleted]
  • tetha 5 days ago

    I was somewhat pondering along these lines.

    At work, we have somewhat of a two-staged auth: Once or at most twice a day, you login via the ADFS + MFA to keycloak, and then most systems depend on keycloak as an OIDC provider with 10 - 15 minute token lifetimes. This way you have some login song and dance once a day usually, but on the other hand, we can wipe all access someone has within 15 minutes or less for services needing the VPN. And users don't notice much of this during normal operation.

    • maccard 4 days ago

      You say users don’t notice much of this - I disagree. I had to authenticate with our SSO provider 9 times yesterday (I started counting because it’s getting so frustrating). All on the same device; once on initial login, once on VPN connect, once to the SSO dashboard, twice (!) to Microsoft for Outlook and Azure access via our IDP, once for perforce (no 2FA required thankfully) and three times to Jenkins because it doesn’t remember the OIDC token if you close your browser. IT say it’s normal and here I am spending 10 minutes a day waiting for my Authenticator app to log in.

      I work on a corporate controlled machine, with a corporate VPN app and custom certificates installed. I’m pretty sure it knows when I sneeze, but yet remembering who I am for more than 15 minutes seems out of scope.

      • tetha 4 days ago

        That sounds like a horrible setup though and is a good way to MFA fatigue and other security issues.

        In our case - I counted this morning too - I have 2 MFA authentications (VPN and the IDP used by Keycloak) until I have my Keycloak session. This session has an idle timeout of I think 2 hours, so if I don't do anything for 2 hours I'd have to re-auth. And it has a max session length of 10 or 11 hours so it lasts even for long workdays. This has been setup so users generally have to login via MFA once a day in the morning. Since we're using the same authentication and setup, we know this works.

        Further token refreshes and logins then bounce off of that session. So our Jenkins just bounces us over to Keycloak, we have a session there, it redirects us right back. Other systems similarly drop you to the Keycloak on first call of the day and Keycloak just sends you back. It's very nice and seamless and dare I say, comfortable to use.

        It is however supposed to be easy and we spent some time getting it working this well.. because now people just integrate with the central auth because it's quick and easy and we have full control and tracking of all access :)

  • the8472 5 days ago

    You don't need reauthenticate for that, you just need to renew existing tokens. Separate the timeouts for authentication and authorization.

  • babypuncher 5 days ago

    It's a balancing act. The more annoying your auth requirements are, the more likely users are to look for insecure shortcuts that make using their computer less miserable.

WarOnPrivacy 4 days ago

From the article:

    Now that most OSes can unlock with just a fingerprint or face,
    there's no reason to leave your screen unlocked when you walk away.
This statement seems to be unaware that workstations are a thing. In 30 years of onsite support, I think I've seen one desktop PC with a fingerprint scanner.

Cameras aren't ubiquitous either. Across the 5 locations I currently service, less than 2 percent of desktop PCs have a camera.

Past that, I believe there is a secondary challenge with face scanning; it's the unsettlement factor. I suggest that discomfort with face scanning is reasonable and earned.

The reason: We're constantly subject to face scanning that is non-consensual, intentionally hidden from us and is probably exploitative. Cams also enable snoopy bosses, school admins, corps, LEO and Govs to endlessly peer where they should not.

And even where we own our devices, we don't fully control them. Software corps have no ethical boundaries. Any assumptions that they'll respect us - at all - isn't based on reality or history.

For workstations, I like security keys.

  • projektfu 4 days ago

    If an organization wants fingerprint scanners, they just have to provide them. It's about $15-50 per workstation, if desired. The main problem is they use up an increasingly scarce USB port. Some scanners also rely more on security by obscurity rather than protecting the channel. https://www.google.com/search?q=windows%20hello%20fingerprin...

    It would be worth doing research to find the best fingerprint scanner that implements this well.

    Face scanning is a poor solution because desktops usually do not have Hello-compatible scanners and the scanners on the Windows laptops aren't very good. They frustrate users who prefer darkened rooms or who sit in places with varying contrast from the windows. It is also weird the way the camera is constantly trying to find you, and so it blinks its red LED frequently until the computer goes to sleep.

    Just really agreeing with you on security keys, but we also have to make sure they are really secure. Also, like the article says, they give you the device possession part, but not the user ID part, unless they have a biometric device built in.

    • simoncion 3 days ago

      > The main problem is they use up an increasingly scarce USB port.

      This logic I do not understand. USB hubs exist and are more-or-less commodity parts these days. [0]

      I'd be surprised if the fingerprint reader was anything faster than USB 2.0, and deeply offended if the reader did anything other than idle on the bus when it's not being used... so you're not going to be suffering any real bandwidth contention by putting that guy and a USB 3.x device on the same hub.

      [0] They're also usually how motherboards that have a whole bunch of USB ports hook those ports into the onboard USB controller(s). (Do folks usually think that every one of the 10gbit/s ports on one's desktop machine could be simultaneously run at 10gbit/s?)

throwforfeds 5 days ago

A client of mine has a 30 min timeout on basically all their systems. I hate using Jira as it is, but having to login pretty much every time I need to go look at my tickets just makes it awful. And then I end up on Hacker News instead of doing actual work.

  • nkrisc 5 days ago

    Few things worse than spending 30 minutes writing something only to be asked to login when you submit it.

    Fortunately these days most services will cache your work.

    • zelphirkalt 5 days ago

      Though to rely on Jira to respect your work or your browser functionality is madness.

paxys 5 days ago

Industry-wide IT security is driven by the "nobody got fired for buying IBM" phenomenon.

It doesn't matter if things are broken. It matters that you did everything by the book. And the book in this case was written 30 years ago and is woefully inadequate. But try convincing your VP of information security that employees shouldn't have to change their password every 3 months...

  • lxgr 5 days ago

    At least for that one, you can now point to NIST recommendations, which finally discourage rotating passwords.

bgirard 5 days ago

The flip side of this is that I had a Ring doorbell in a home I lived in. Moved out and split up with my ex. Years later I installed a new Ring doorbell and I got a message from her shortly after installing it saying she was getting notifications again from my new Ring camera.

Kind of scary now to wonder if there's any loose accounts somewhere that's leaking sensitive information due to never requiring reauth.

I think the worse offender is iMessage. It's very easy to not understand that your SMS messages are -sometimes- going over icloud and can be seen on old apple devices you might have given up. I tried to unregister my phone number from iMessage about 5 times and it just doesn't work for me.

Henchman21 5 days ago

Remember when it was called SINGLE sign on? Emphasis on SINGLE? I mean, this whole idea has been such a mess forever. Why am I prompted to SSO hundreds of times a day?

  • c17r 5 days ago

    As far as I've understood/remember SSO was logging on with a single ID and not logging on a single time.

    • cesarb 5 days ago

      > As far as I've understood/remember SSO was logging on with a single ID and not logging on a single time.

      What I remember is that the promise of SSO in the 1990s and early 2000s was that you would login only ONCE, onto your desktop. The operating system would use that login to acquire NTLM or Kerberos tokens, which would then be used to authenticate everything else: shared drives, printers, even web sites would be authenticated using that token (there's a way to pass through your desktop NTLM authentication to a web site, which IME is slightly annoying because it authenticates the connection and not the request, and therefore needs keep-alive HTTPS connections to work correctly).

