Comment by montebicyclelo

Comment by montebicyclelo 4 days ago

160 replies

Forced password rotation and expiry seems the bigger problem; given that it causes people to get locked out so often, (e.g. if pw expires when on holiday), — often then requiring travelling to IT, or at least a few hours trying to get IT on the phone to reset, or chasing up colleagues who aren't locked out to get in touch with IT.

Many (most?) companies still do it, despite it now not being recommended by NIST:

> Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically)

https://pages.nist.gov/800-63-3/sp800-63b.html

Or by Microsoft

> Password expiration requirements do more harm than good...

https://learn.microsoft.com/en-us/microsoft-365/admin/misc/p...

But these don't seem to be authoritative enough for IT / security, (and there are still guidelines out there that do recommend the practice IIRC).

chillfox 4 days ago

The requirements usually don’t come from IT.

It’s usually on the checklist for some audit that the organisation wants because it lowers insurance premiums or credit card processing fees. In some cases it’s because an executive believes it will be good evidence for them having done everything right in case of a breach.

Point being the people implementing it usually know it’s a bad idea and so do the people asking for it. But politics and incentives are aligned with it being safer for the individuals to go along with it.

  • BitwiseFool 4 days ago

    I belonged to an organization that had password complexity requirements. That's normal and understandable. However one requirement was that no part of my password could contain a three character subsstring that was included in my full name. I won't give my real name here, but sadly it includes some three letter subsequences that are somewhat common in many English words. I can understand a policy that prevents someone from using "matthew1234" as Matthew Smith's password, but this rule also prevents such a person from using "correcthorsebatterystaple" because it has 'att' in it.

    Turns out, this rule was not from IT. It was a requirement from the cybersecurity insurance policy the organization had taken.

    • lesuorac 4 days ago

      > Turns out, this rule was not from IT. It was a requirement from the cybersecurity insurance policy the organization had taken.

      I wonder if some of these constraints are to try to find a way not to pay out on the policy.

      • ang_cire 4 days ago

        It absolutely was/is.

        To bastardize Douglas Adams: For-profit insurance is a scam; breach insurance, doubly-so.

  • beaugunderson 3 days ago

    > Point being the people implementing it usually know it’s a bad idea and so do the people asking for it. But politics and incentives are aligned with it being safer for the individuals to go along with it.

    we've gone through HITRUST several times and I just told them we weren't going to do forced password rotation since NIST had updated their guidance. it was fine!

    and every time we get a vendor security questionnaire I just say "no, we don't do this because it's old guidance" and link to NIST... no one has ever complained.

    • throwaway1854 16 hours ago

      is a judge going to think the same way if insurance doesn't pay and you take them to court though, in the event of a breach, etc.

      After all it's perfectly possible to do interior work in your house that isn't up to code, but if it burns down in a fire, the insurance company will investigate and may not pay out if they find out.

      • beaugunderson 12 hours ago

        in this case I'd be more worried about being in court trying to explain why we knowingly used an inferior approach (forced password changes) when we knew the newer approach resulted in higher security... that is a vastly different analogy than being "out of code". additionally, noting the deviation from the old, less secure standard up front (in our HITRUST submissions) and with our customers (in their vendor questionnaires) provides evidence that we are going above and beyond vs. shirking a duty.

    • Perz1val a day ago

      Should you also question their competence? They should know, right?

      • beaugunderson 12 hours ago

        this is less about competence and more about update schedules... we happen to feel like it's worth incorporating guidance that's newer than what HITRUST or our customers require us to (though the guidance in question was updated by NIST eight years ago... sometimes it takes a long time for this stuff to change)

  • ToucanLoucan 4 days ago

    Just an unbreakable law of the universe.

    "Why did this stupid shit happen? Oh, it's money again."

    • ajmurmann 4 days ago

      It's not money but inertia of very large systems. All these password changes cost money as well. If anything it's a market failure that insurance companies seem to have too little incentive to update their security requirements. This would likely be solved by reducing friction with both evaluating insurers in detail and switching between them.

      • bunderbunder 4 days ago

        It's also a sort of moral hazard problem.

        If you, the person in charge of these decisions, allow an incumbent policy - even a bad one - to stand, then if something goes wrong you can blame the policy. If you change the policy, though, then you're at risk of being held personally responsible if something goes wrong. Even if the change isn't related to the problem.