      Of course, that only really works that well in an homogeneous environment, for instance one in which everyone is using a few Windows NT versions on the desktops and all the servers, or one in which both the desktops and servers use the same specific proprietary Unix variant. What instead happened was the rise of heterogeneous systems, which do not share that common authentication mechanism. To make things even worse, each piece of software has its own separate authentication database, often (but not always) a pluggable one which might perhaps be coerced to forward the authentication attempts to another system, instead of directly using the operating system's centralized authentication mechanisms. AFAIK, you can still make it work, but it's a lot of work (for instance, IIRC forwarding NTLM credentials to web servers is disabled by default, and has to be manually enabled and configured to allow a given web server).

      • marcosdumay 4 days ago

        > Of course, that only really works that well in an homogeneous environment

        It works if no monopoly abuses their position by sabotaging the standard.

        OAuth is getting a chance to work because neither Google, Apple nor Facebook are big enough, and they don't play well with each other. At least right now.

    • bithive123 5 days ago

      You are describing "same sign-on", which is generally less desirable than single sign-on, but at least users only have one set of credentials to remember.

  • notfed 4 days ago

    Well, for phones: phones can be lost or stolen. For desktops: an uncomfortable number tend to log in to public computers (eg libraries) without logging out and without understanding the implications.

tonymet 5 days ago

Yahoo published these findings over 20 years ago , that frequent re-auth made customers less secure because it encouraged poor password hygiene like short passwords, writing them down, etc.

It's also risky to have the primary password credential transmitted instead of temporary tokens.

  • al_borland 5 days ago

    On the side of things, the risk of never needing your password is people tend to forget it.

    Just the other week I was helping someone setup a TV and they thought they didn’t have an Amazon login, because they never needed to login. This was a Prime member.

    1Password defaults to having users reauthenticate every 2 weeks. I do find this a bit annoying, but I find the occasional reminder of my password to be a necessity evil. Even doing it every 2 weeks for years, there are some days I have trouble bringing it to the front of my mind. And that would mean a hidden piece of paper somewhere with the password written down in case it’s forgotten. As I get older I should accept the idea that I should have these emergency systems in place if my mind does go, but it makes me uncomfortable.

    • tonymet 5 days ago

      It's a good point on password usability. Signal app periodically prompts you for the encryption PIN to make sure you don't forget it.

      I think this should be handled out of band of the login process. Similar to "is xxx still your phone number?" -- companies could do periodic password hygiene and freshness checks.

      Context matters. Companies forget that people are trying to get something important done, and blocking them for other attention is a huge frustration.

      • cesarb 5 days ago

        > Signal app periodically prompts you for the encryption PIN to make sure you don't forget it.

        At least Signal does not block the app until you enter the PIN. WhatsApp forces you to enter it before you can reach your messages, which not only is annoying when you're in a hurry, but also forces you to type the PIN even when you're in a place where it might be seen by someone else.

        On the other hand, on Signal it's possible to leave the warning forever at the bottom of the screen without acknowledging it and typing the PIN, which kind of defeats its purpose.

    • nijave 5 days ago

      Our work SSO is set to 12/24 hours in most places which seems like a decent compromise. Auth once a day

      In a corporate environment, ideally your workstation password is tied to SSO and you have a short but reasonable lockscreen timeout where you need to re-type your password.

  • Sjoerd 4 days ago

    Do you have a link to that Yahoo publication? Or any more information on it?

vizzah 5 days ago

I just can't stand email OTP. Before we had passwords, now we have passwords + email OTP. And doesn't matter if you forgot password - you will receive password reset to the same email. You already prove email ownership by resetting or using password - why sending another useless "security token" to the same email. Pure nonsense. Whoever designs all of this clearly has little idea of what they are doing :(

  • TylerE 4 days ago

    I’ve kind of become a fan of the sites that don’t even have passwords but just email you a “magic” link. If my account security is tied to my email why make me do extra song and dance if I’m gonna have to fish out an email for every login anyway?

    • kevincox 4 days ago

      I despise this. With username and password my password manager just fills it in and it is one click to click "login".

      With email magic link I need to enter my email (it seems to rarely auto-fill for some reason), then wait (often it takes 10s for the email to be sent for some reason), then if I was logging in on something that isn't my default browser I need to copy+paste the link (often just clicking the link authorizes the source session but not always and you don't know what this site does so you need to do it to be safe). Now you are finally logged in but probably have two tabs open. Either you need to find the first one to continue your session (if it logged that one in) or close it and lose your history for that tab (and hope that the website actually maintained your target page which more often than not it didn't).

      • radicality 4 days ago

        And on top of that, the session is probably gonna expire in less than day. I hate logging in to Anthropic because of this signin-email dance

      • ddejohn 4 days ago

        Nothing tempts me so strongly to give up and leave a site than needing to use a magic link to get in.

        Sometimes it takes minutes. I have, on more than one occasion, given up on buying a product because of this. It's actually insane to me how much effort sites put into preventing users from using them.

        I get it, most people are idiots with completely non-existent security hygiene, but man does it suck being punished because of just how low the common denominator is here.

      • TylerE 4 days ago

        My point is that on sites that force email 2FA you have to do the email dance anyway. A username and password are basically theater.

        • kevincox 4 days ago

          That's true. Although pasting the code into the existing browser tab is a bit smoother in my workflow. And at least the form autofills properly when they ask for email and password.

          I'd much prefer if they could just trust my password. But I know the unfortunate truth is that the majory of people just reuse a password across most sites. So these measures are intended to raise the baseline difficulty, not to improve the security of those with good habits.

      • frankish 4 days ago

        My preferred workflow as well, but now many websites are starting to do this thing where you have to enter only your username, hit next, and then the password input shows up; however, the username only input breaks my password manager from trying to autofill! Argh

  • paradox460 4 days ago

    The biggest pet peeve of mine in this area is "magic link" auth. Instead of letting you use a password and otp, which can be managed by a password manager, they send you an email so you can click a link to get into their app

    That's right, you have to wait for an email to arrive, make it through the spam gauntlet, and then click the link in the email, likely covered in trackers, just to get into a website or app. And here I thought people wanted to keep you in their site as much as possible

  • notfed 4 days ago

    I'm confused by this comment. Can you clarify exactly which poor design flow you're talking about?

    • tpxl 4 days ago

      1. Input username/password -> get email otp code.

      2. Forget password -> get email for new password -> input username/new password -> get email otp code.

      The only actual security factor here is your [email, email password], everything else is just silly rigamarole.

      • tzs 4 days ago

        Note that by doing it that way they don't have to have a special case for handling input of username/password when that password is a new password. Making security critical code simpler is generally a good idea.

        Whether it is worth annoying some users in the password reset case to avoid making the login code slightly more complicated is going to depend on your specific situation.

        • runeb 4 days ago

          I read their point as why have passwords at all when the security is you having access to your email account.

      • [removed] 4 days ago
        [deleted]
  • spacebanana7 4 days ago

    Email OTP can be useful as a layer in risk based authentication.

    If someone tries to log on to your site from a low reputation VPN, throwing an email OTP challenge can give some assurance it’s a genuine user logging in. Rather than a spammer or something like that.

    • Freebytes 4 days ago

      Yes, it makes sense if the environment has changed, the device has changed, or if the person is logging in from a higher threat source such as a VPN IP address. However, if nothing changed, it is a waste of time in many cases.

h4kunamata 11 hours ago

Anything that generates fatigue doesn't work. Passwords expiring every 2 months?? Users will user password like "test1" "test2" test3" and so on.

Companies don't even have a password manager so few employees use the browser to save passwords, others use their own password manager which comes with its own security risks like that service, LastPass IIRC, that got breached.

When working for big companies, there are so many wrong processes and practices which provides the bare minimal and that is fine.

Support team cannot care to report the problems coz they don't wanna more work, my laptop always connect to a restricted network while in the office which kills internet access to everything, that in turn cause the laptop to take 20-30 to turn own while it tries to run AD policies.

The whole process is broken within the companies culture, keep it minimal, repetitive and that "should work, next"!

czk 5 days ago

user clicks a phishing link and is asked to login to M365 again, they do it without hesitation because they are used to doing this 5 times a day

logging into phishing links would make more people pause if they didnt have to login constantly to get work done

  • zelphirkalt 5 days ago

    Especially with Office 365 this is the case, because of their ridiculous amount of scripts from tons of domains. They are very far removed from making a good product.

0xQSL 5 days ago

My employer just started doing daily reauth for all microsoft logins (teams, ...). The worst thing is that it's just 24h not start of day, so it may just be five seconds before you want to join a meeting.

They haven't found the setting for mobile yet, so I might just stop using desktop teams.

  • eddythompson80 5 days ago

    Had that on the WiFi system at a facility I used to work from for a while.

    When you connect to their WiFi, you go to a guest portal to connect to the internet. The guest portal grants your MAC address 24 hours of access. Meaning one day you get to work at 9, the next day you get in at 8:55, you’ll have 5 minutes more of WiFi before things just stop working and your system takes a minute to realize you need to reauth with the captive portal

    • lxgr 5 days ago

      This is why 24 hours is a particularly bad timespan for reauthentication. With e.g. 16 hours, you’d at least get a predictable prompt on each new workday.

      • steadicat 4 days ago

        One time I led a project and ran daily standups by screen-sharing our Asana board so the team could review in-progress tasks. Every day, right in the middle of the meeting, Asana logged me out. I’d rush to log back in to finish the review, thus ensuring we’d repeat the cycle exactly 24 hours later. This silly dance lasted the whole project.

    • paxys 5 days ago

      And successfully opening a wifi captive portal is the most difficult thing to achieve in all of tech for some reason.

      • marcosdumay 4 days ago

        It's even harder than moving a file from a desktop into a telephone on the same LAN with an USB cable plugging both.

        Computer security has a problem.

  • Marsymars 5 days ago

    I’ve been complaining about this exact thing at my company for years. The worst is, they actually had it at 12h but rolled it up to 24h after some exec complained he had to sign on twice in one day.

  • gs17 4 days ago

    This also just happened to me too, except we only use Outlook. Web Outlook handles this state really poorly for some reason. It doesn't kick me out, it just pops up a little banner.

  • [removed] 4 days ago
    [deleted]
xyzzy123 5 days ago

This depends on your "world model", that is, what situations do you anticipate the people using your web site / application are in?

The assumption that basically, device = same person (browser session really) over a long period of time is the right one, 99% of the time.

Sometimes it's appropriate to make much more conservative assumptions. People might be in bad family situations (where not everyone with access to a shared device might be entirely trustworthy) or using a shared computer because they access things from a library, etc.

You can't help much (the computer might as well be compromised) but short session timeouts can make sense.

  • kevincox 4 days ago

    > People might be in bad family situations (where not everyone with access to a shared device

    Then they should configure their browser to log them out. Not hope that every site has good settings for their niche scenario.

paxys 5 days ago

Corporate IT still makes you change your password every N months. Tell them to extend the max session length beyond a day and some VP will have an aneurysm.

  • al_borland 5 days ago

    It’s all theater so they can sell the idea that they’re doing everything they can, and if something does happen they can shift blame.

    • Freebytes 4 days ago

      In many cases, it may be to fulfill rules associated with PCIDSS requirements, even if the company never sees the credit card. This all originates from consultants, and the consultants are engaged in security theater.

  • jeremyjh 5 days ago

    There is very little incentive to actually do information security correctly - because hardly anyone can tell if you have - consequently there are very few people who try. It is all just theater to cover their asses, and they'll admit it under the right circumstances.

    They don't want to change idiotic policies like this because it means they'd have to admit they've been dogmatically enforcing counter-productive policies for decades.

    • kevincox 4 days ago

      Hardly anyone can tell, until everyone can tell, because you have a breach.

      It's similar to the idea that if you aren't doing restore drills you aren't really taking backups. But people rarely test their auth rules.

      • jeremyjh 4 days ago

        You could do everything correctly and still have a breach, so practitioners are quite fatalistic about it. The key is to diffuse decision making responsibility so that its not clear who can be fired.

  • kiitos 5 days ago

    No modern IT organization mandates periodical password changes since, I dunno, mid-2000's.

    edit: please note the "modern" qualifier, tons of IT orgs continue to mandate this anachronistic policy, sure, but those orgs aren't modern, the policy isn't a requirement for e.g. SOC2 or whatever, it's purely historical inertia.

    • joshstrange 5 days ago

      Nope, not even close. IT depts continue this practice to this day.

      I had a friend in ~2015 that said they all had barcode scanners plugged into their computers (not 100% what they used them officially for) and so people would print their password as a barcode and stick it under their desk so they just had to scan the barcode to login (most/some/all? USB barcode scanners present as a keyboard and simply send scans as keypresses) due to silly password rotation rules. He said the people that didn’t use the barcode trick would instead just have a post-it note on their computer or, at best, under the keyboard or in a drawer.

      • MBCook 4 days ago

        Genius. I love it.

        I was reading about keyboard firmware last night and saw the ability to do “tap dances”, where a series of specific key presses in short order can trigger a predefined action.

        It instantly occurred to me how useful it would be to be able to quickly type “QWE” and have one long complex password input for you automatically. Then “ZXC” for another, etc.

        Of course flashing your passwords directly into your keyboard firmware is probably a pretty big security no-no.

        But all the places that love to enforce constant password changes with super specific rules sure make something like that sound appealing.

        • paradox460 4 days ago

          You don't even need to go full keyboard. You can flash qmk or similar firmware to a single key device. You now have something like a yubikey, that only ever outputs one password

      • ExoticPearTree 4 days ago

        We deployed the barcode scanner with passwords too. It works wonders. People that use the system are super happy they don't have to type in "secure passwords" and some security auditors are happy we have the "enable password complexity" checkbox ticked.

      • kiitos 5 days ago

        Yes, many anachronistic and out-of-date IT depts continue this practice, indeed.

        • paxys 5 days ago

          No true scotsman mandates password changes

    • thyristan 5 days ago

      Even worse. NIS2 in the European Union makes password changes legally required for many organisations.

      https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=PI_... 11.6.2 (c)

      • bux93 4 days ago

        Yikes, whoever wrote that should be ashamed of themselves. On the bright side, it doesn't specify how long the predefined interval should be, and says entities are to 'ensure the strength of authentication is appropriate to the classification of the asset to be accessed' - so, in order to ensure the appropriate strenght the interval should be 100 years is totally defensible IMHO. The whole paragraph doesn't take MFA in account anyway, and FIDO2 does provide for key rotation (even if it's not widely implemented, maybe something to consider if you're covered by NIS2 - or manually rotate keys once every year).