        It's not just cybersecurity. I have a family member who was a medical director, and ran up against it whenever he wanted to update hospital policies and standards of care to reflect new findings. Legal would throw a shitfit about it every time. With the way tort law in the US works, the solution to the trolley problem is always "don't throw the switch" because as soon as you touch it you're involved and can be held responsible for what happens.

SAI_Peregrinus 4 days ago

Does anyone not add the year & month of the last password change to the end of their password? E.g. PascalCasePassphraseGoesHere2025-06, then at the next required change in (for example) 6 months: PascalCasePassphraseGoesHere2026-01. It almost certainly fits the inane "letter, number, and special character" requirements they probably have, complies with "different from your last X passwords", and is easy to keep track of the change interval. It also adds no security whatsoever! A user could almost certainly get away with Password2025-06, etc.

  • pcardoso 4 days ago

    I once wrote a script to change my password randomly X times and then back to my original password. Worked like a charm.

    • claudex 4 days ago

      There are policies to prevent changing the password more than once a day to prevent that. I've encountered it in several places

      • thih9 4 days ago

        Fascinating. In other words:

        In order to force the user to change their password more frequently (long term), the user is prevented from changing their password too frequently (short term).

        I wonder whether the person who added that is actually confident that the benefits outweigh the drawbacks or is that a case of tunnel vision.

      • eqvinox 4 days ago

        There are also systems that keep a history of old passwords just to prevent you from reusing one.

      • Viliam1234 2 days ago

        The obvious solution is to have a Monday password, a Tuesday password, etc.

    • HocusLocus 4 days ago

      Password changed.

      Password changed.

      Password changed.

      Error at : broken pipe

  • repeekad 4 days ago

    I’ve personally experienced the password change require that “more than X characters be different than the old password”

    • valleyer 4 days ago

      Um, that's a really bad sign...

      • rocqua 4 days ago

        No, you can do it safely. The idea is to have the password renewal process also ask for the previous password.

        This means the password changing method doesn't need to store a plaintext password, but still has access to the old plaintext password when changing. It's still not a great idea, but that's because nagging your users will see them choose worse passwords.

      • klysm 4 days ago

        To elaborate for the uninitiated, that means they are storing it in plaintext somewhere.

      • dspillett 4 days ago

        Not if the check is done client-side, so the plain password never leaves you local domain. Of course the check being done client-side means that it isn't difficult to skip if you are inclined to make a smidgin of effort.

    • [removed] 4 days ago
      [deleted]
  • deathanatos 4 days ago

    I just let the keyring roll a completely new password. For some reason, all of my employers do require this insanity, but not on the one password I have to actually type.

    • bisby 4 days ago

      I once had an employer that required us to use passworded SSH, and disallowed SSH keys, because they couldn't enforce that the SSH keys were passphrase protected, so just turned that option off.

      They said it was a PCI requirement, or something.

      • yardstick 4 days ago

        PCI requires multi-factor auth these days, so you’ll likely find now the ssh password will be your password plus a OTP at the end.

      • jerf 4 days ago

        This is not as illegitimate as it may sound to you. You may not hear about "getting someone's SSH keys" very often, because we only hear about "vulnerabilities" on places like HN and this isn't a "vulnerability" in any software.

        But getting someone's SSH keys and then running off and doing other things is a very normal part of any focused attack in which attackers use some foothold to start pivoting into your systems. It's one of the first things an attacker will check for, precisely because it's high likelihood they'll find one and high reward if they do. It's an extremely serious threat that you don't hear about very often, just like you may not hear about "the sudoers file left something open with passwordless access it shouldn't have and the attackers lifted themselves up to root from there" even though it's a major part of many actual incursions. I'm aware of multiple cases in which someone's passwordless SSH key played a part of the process.

        So that really is a legitimate problem and turning them off is not security theater but can have a real impact on your security posture. The problem is solved nowadays with adding other auth to the process like proving possession of a physical token as part of the login process.

    • SAI_Peregrinus 3 days ago

      Whenever I don't have to type it, that's what I do. It's the login (or password manager password) needing this counterproductive crap that gets the "append a date" treatment. It's a 10-word diceware passphrase, only used for that login anyway, it's not getting breached if it's stored in even a remotely secure manner (even an unsalted hash would be safe).