      • MBCook 4 days ago

        I’ve been told PCI does as well, though I don’t know if that’s really still true.

        Edit: jjav beat me to it below, confirming it is.

        • qualeed 4 days ago

          PCI DSS 4.0 does not require password rotation unless the password is the only authentication (i.e. no MFA).

          Use MFA, and you don't need to rotate.

          >Clarified that this requirement applies if passwords/passphrases are used as the only authentication factor for user access (i.e., in any single-factor authentication implementation).

          >Added the option to determine access to resources automatically by dynamically analyzing the security posture of accounts, instead of changing passwords/passphrases at least once every 90 days.

    • MBCook 5 days ago

      Ha ha ha ha ha.

      Where do you live? That’s absolutely not my experience.

    • jjav 5 days ago

      > the policy isn't a requirement for e.g. SOC2 or whatever

      It is a PCI requirement and probably from other sources.

      Of course it is brain dead and we even have authoritative documentation from NIST explaining why it is stupid, but nobody at PCI has any technical skills to understand that so the madness lives on.

      • qualeed 4 days ago

        >It is a PCI requirement

        The only requirement for password rotation in PCI DSS v4.0 is if the password is the only form of authentication (i.e. no MFA). Use MFA (which you should be anyways) and you don't need to enforce password rotation.

        >Clarified that this requirement applies if passwords/passphrases are used as the only authentication factor for user access (i.e., in any single-factor authentication implementation).

        >Added the option to determine access to resources automatically by dynamically analyzing the security posture of accounts, instead of changing passwords/passphrases at least once every 90 days.

      • kiitos 4 days ago

        It is for sure not a PCI requirement that user system passwords need to be changed on any kind of interval. At least, I've been a member of several PCI-compliant organizations that did not have or enforce this policy.

    • inglor_cz 5 days ago

      My Microsoft account is definitely bothersome like this. I never searched for the root cause (tenant policies? some default value somewhere?), but I have to refresh my password every 4 months or so.

      • qualeed 5 days ago

        It's a setting in the admin.microsoft.com portal (Org settings -> Security & privacy -> Password expiration policy).

        The setting, funny enough, is literally "Set passwords to never expire (recommended)".

        They also link to "Learn why passwords that never expire are more secure" in the same place.

        Anyone who is forcing expiry is specifically going against recommended policies (Microsoft's, NIST's, and any serious security person) for some reason or other.

      • MBCook 4 days ago

        Every four months? If only. I’m required to do it every 30 days for a number of systems. The good ones are every 90 days.

    • icedchai 5 days ago

      I have one that emails me every 3 months to change my password. Very annoying.

valenterry 5 days ago

This is spot on. And it's a general misunderstanding of security in practice. Availability is often missed/ignored (but it is part of security) and attention is an important currency that needs to be treated carefully - or you and up with the mentioned MFA fatigue attacks or people writing down their passwords.

  • circular_logic 4 days ago

    I have tried to point out that poorly implemented or non contructive security controls reduce system availability. As employes are not able to get to the information they need in a timely manner.

    But it's been a dead end to many an argument. For some the underlying issue is a refusal to accept that product usability and security are not mutually exclusive and a difficult to use system just leeds to grey IT in the org.

    The most odd reply I have received was pedantics on the definition of security availability, i.e.,

    "Ensuring data and network resources are accessible to authorized users when needed"

    Beacause it contains the word "authorized" any controls for authorisation can therefore never affect availability as they have to be authorized before we can consitter it an impediment to availability...

    If anyone has a reply better than that's ridiculous, please help me here

  • jeremyjh 5 days ago

    The most secure thing would be to unplug the servers.

    edit: I'm agreeing with parent. Availability is part of security. If it weren't, you could unplug the server and call it a day.

TheBicPen 4 days ago

Very confused about this point:

> Passwords, Face ID, Touch ID — things that supposedly nobody but you can replicate, but which don't prove you're physically near a given device

Password, sure. But the other 2 surely prove that you're both 1) the correct person and 2) near the physical device that scans your face/fingerprint. The article immediately follows that by saying that face/touch ID do both.

hashstring 5 days ago

There’s another closely related one, changing passwords periodically.

A lot of infosec authorities move away from this.

However, I always wonder, does it make sense for an org to stop with periodic password resets if: 1. the org is not very capable in detecting all account compromises; 2. in practice, users leak their passwords (e.g. by getting phished) and not all of them lead to direct intrusions, some credentials are sold first and it may take weeks/months to cause an intrusion.

I believe that in practice, forced password changes at least ensure that unknown compromised passwords will become outdated at some point in time, and I think that this is positive.

Ultimately, I believe the best thing to do is to move to FIDO2-authentication here.

But I do wonder what are other peoples takes on this topic?

  • awesome_dude 4 days ago

    > I believe that in practice, forced password changes at least ensure that unknown compromised passwords will become outdated at some point in time, and I think that this is positive.

    password

    password1

    password2

    password!

    Password1!

    People get predictable on how they modify their passwords when that policy is instituted. Mostly because it's a royal pain in the ass to have to generate a new password AND remember it.

    That was one of the reasons that browsers (etc) began offering users randomly generated passwords that either the browser, or a 3rd party tool/service recalling the password on demand.

    However that then means the password to the browser/service becomes the unchanging password...

    > Ultimately, I believe the best thing to do is to move to FIDO2-authentication here.

    Passkeys are an attempt to circumvent this by having (effectively) a key that's attached to some physical device that the user must have access to to prove that they are the authorised user... but... people are circumventing those by storing them in cloud services... which means that the password to the cloud service is... yet again.. the weak point.

    > But I do wonder what are other peoples takes on this topic?

    For my money, the problem that's being attempted to be solved is unsolvable.

    In the physical world we determine identity by citing documents that verify the identity as far as a trusted institution like a government or bank is concerned, and those documents are predicated on documents that may or may not exist (birth certificates) and the assurance that those documents are for the person presenting them, from other people that have been through the same procedure.

    The digital world is even more difficult to prove identity with, because everyone looks exactly the same, ones and zeros, the order might be different from one person to another, but they're mutable.

    • hashstring 4 days ago

      On the password1, password2, password2! flow, yes this happens and is bad, but not everyone is like this. I would say, any change (even a weak one) to a compromised password helps (even a bit). Because it requires attackers to test more passwords, providing more opportunity to detect them.

      I agree, on moving the weak point to certain service providers when doing this.

      Unsolvable: hm, but isn’t the idea to make it more secure, not necessarily solve it completely?

msgodel 5 days ago

Please just talk to my ssh agent and stop harassing me with authentication modals asking for tokens and fingerprints.

almosthere 5 days ago

Finally someone said it. This is a relic from when a row in a database table for a session id cost about $400. I'm joking of course but that's what literally was on the mind of early internet engineers. The only company that fights this is Google and apparently tailscale.

  • eab- 4 days ago

    The same Google that makes you log in again on like every other `gcloud` call? By copy pasting your password into the shell prompt?