    • delfinom 4 days ago

      They do it because their IT departments are checklist monkeys with no actual brainpower there, AND/OR they have cybersecurity insurers that mandate it who also have nobody with actual brainpower working there.

  • kelnos 2 days ago

    When I first set up an account at a new org or whatever, I don't think about the possibility of rotation later, but once I get my first "your password has expired and needs to be reset" message, I just add a counter to the end of the password that I increment each time I'm required to change it. Successive passwords have no less entropy than the original password, anyway.

    Fortunately, I haven't encountered a system that does a similarity check when changing the password.

    • [removed] 2 days ago
      [deleted]
lucideer 4 days ago

> But these don't seem to be authoritative enough for IT / security,

As someone who's worked for a cybersecurity team that was responsible for enforcing password rotations in a company, trust me when I say that nobody was more eager to ditch the requirement than we were. This is enforced by external PCI auditors & nobody else.

Fwiw, PCI DSS 4.0 has slightly relaxed this requirement by allowing companies to opt-out of password rotation if they meet a set of other criteria, but individuals employed as auditors tend to be stuck in their ways & have proved slow to adapt the 4.x changes when performing their reviews. They've tended to push for rotation rather than bothered to evaluate the extra criteria.

asveikau 4 days ago

Sometimes when I log into a random website and I see a forced password reset, I wonder if it has been compromised, rather than setting a time-based expiry.

If a site owner knows that certain accounts are part of a database breach or something, a reasonable step would be to force the users to change the password at next login.

  • mooreds 4 days ago

    Another common reason to do a force password reset is if they've moved authentication providers and were not able to bring their hashes along. Some providers don't allow for hash export (Cognito, Entra).

    • account42 4 days ago

      Or just if they changed to a more secure hash algorithm themselves and want to upgrade users still on the older insecure one.

      • blueflow 4 days ago

        This can be done at login time without the user noticing, as you have the plaintext password for a moment.

        • mooreds 4 days ago

          Yeah, this is the best practice. We offer that in our product.

          But it's possible that you could follow the best practice and still force a reset. This could be because:

          * the customer or provider doesn't want to wait for everyone to log in

          * they've waited for N months and now there is a block of users who have not logged in yet and they think it is worth the user annoyance to just force them all to reset their password

      • RealStickman_ 4 days ago

        They could do that by comparing against the old hash and if it matches generate the new hash to store somewhere.

flerchin 4 days ago

Last time I brought this to our cyber folks, they pointed out that PCI standards require password rotation. So it depends upon which auditors you care about more.

efitz 4 days ago

I’ve always said “lockout turns a possible password guessing attack into a guaranteed denial-of-service attack”.

Worse, it means that if an attacker can guess or otherwise obtain user names, the attacker needs nothing but network access to deny service to your users.

My favorite example is the iOS policy where it added more and more time before the next login attempt was allowed; small children kept locking their parents out of iPads and iPhones for weeks or months.

brikym 4 days ago

I think a lot of people in IT know these things but having a 'strict' auth policy makes them seem competent so they just go with that. Besides there is not much incentive to make authentication efficient since the frustrated users are a captive audience not paying customers.

ipython 3 days ago

I just had this argument with a state wide government website. I have to log in to this site maybe once per year to update contact information and update a few fields. Unfortunately, that site silently deactivates your account automatically every 90 days. So I'm forced to change the password literally every time I log into the dumb thing.

They refused to establish MFA or passkeys - and instead insist that "NIST is the minimum recommendation for cybersecurity... and we take cybersecurity very seriously... to ensure the safety and security of the citizens... therefore we will not change our policy on mandatory account lockouts or password change requirements."

thousand_nights 4 days ago

if my password has not been leaked it's insane that providers think i should rotate it, but this still seems to be standard practice for some completely baffling reason

  • dcow 4 days ago

    There’s weird math that says your password or generally a secret key is more secure if it’s existed for less time (generated fresh) because there hasn’t been as much time to brute force it. I don’t believe it but some hardcore types do.

    • benlivengood 4 days ago

      That might apply to short passwords but passphrases are recommended and if they're >20 characters then brute forcing is not going to make meaningful progress toward them while we are all alive.

    • deathanatos 4 days ago

      > I don’t believe it but some hardcore types do.

      … which is why the password has sufficient entropy such that it will take until the heat death of the universe to brute force it. We're 3 months closer to the heat death of the universe … oh no?

    • efitz 4 days ago

      Time based expiry (“freshness”) is not about likelihood of brute force. Brute force prevention is handled by delay/lockout policy for online systems, and by password complexity rules or key length/cipher combinations. Nobody sane uses such rules in such a way that make brute force “slightly impractical”- security practitioners always choose lifetime-of-the-universe-scale complexity if given a choice.

      Instead, expiry is about “what are the chances that the secret has already leaked” and about choosing an acceptable compromise between rotation frequency and attacker loiter time - assuming that the system hasn’t been back doored, let’s put an upper limit on how long an attacker with the secret has access. And incidentally it also means that if you somehow fail to disable access for ex-employees, that lingering access will eventually take care of itself.

      But as the article points out, expiry has always been controversial and it’s not clear that on balance expiry is a good control.

    • fsckboy 4 days ago

      >I don’t believe it but

      you have to believe it, it's true, you just think it's not the greatest threat or that the response to mitigate it (for example, using a pattern of temporary passwords to facilitate remembering them) would be worse than the disease.

      • lurking_swe 4 days ago

        if it causes 90% of people to just enter a simpler password, out of frustration and “fatigue”, then this is irrelevant IMO. Theory doesn’t take into account human behavior.

        It’s especially annoying when a company enforces these brain dead policies on employees. You want people to waste mental effort changing their passwords by 1 letter every 3 months, just to appease some IT manager? Give me a break lol.

        I’d rather have a long complex password that i remember and remember ONCE.

      • dcow 4 days ago

        No, like I don’t believe the math. It’s not about not wanting to believe the math. I don’t believe the mathematical conclusion is practically true even if there may be something theoretically interesting to talk about, like the monty hall problem.

    • numpad0 4 days ago

      it's BSD /etc/passwd being 666 or something, so anyone could brute force it in 180 days, therefore passwords has to have max complexity within 8 bytes limitation and rotated every 180/2 days... who's even started using computers before it was patched?

vrighter 4 days ago

Stuff like ISO27001 still demands it. We have to rotate passwords, against modern cybersecurity practice, in order to comply with an information security standard.

  • rjgray 4 days ago

    ISO 27001 doesn't say this. The control implementation guidance (ISO 27002) specifically cautions against requiring frequent password changes.

  • qualeed 4 days ago

    Most frameworks, at least most that I am aware of (north america) have removed password rotation requirements entirely, or have exemptions in place if you have MFA, use risk-based access policies, etc.

    Often when people say this, they are parroting their assessor. But not every assessor graduated at the top of their class, or cares to stay updated, or believes that they know better, etc.

BrandoElFollito 4 days ago

These recommendations live in a mythical world, but not in a company.

In a company, you have individual passwords known by many people. They are written here and there. They are passed to other orgs because something.

In this ideal world of a non company, you have MFA everywhere, systems with great identity management wher you get bearers to access specific data, people using good passwords and whatnot.

This is not true in a company. If this is true in yours, you are the lucky 1%, cheers (and I envy you).

A good cybersecurity team will try to find reasonable solutions, a password rotation is one of them, in a despaired move to mitigate risks.

And then you have trauma that will say "we cannot change the password because we don't know where it is used".

Armchair cybersecurity experts should spend 24h with a company SOC to get an idea of the reality we live in.

paradox460 4 days ago

IT seems to be a haven for minor dictators to enact their power fantasies

throwaway843 4 days ago

1234abcd@ it is then for all my accounts.

  • xp84 4 days ago

    Password rotation does nothing more than get you to use

      1234abcd@
      1234abcd@1
      1234abcd@2
      1234abcd@3
    
    I'm becoming pretty convinced that at least in the corporate space, we'd be way better off with a required 30 character minimum password, with the only rules being against gross repetition or sequences. (no a * 30 or abcd...yz1234567890 ). Teach people to use passphrases and work on absolutely minimizing the number of times people need to type it by use of SSO, passkeys, and password managers. Have them write it on a paper and keep it in a safe for when they forget it.