  • MBCook 4 days ago

    Microsoft does too. And Apple (but they’re not big in enterprise, of course).

    Unfortunately lots of compliance people/orgs don’t seem to want to give it up.

jandrese 4 days ago

IMHO there are only 2 requirements for a good password:

1. It must be close to impossible for a computer to guess.

2. It must be easy for a human to remember.

Virtually all password policies focus exclusively on point #1, with the vast majority just giving cargo cult instructions without really understanding the state of the art. Almost nobody puts any emphasis on point #2, which is arguably more important as it is the source of most breaches. If a person can't create a password, ignore it for a week, and then remember it immediately for the next login it's a bad password. This is where requirements like "no more than two characters from a character set (lower case, upper case, numbers, punctuation) in a row" are actively counterproductive. If the password has to be so convoluted that the user is forced to write it down then you've undermined your own security. Worse, it means the help desk will be forced to reset many many passwords which increases the chances of an impersonation attack succeeding.

  • [removed] 4 days ago
    [deleted]
thwarted 5 days ago

The MFA is getting out of control too. Go to vendor's tool/website, which uses some SSO method and redirects/prompts me to login with the SSO provider. Authenticate to SSO providers, which requires an MFA. Redirects me back to the vendor's tool/website, which prompts for its own MFA. And the vendor's tool's configuration has a security setting that requires all accounts to have MFA, even if they are authenticated via other means.

  • MBCook 4 days ago

    I need to use SSO with MFA for something. So I sign in.

    Every once in a while, the token attached to that somehow expires. Which means that once I have successfully signed in (but before doing MFA) I am redirected to a DIFFERENT SSO system.

    I get to login to that and enter its MFA code.

    Having now completed all security requirements. I get to enter the MFA code for the original SSO.

    Double SSO. Double MFA.

    Boy don’t we feel secure.

  • __turbobrew__ 3 days ago

    I have this at my work. One system requires SSO so I go to the SSO gateway, touch my yubikey to login to SSO, and then I am redirected back to the original app, and it also wants my yubikey so I touch it again, and then I am finally granted access.

    The root of trust is my yubikey in both cases but the implementation was lazy.

    I brought this up to our security team and they shrugged.

btbuildem 4 days ago

> Consider enforcing automatic screen lock when you walk away

The corpo "security" dingbats force this on our work machines via profiles -- can't control how long before the screen locks. Thank goodness for the Amphetamine app. I'm not typing in my password every time I stop to think for two minutes, you can fuck all the way off with that.

  • Nextgrid 4 days ago

    If you're using a Mac, I find the fingerprint sensor helps a lot.

ajsnigrutin 4 days ago

OnShape (web based 3d editing software) is like this. They have a free tier with public-documents-only option, and it's same there.

Open the page... you have to log in, no way to remember you. Sure, you save your password in the browser, but unless you then also click into one of the input fields, the login button is disabled. Then you work on some 3d stuff, export the file, send it to the 3d printer, some time goes by, browser still open, you get the object, and the holes don't line up, you forgot the wall thickness in the measurements, calipers, yep, 3 more milimeters... open onshape tab, nope, you've been logged out. I didn't even close the goddamn window/tab, it's a free account editing a public document.

radicality 5 days ago

This has been bothering me for a while now (few years maybe ?) - websites repeatedly expiring my login for who knows what reason. Sure, maybe I can understand for high value trading platform or something. But no - most mundane sites which most people wouldn’t at all consider sensitive, like HomeDepot / BHPhotoVideo / various online shops, will expire my session within like 24h - seriously, wtf. And significantly more sensitive sites, eg Meta/FB, are usually able to keep my auth for months/years.

I haven’t chatted about it with anyone, as I partly wasn’t sure if something in my setup has changed and whether I’m a minority that fell into some constant reauth bucket. Or whether most of site owners have slowly been using lower and lower auth expiration, causing me a bunch of frustration and friction.

  • bdangubic 5 days ago

    …high value trading platform or something

    those are actually ones that don’t do stupid shit like expire passwords… I have had one password for vanguard… and I am in my 50’s :)

gausswho 5 days ago

Pretty rich coming from a company that only let's you create an account via SSO from the largest offenders of this.

  • tayiorrobinson 5 days ago

    and also requires you to relogin every so often (to be fair it's 90 days not 24h)

    and you can just use a custom OIDC IDP with tailscale, for all 15 of us that have custom OIDC IDPs

  • pfych 5 days ago

    It at least got me to learn how to self-host my own identity provider!

    • gausswho 5 days ago

      Do tell!

      • pfych 4 days ago

        I set up Authentik[^1] on my NAS in a docker container and went from there! Just had to add a .well-known webfinger file to my domain that pointed to the Authentik instance and it "just worked" with Tailscale.

        [^1]: https://goauthentik.io/

artursapek 5 days ago

I was working at a crypto exchange for years and completely burned out on reauth. VPN session would die, 20 different SaaS products would log me out, constant interruptions. I’m amazed I never got phished.

NoMoreNicksLeft 5 days ago

They've got the google mail here at work set to make me change the password once per month. The 100-character, unguessable, un-shoulder-surfable password that isn't reused anywhere. In addition to the 2fa I have to use with it. And it will now ask for reauth once per week, which just happens to somehow be 2 minutes before the important weekly meeting I'm supposed to attend which kicks me out of calendar for the link to the Google video meeting.

But at least it makes me reauth.

ianopolous 4 days ago

Humans shouldn't generate passwords. ~0 people are good at that. Websites should just generate a password for a user, letting them regenerate as many times as they like until they get one they like (without breaking password manager based generation). A bit like this: https://peergos-demo.net/?signup=true

  • baq 4 days ago

    ~0 people want to remember passwords. generating passwords for them without offering to securely store them in a password manager strikes me as misguided.

    • ianopolous 4 days ago

      People should absolutely be using password managers where possible.

      A website doesn't have control over whether you are using a password manager though. This is about stopping the human from generating a password themselves, which will be terrible.

      • baq 4 days ago

        I mean, at this point might as well drop the password requirement completely and send an email login link every time a user gets logged out and wants to log back in. It's how 'reset password' feature works for some people anyway.

        • ianopolous 4 days ago

          Yep, if that's possible for your service that works. If the service doesn't want your email and/or doesn't have access to your data, e.g. an E2EE service where account reset is impossible, then that's not an option.

          The supposition for all this is that the service wants to use passwords for whatever reason. In that case, generate them for the user.

yusyusyus 5 days ago

I have really strong opinions against the device-secured biometric stuff. On my own devices, I will never use it as it dramatically lowers my security posture.

Further, the development of this ecosystem is to the exclusion of alternative OSes. Windows Hello and whatever apple wants to call their suite of biometric goo is elevating them to a place in my life that is unacceptable by virtue of the unwarranted trust granted to them.

jaydenmilne 4 days ago

Microsoft has ruined their PC games with this. I hesitate to fire up Minecraft or Master Chief Collection these days because I just _know_ it is going to make me reauth for no apparent reason. I took 2FA off my Microsoft account because of this, so congrats.

These are a video games, not a bank account! Please just let me have fun!