    This is a better use of the finite practical appetite for complying with policies than the idiotic "forcibly change it every 90 days" + "Your 8 character password needs to have at least one number, one uppercase, and one of these specific 8 characters: `! @ # $ % ^ & *`"

    By the way, to quote Old Biff Tannen, "oh, you don't have a safe. GET A SAFE!"

    • tharkun__ 4 days ago

      Don't tell them. I don't want to have to enter 30 characters. And it does not help for the people you'd need it for anyway.

          1234567890a1234567890@1234567890
      
      Better?

      No, just longer to type. You can't fix stupid people by making the life of non-stupid people worse.

      All you do is for non-stupid people to stop caring and do the easiest thing possible too.

      • MrDrMcCoy 4 days ago

        That's why we recommend passphrases. That 30 character requirement becomes much easier when it's 3-4 words with a separater. Faster to type, too.

      • wycy 4 days ago

        Correct-horse-battery-staple!! is 30 characters and quick to type

        • tharkun__ 4 days ago

          Which does nothing for the "stupid people". I.e. the ones that we put these rules into place for. They'll do what I posted instead (or something else easily guessable and the cycle continues - technological solution to a people problem, i.e. doesn't work)

    • bigfatkitten 4 days ago

      In the corporate space you should move away from passwords entirely.

      Smart cards have had pretty solid ecosystem support for the past two decades thanks to the U.S. Government and HSPD-12, and now we’ve got technologies like webauthn that make passwordless authentication even easier.

      • majkinetor 4 days ago

        And require smart card, reader, drivers etc... nah

    • osigurdson 4 days ago

      In the enterprise, the cost of inconvenience to users is effectively zero. Perhaps even negative as security theater can be a pretty effective way to convince management that something is being done.

    • eru 4 days ago

      There's one weird trick to get people to have strong passwords (even if you force rotation): don't allow them to pick their own passwords. Randomly generate the passwords for them.

      • pixl97 4 days ago

        Also don't allow them to copy paste the password. And especially don't allow them to use any kind of password wallet. They will really love you for this and you won't get an excessive number of calls to reset forgotten/lost passwords.

    • kobieps 4 days ago

      Preach. Gmail doesn't force password rotation, and one can just imagine the type of attacks they must sustain...

      Unfortunately corporate policies evolve at glacial speeds...

    • TZubiri 4 days ago

      "Your password is too similar to your previous password"

      Hmm, how would you know that.

      • Uvix 4 days ago

        Don't you generally have to enter the current password to change it to a new one?

        • TZubiri 4 days ago

          Interesting. I guess you could do it on the frontend by asking for old and new passwords simultaneously and sending the hashes to the backend.

          That said, it means that you can skip this check by hacking around the front end check haha

      • tharkun__ 4 days ago

        By making it less secure. Like those auth schemes back in the day that sounded great in theory until you figured out that in order to implement them the provider had to store them un-hashed. No thanks.

    • Retric 4 days ago

      I’m doubtful a 30 digit minimum password is a meaningful improvement over a 20 digit password here. Meanwhile actually typing in very long passwords adds up across a workday/year especially with mistakes.

      • xp84 4 days ago

        I think if done right, typing that password should be more like a once a quarter exception rather than a daily occurrence.

        Granted - there are blockers to getting there. IDK why for example, macOS can't use Touch ID from a cold boot, that's stupid, at least when there haven't been too many failed attempts or anything.

      • imtringued 4 days ago

        You're only supposed to type your password at most once a day to sign into SSO.

        • Retric 4 days ago

          Then how do you suggest authenticating not just in the morning but after lunch, going to the bathroom, any physical meetings, etc?

mx_03 4 days ago

Bad habits are hard to kill.

Sometimes you just cant convince people that something is no longer recommended.

  • viraptor 4 days ago

    You don't really need to convince people who implement it. You need to convince people creating certification/law, so PCI/SOC2/whatever. I'm still posting every time something like "for the record, I know we have to legally do this, but it's pointless and actually makes us less secure" for a few things.

b0a04gl 4 days ago

been thinking same every time it asks me to reset without warning. i just assume breach and rotate everything linked to that email. if it’s not a breach and just some dumb policy, then congrats they made me waste 30mins securing nothing.