  • candiddevmike 4 days ago

    Yea, it's nuts having to reauthenticate constantly on an Xbox, especially with a randomized password. They changed it recently where you can scan a QR code I guess, but whoever implemented that system is completely disconnected from reality.

thway15269037 5 days ago

I hate how prevalent it has become and it's getting even worse. One company that is buying our product has enforced SSO in theirs installation, making access_token lifetime of 15 seconds and refresh_token 4 minutes. For those unaware of OIDC/OAuth/SSO terminology, basically it means "if you lost access to internet for 4 minutes, invalidate your session, invalidate everything, make user go to auth, pick up 2fa, input everything...".

It causes incredible amount of stress in end users, who keep spamming us with tickets how our product logs out them every minute, like when they closed laptop for a minute, went from one building to another or when their VPN simply lost connection while they were on a lunch. It's like hundreds tickets per day when normally it's 3-4 per week.

And you can't really do anything about it, because "muh security standards", "we need to pass audit" and whatever.

I actually want to sit down and calculate how much working hours of everyone involved are wasted every single day, day after day, it's completely bonkers.

  • MBCook 4 days ago

    15 seconds?

    I’ve never heard of anything like that. The recommendation I’ve always seen is 15 minutes.

    Seems like you could quickly run afoul of that just from a spotty Internet connection.

harshaw 5 days ago

My problem is that there is a reauth FOMA that gets copied with the most trivial of applications. A good example is the Electrify America charging app. It's job is to be available so you can charge. But they log you out frequently - and they want to do second factor with email. Guess what - that doesn't always work. My wife was trying to charge the other day, was logged out, and couldn't get the email verification to go through. So I had her login with my credentials and I answered the email verification and gave her the token over the phone. super annoying.

But more importantly- mobile phones already have good security mechanisms. It's like all these shitty apps copied web based auth mechanisms with timeouts when they could do something better (and probably are built on web technologies with cookies instead of using the trusted store on the phone).

There are precious few apps out there that tell you ahead of time that reauth is happening (Zoom does this - kudos). But even so - I don't think it's necessary most of the time.

  • MBCook 4 days ago

    I don’t need to charge often, but I’m logged out of every single one of my charging apps for that reason. They kick me out constantly.

    If you want me to auth to make a payment when starting a session, fine. I’ll hate you, but whatever.

    Nope. Can’t even get into the app. Want to see where their stations are? Too bad. Sign up, sign in, or hit guest mode and prepare to be annoyed.

    I can stay signed into Amazon with a credit card set up for years at a time.

    God forbid I ever want to charge a car.

jeroenhd 4 days ago

Needless to say, this is an ad for Tailscale. I hate these short-lived sessions myself, but there are oftenreasons why they're there.

The alternatives proposed are "just always check right before a sensitive action" and "use continuous verification". Both of which are much harder to pull off correctly than short-lived authentication sessions (unless you buy their product, of course, supposedly), especially on third-party services you don't control the source or manage the deployment for.

Oh, and of course, "just make everyone lock their screens". If only it was that easy. If basic rules like that worked, we could ditch half the security measures we have for websites. What's next, "just use unique passwords of 20+ characters for each website"?

Also, this is putting a lot of trust in solutions like Windows Hello. I can't speak for the security of Apple's implementation, but thanks to bad vendor implementations (including Microsoft's own!), Windows Hello hardware is full of security holes. At some point one company decided to take a look at a few of those devices [and found security problems in all of them](https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/).

Short token longevity also protects against one use risk Tailscale have a solution for: users logging in to their personal accounts on public computers. That's still an essential use case for people without internet access or computer access at home. Often these people are more vulnerable (homeless, very poor) so relying on them clicking the "log out" button on every website they're forced to interact with is not going to work.

Kerberos (or buying what Tailscale sells) does offer a somewhat nicer authentication flow, but that still doesn't work reliably on every browser on every OS on every device and it requires people to follow basic rules like "lock your screen", which is a massive risk. Passwords will always work anywhere and their security can be somewhat enforced.

garyfirestorm 4 days ago

I hate the corporate office 365. How many times on the same corporate laptop on which I log in from home do I need to reenter outlook password and 2FA.

I seriously think ms365 login chain is straight broken Click here to sign in - enters userID and pass - thanks for logging out :o

  • ExoticPearTree 4 days ago

    You should be angry at whoever set it like that. In O365 you can sessions last as much as you want.

    Currently MS recommends a 90 day window between MFA re-authentication for known devices/browsers you already authenticated on.

tom_m 4 days ago

I don't know, I still think it's a good idea to change passwords every so often. At the rate databases get leaked, you can't always rely on the strength of the hash and the time it used to take to crack given hardware getting faster and faster. Yes it can cause a minor inconvenience if locked out, but that's better than the alternative depending on what that system was.

But...worry not, we're about to embark on a world with a whole lot less security now thanks to AI and laziness.

clvx 5 days ago

This reads like paraphrasing of SPIFFE. I’m down for it but I wonder of compromised devices that can figure it out how to keep the auth alive (or replicating user behavior). In those cases expiration still sounds like a good idea.

carra 5 days ago

I don't get why asking for a password multiple times is perceived as more secure. It's the same password. If an attacker was able to find it and input it once, surely they can do it multiple times too...

  • stavros 5 days ago

    It's not about asking for the password, it's about expiring sessions frequently. Nobody is going to steal sessions, of course, but the cargo cult security remains.

arianvanp 4 days ago

And then there is AWS which has 3 different products to log in and will sign out randomly and then redirect you to the wrong login page seemingly at random whilst in the middle of incident response

LinAGKar 4 days ago

Does that mean Tailcale will stop doing it? Currently they require you to log into every node and reauthenticate it every now and then, unless you disable key expiry.

latchkey 4 days ago

Google Workspace defaults to making you sign in every 2 weeks unless you have a certain upper tier of paid account with them.

Even worse is that if you try to search for the feature and click on it, it presents a page that unhelpfully returns 404.

It's annoying AF.

"By default, the web session length for Google services is 14 days." https://support.google.com/a/answer/7576830?hl=en

notfed 4 days ago

Here's 2 or 3 cents:

- Websites should (in agreement with TFA) just remain logged in (at least for 24 hours). Let the OS handle it.

- Public computers should only ever provide ephemeral login sessions. Everything cleared upon each login. Never persist anything to disk.

- Personal computers should reauth frequently, but should use adaptive authentication: i.e., password sometimes, and pin/fingerprint other times, where reasonable. Since "reasonable" is debatable, this should be configurable by the user at the OS level.

tlogan 4 days ago

Sure. All true. But PCI compliance requires 90-day password rotation which might not be required if you’re using multi-factor authentication (MFA). In other words, in the case of MFA, that requirement might be waived: and the operative word here is might.

So, if you’re pursuing PCI compliance people don’t rely on assumptions or conditional language like might. Certainty is key when dealing with compliance frameworks.

LordDragonfang 5 days ago

There's supreme irony with Tailscale being the one posting this -- because one of my biggest annoyances with the service is that, afaict, there's no way to set up a device so that it never expires.

I just had two devices - one of which was my main server - I was using it with require re-auth out of nowhere and break one of my workflows. If I had not already set up separate remote access to the server, it would have been really annoying.

Spooky23 5 days ago

Only if you make a bunch of assumptions that may not apply. My employer allows BYO and has a default Outlook Web session timeout.