SpaceNoodled 4 days ago

It honestly forces me to keep a Post-It on my monitor with a hint to this season's new password suffix.

olivermuty 4 days ago

Most SOC2 vendors still require rotation, it is unbelieveably frustrating.

free652 4 days ago

Jesus, it was so annoying so I kept appending a letter after each password reset -> a through z

thankfully my current company let me keep my password for the last 3 years

  • sakesun 4 days ago

    Password similarity rule was not enforced ?

    • lytedev 4 days ago

      Doesn't enforcing this require storing the password in cleartext somewhere, which is a much more dangerous concept to begin with?

      • eru 4 days ago

        In practice, that's probably how it's done. But in theory: no.

        Assume you keep the hashes of the last few passwords around. Then you can search in the 'neighbourhood' of the new password to check if any of this matches the old password's hash.

        By neighbourhood, I mean something like within a small edit-distance, where the kind of edits depend on what measure of similarity you want.

        If you only care about similarity to the last password (or care about that one specifically), then that's even easier: during the password change procedure you can have clear text access to both the old and the new passwords without storing them anywhere unhashed: because the user has just entered both passwords.

      • tbrownaw 4 days ago

        Similarly of new vs current password is simple enough by just requiring the current password as part of the password change call. Which is a good idea anyway so someone can't just walk up and change your password if you forget to lock things over lunch.

        Similarly vs older passwords is what would be an issue.

        • tiltowait 4 days ago

          > Similarly vs older passwords is what would be an issue.

          Which isn't unheard of, though it's been years since I've seen it.

      • medvezhenok 4 days ago

        It probably requires some sort of decreased security (if the password hash is truly slow & secure, it would be hard to enforce dissimilarity); but there might be other methods that leak less than cleartext (like salting and storing hashes of overlapping/separate n-grams from the previous password and checking for number of similar n-grams; etc). Or as another commenter suggested checking all passwords within edit distance 1 (though if you can do that, your password hashing algorithm is likely too fast).

      • sakesun 4 days ago

        Interesting perspective. Wonder why so many SaaS service currently enforce this.

    • [removed] 4 days ago
      [deleted]
tzs 4 days ago

> Forced password rotation and expiry seems the bigger problem; given that it causes people to get locked out so often, (e.g. if pw expires when on holiday), — often then requiring travelling to IT, or at least a few hours trying to get IT on the phone to reset, or chasing up colleagues who aren't locked out to get in touch with IT.

That is extremely annoying.

On the other hand if I was a manager and that happened to someone I managed we'd definitely have a conversation where I would acknowledge that forced password rotation is idiotic, but also point out that our password expiration is 90 days after the most recent change, which is 12 weeks and 6 days, and ask how come they don't have a "deal with stupid password expiration" event on their calendar set to repeat every 11 weeks?

That gives them 13 days warning. Vacations can be longer than 13 days, but I'd expect that when people are scheduling vacations they would check their calendar and make arrangements to deal with any events that occur when they won't be available. In this case dealing with it would mean changing the password before their vacation starts.

I don't expect people to go all in on some fancy "Getting Things Done" or similar system, but surely it is not unreasonable to expect people to use a simple calendar for things like this?

  • londons_explore 4 days ago

    The fact is that you might have an employee who is a real expert in 3rd century archaeology, but scheduling and password changes just aren't what they are here to do. They don't want to do it, don't know how to do it, and don't want to learn how to do it.

    • tzs 4 days ago

      So when they accept an invitation to give a lecture six months from now on the discoveries at the Gudme Hall Complex in Denmark how do they arrange to make sure they will show up?

Xss3 4 days ago

Hot take, password requirements are a necessity to prevent id10t errors.

Another hot take, calling them passwords instead of pass phrases was a mistake.

People have no problem making a secure pass phrase like 'apophis is coming in 2029’.

It uses special chars and numbers, but some websites would reject it for spaces and some for being too long.

I say these are hot takes despite aligning with NIST because I've never seen a company align with them.

  • afiori 4 days ago

    "password too long" for password shorter than a megabyte is the most idiotic error ever created.

    It only makes sense in HTTP basicauth and other system that keep plaintext passwords.