Is it ok that my son stopped at my desk at home and saw customer PII that was left open?

I enforce these kinds of policies at my company even though I find them personally stupid. I do so because I’m the custodian of my customers property and have a duty to minimize risk of employees or contractors acting poorly.

  • paxys 5 days ago

    Is it ok that your son stops at your desk to see PII while the session is still active? And how does reauth even help with this case? Do you expect your session to expire every 15 minutes while you are taking a break?

    The problem here isn't auth expiry but you not locking your computer when you step away from your desk.

    Your policies aren't enforcing security, just security theater (and making a lot of employees very annoyed in the process).

  • nijave 5 days ago

    >Is it ok that my son stopped at my desk at home and saw customer PII that was left open?

    In practice/reality, probably. Most employers will disagree.

    Consider your son could just as easily over hear a phone call, see a piece of paper, etc. If your son was actively malicious, there's all kinds of things from cameras to video splitters to key loggers he could do. If he's not actively malicious, who cares if he sees something

    If you're in a line of work worried about shoulder suffering, then you should really consider whether BYO is a good idea.

    • zelphirkalt 5 days ago

      "Shoulder suffering" a funny one ; )

      • Spooky23 4 days ago

        In fairness, accurate. Anyone choosing to read my work email is certainly embracing suffering.

      • nijave 4 days ago

        Whoops missed the autocorrect on that one facepalm

    • JackSlateur 5 days ago

      Also, there are shields for screens which basically hide it from anywhere not directly in front

      Very useful for people who work in trains and stuff: their neighbors can't see things

rob_c 5 days ago

Please repeat this to every moron involved in security theatre. This is turning into a pain in the ass in the industry for no reason

taniks1618 4 days ago

I very much agree with this article. But many companies are still under the idea of a complex password, instead of a long one. A "secure" password is not random character vomit. A secure password is a pass-phrase with multiple words and characters intermingled.

nathansherburn 5 days ago

Wouldn't frequent reauth be beneficial for stolen sessions?

E.g. If you set your session timeouts to a ~1 day then by the time your session cookies are up for sale on the dark web, they will be expired.

The article doesn't mention this and it's the main reason I advocate for auth sessions that are as short as practical.

  • throw14082020 5 days ago

    If your session cookies were stolen, they can be stolen again and again too? Timeouts of 1 day assumes the cookies can only be stolen once.

[removed] 5 days ago
[deleted]
redsymbol 5 days ago

Zoom has been driving me nuts with this lately. I have to reauth with OTP 3 times a day, while logging in on the same computer on the same LAN with the same browser. I spend over $1500 a year with Zoom, and this issue is seriously making me think about how I can migrate to something else.

tacitusarc 4 days ago

A minor recommendation: remove the word “just” from the following paragraph.

> At Tailscale, we believe in security that’s adaptive, intelligent, and actually useful — not —just- security theater.

benced 4 days ago

Funny because tailscale arbitrarily expires tokens on machines and doesn’t expose a way to see token age to the user (but does allow your IT admin to renew a token).

worik 3 days ago

My personal pet peeve is restrictions on what characters can go, have to go, into a password

Security theater, not really as it makes passwords less secure

hacker_homie 5 days ago

But it is easier to implement and maintain so it will continue to be the default.

hananova 4 days ago

The previous company I worked for did this kind of frequent expiration, made for a good 2-3 days off every 3 months because I sure as hell wasn't going to set an alarm on the date.

perlgeek 4 days ago

Stealing session tokens is a common technique to get around MFA, deployed by malware everywhere.

I don't like it, but frequent reauth does limit the blast radius of stolen session tokens.

kwanbix 4 days ago

I just joined a fintech company. It is so crazy, everything logs out daily, to login you have to input a complex password plus the 2FA, you have to run everything through a Citrix VDI. Really bad.

  • nofunsir 4 days ago

    Only once a day? Sounds heavenly. Try every time you turn around and use your air-gapped dev PC for 5 minutes, while trying to keep a reference PDF from online up on your corporate PC to read.

b0a04gl 4 days ago

that line "useless password expiration policies" kinda undersells the real damage honestly. it's not just about annoyance or people incrementing numbers. i've seen orgs where users literally email themselves passwords just so they don't forget the new one every 30 days. the entire system becomes hostile to secure behavior. no one talks about how these policies quietly push people away from good opsec habits. like the policy itself becomes the threat model.

timewizard 5 days ago

> What are we really checking?

That the security policy for the user and the resulting access key hasn't changed their level of access?

Identity, while the most common use case, is only half the system when federating logins.

  • paxys 5 days ago

    Why would you need to reauth for that?

pqdbr 5 days ago

I'm trying to understand why my Rails application constantly logs me out in my iPhone/Chrome.

The same web app stays logged in forever in my mac and I access both of them with the same time intervals.

flashblaze 4 days ago

Might be tangent, but Cursor has this the worst. Each time you close the browser and open, you're logged out. I have no idea why they do this.

osigurdson 4 days ago

Google hasn't asked me to re-enter my password for years. If your users are the product this must make financial sense.

phkahler 4 days ago

No, but it's a good excuse to require MS authenticator on my phone...

doodaddy 5 days ago

Zero trust states that you don’t implicitly trust an entity even if they were previously authenticated. So is this a critique of zero trust? More productive might be to say that we shouldn’t blindly force reauth if our risk profile doesn’t warrant it - just like any security mechanism.

temporallobe 4 days ago

This kind of goes along with my ongoing pet peeve about DX in general. There are very few organizations I’ve worked with that actually care and put their devs first. Case in point, I worked on a contract a few years ago with very frequent reauths where you had to enter your PIV card PIN about every 30 min. Obviously something was not configured correctly, but when we complained we were told that that was their security policy and to go pound sand. It made everyone so frustrated that productivity took a huge nosedive. I remember one day I was in the middle of trying to analyze something very tedious and having anxiety about the next time that dialog would prompt me for my PIN. Sure enough it happened, and I just gave up. I left my laptop, took a walk, and did nothing for the rest of the day. Eventually someone important petitioned for us and it was fixed, but I can’t begin to calculate how much money this wasted in terms of unproductive contract hours.

lapcat 5 days ago

OMG I wish that someone would tell this to Apple.

Apple's developer services, such as App Store Connect, actually use session cookies. It's infuriating.

  • cosmic_cheese 5 days ago

    Google’s the one I have the most trouble with in this regard. The more things you sign into the worse it gets, seemingly, which really sucks if for example you’ve got a bunch of Android test devices and simulators sharing test accounts. A high profile example is how on the WAN Show, Linus or Luke always get booted out of the show Google Doc and have to sign back in at some point during.

    • gsa 5 days ago

      Google is pretty frustrating. I switch between my desktop and laptop frequently and sometimes browsers as well. The reauth dialog pops up two weeks for every login - usually just when I'm about to hop on a meeting.

  • andrewmcwatters 5 days ago

    Uh, session cookies being one of the most fundamental pieces of authentication tech, there's nothing wrong with them. This is like saying, "example.com actually uses HTTPS. It's infuriating."

    Do you mean that you have to reauth across domains? Those still use session cookies.

    Edit: I'm dating myself here, but as far as I can tell apparently sometime between 2010 and 2011, developers started referring to session cookies as cookies with the lifetime of a browser session and not to cookies which contain session data.

    If anyone can correct me on that timeline, I'd appreciate it. Sorry for the confusion in my comment.

    • paxys 5 days ago

      No, sites use persistent cookies, which remain on your browser after you have closed the tab. Session cookies are wiped out automatically after every session.

      • chowells 5 days ago

        Note that modern web browsers do not define a session end as "when you close your browser" unless you hunt for and enable settings to make them do that. Session cookies will happily survive a browser restart by default, because browser makers know that most users don't consider closing their browser to be ending any kind of session.

      • ffsm8 5 days ago

        I think some developers will interpret the term "session cookie" differently then that, because a "session" is usually just something that's tracked in a backend, and an identifier for this session is often written in a cookie

        Hence... Session cookie, even if set without expiration date

      • thaumasiotes 5 days ago

        Session cookies are cookies that identify a session. They last however long you specify. A bank forces quick session expiry. Amazon doesn't.

        Compare https://docs.djangoproject.com/en/5.2/topics/http/sessions/ .

        > To use cookies-based sessions, set the SESSION_ENGINE setting to "django.contrib.sessions.backends.signed_cookies".

        > When using the cookies backend the session data can be read by the client.

        > A MAC (Message Authentication Code) is used to protect the data against changes by the client, so that the session data will be invalidated when being tampered with. The same invalidation happens if the client storing the cookie (e.g. your user’s browser) can’t store all of the session cookie and drops data.

      • [removed] 5 days ago
        [deleted]
      • koakuma-chan 5 days ago

        I set my browser to clear cookies on exit so that my cookies cannot be stolen by malware.

    • voxic11 5 days ago

      > Session cookies are temporary data files stored on a user's device to maintain a user's session on a website or application. They are automatically deleted when the user closes their browser or exits the application, unlike persistent cookies which can store information across sessions.

      Most sites do not use session cookies for auth, they use persistent cookies.

    • [removed] 5 days ago
      [deleted]
manish_gill 5 days ago

Okta / Lumos are the biggest offenders of this.

  • mook 5 days ago

    I suspect in that case it's to get their name in front of people's faces for marketing purposes. If things are actually seamless enough that you don't need to re-auth, you won't be reminded that their company exists.

bravesoul2 5 days ago

They dodged what to do about SSO and SAML. With SAML I don't necessarily know (as a coder) who will be the IdP or what protocol there will be for up to date authorisation info.

nottorp 4 days ago

That's okay, soon we'll have 8 hour ssl certs to go with this crap.

sangeeth96 5 days ago

I disagree with the general advise behind this, even when I'm in a household with trusted (most of the time) family members. Forcing a re-auth ensures that even if I forget to lock my machine/browser, someone can't snoop around. I want this to be the norm especially for my Macbook since for whatever reason, I might forget to lock or have some program running that'll force the laptop to not auto lock out (e.g. while downloading something that takes a long time) so I don't want someone to be able to seize that opportunity.

It's the same reason I intentionally lock up apps with TouchID when there's remotely anything sensitive in there. I just don't want someone to be able to snoop if I forget to lock my phone.

I'll say however, there should be easier ways to reauth in such scenarios. Like in my case, TouchID is not very disruptive to my work even if a prompt appears. I'll also say it's probably stupid to lock out when there's continuous activity (should lock based on inactivity period).

The worst offenders in my experience are banking apps. They:

  - Force logout sometimes regardless of ongoing activity
  - Log out as soon as I close the tab
  - Log out when I press the back/reload button
  - After logging out, impose a mandatory inactivity period before I can login again (this is just the most idiotic thing EVER)
  - Use JS to block any kind of copy/paste operation on username/password fields
  - Never integrate with modern auth mechanisms, not even app-based TOTP!
  - Have crazy password expiry windows (like every quarter) and force password change when your previous password expires, regardless of how strong they are
  • gs17 4 days ago

    > Log out as soon as I close the tab

    For a banking app, I think this is fine. A lot of people aren't aware closing a window isn't logging out. The rest of that is dumb, though.

    • sangeeth96 4 days ago

      Nah, that is dumb too. I get what you’re saying though. They could even ask and confirm if that’s the case while logging in and let me have a persistent session on my own machines.

briffid 4 days ago

I'm so tired of the enforced password changes, that I just write them on a post-it note now.

motohagiography 2 days ago

recently came to appreciate the irony in proving who we are via catchpas, password complexity, and context switching 2FA is that any security method without personal irritation will get automated and broken. therefore, all security requires for us to prove the authenticity of our being by demonstrating suffering somehow- and an authentication method without evidence of suffering cannot prove we are real.

it's funny, but tracks infosec life pretty well, that we've stumbled into a proof that the necessary condition for a system to verify we are alive and are our authentic being is to offer up some minor suffering to it.

willis936 4 days ago

I litigated the "sign back into SSO and every downstream login every four hours" with my IT team. They held their ground. So much money is being lit on fire with the time wasted.

FrancoisBosun 5 days ago

Heroku's 25 hours comes to mind... this is so infuriating and annoying.

exabrial 5 days ago

lol tell that to the people that want 15 day length TLS Certs.

jillesvangurp 4 days ago

A curious thing with security is that a lot of measures companies take aren't about your security but about liability and control. Most security theater is motivated by that. Your inconvenience is collateral damage to that. Apple and Google don't worry about you getting hacked but about you suing them after you get hacked. That's the risk they are mitigating. Or worse, you jumping ship to the competitor. They want you dependent on your account with them.

So, when Google single signs you out mid meeting (has happened to me), they don't care about how stupidly annoying that is. That's just them asserting that if anything bad happens to you, it was your own fault and not their failing.

And then a secondary thing that makes life even harder is that instead of working together they are considering single sign on mechanisms as control points that they can leverage to keep the relationship with 'their' users exclusive. So Google and MS both do very similar things but they don't trust each other's Identity Providers (IDP). That's not an accident. That's intentional. MS has been on a decades long mission to 'own' all logins, and of course they've been failing to get there just as long. Likewise, Google and Meta have been fighting over this as well. And the net result is that you don't have just 1 account to worry about but gazillions. That's why every silly little app has its own stupid email/password thing and why onboarding friction is the biggest hurdle to users adopting these.

These are the primary motives driving this mess. Companies don't collaborate, so security stays complex and messy. It's also the reason that passwords (long discredited as a reliable way to authenticate) are still a thing. If we had effective federated IDPs like OpenID where everybody could use and IDP of their choice and use it to authenticate it with pretty much everything and the kitchen sink, you wouldn't be using passwords ever. That was envisioned as early as 20 years ago. Google, MS, Meta, etc. blocked every attempt to make that happen by never mutually trusting each other, or any other IDP not operated by them. They all implement some version of OpenID 2.0 (with enough differences to make supporting all of them a bit of a journey) but they deliberately don't whitelist any external IDPs and jealously continue to fragment the security landscape by guarding their walled gardens.

They've been engaging with each other in backroom standardization attempts ensuring that the status quo is never allowed to change for decades. The latest move in this war: pass keys. Nice solution on paper. But you got to have the Google version of it. And the MS version. And all the rest. Sigh. Because, obviously, by design these will never delegate to each other. They trust each other even less than they trust you.