Security Basics mailing list archives
RE: Password Management
From: "Steve Armstrong" <stevearmstrong () logicallysecure com>
Date: Mon, 24 Apr 2006 21:17:43 +0100
Utz, Jason and list. Utz is correct when looking at LM (Lan Manager) hashes. However NTLM v2 hashes are not stored in this fashion. They are hashed as a single item. Ie the whole of the 255 character space is hashed without breaking it down into bits. Utz was correct the old LM did break the password into two 7 character bits and hashed these separately. Thus even if you had a complex password it could be guessed by a human through reasoning, understanding the target and a good password cracker. LM hashes were still present in Windows 2000, xp and 2003. This does present a security vulnerability as LM hashes are very insecure especially if the administrator has not changed their password from that stored in the LM part of the SAM. It you want to disable LM you can edit a registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa adding a DWORD key named NoLMHash with a value of 1. For more info go here : http://support.microsoft.com/default.aspx?scid=kb;en-us;299656 However, to answer Jason's question no the optimal length for a password is not 7 characters. However, an optimal password is one the user can remember without writing it in a compromisable place. As others have suggested, a pass phrase is more secure as the user is less likely to write it down and they are generally longer with more special characters. Remember the 'easiest' way is to add a password of 15 characters or more. This sets a key indicating to the OS that the user cannot be authenticated using LM. HTH -Nebs Web: www.logicallysecure.com UK IT Sy Forum: www.logicallysecure.com/forum -----Original Message----- From: Utz, Ralph [mailto:rutz () realtime-it com] Sent: 21 April 2006 21:44 To: Jason T. Hallahan; Crawley, Jim Cc: security-basics () securityfocus com Subject: RE: Password Management The reasoning behind 7 being the magic number is because of how the passwords are stored on the DC. Say you have a 9 character password. When it is stored, it is broken down into hashes. Each hash is 7 characters long. So when that password gets stored, it is broken into two hashes, one that is 7 characters full, one that only has 2 characters. The hashes are not padded, so the last hash is weak due to only having two characters in it. When cracking attempts are made against the password, the second hash will be broken very easily and the security of your password will lie in the first hash that is 7 characters full. Hence the thoughts of a 7 character password being the magic number and in all reality, a 10 character password is no more secure than a 7 when you get down to technicalities. It will take the same amount of time to crack, as the second hash will fall while the first is still being broken. -----Original Message----- From: Jason T. Hallahan [mailto:jthallah () gmail com] Sent: Friday, April 21, 2006 12:54 PM To: Crawley, Jim Cc: security-basics () securityfocus com Subject: Re: Password Management I read somewhere that the optimal password length for a Windows system is actually 7 alphanumeric characters... can anyone verify or expand on that? On 4/20/06, Crawley, Jim <Jim.Crawley () yrbrands com> wrote:
Post-it notes on the monitor.
Really though, it's all pretty straight forward. Minimum 6-8
characters, no maximum (try to encourage pass-phrases as they're
easier
to remember and harder to guess than simple words), complexity
(combination of alphanumeric characters), 60 day expiration, 5-20
password history. No exceptions. None, at all. Nill. Nada. Zip.
Most programs/systems there's not much you can do about the
storage of the passwords in the system itself, but if you're talking
about end-users then your biggest worry will be what I said in my
first
line. The best way to avoid this is probably to try to integrate as
many systems as you can to use the same accounts.
Right now we're working on getting all our in-house and
supplier-built systems working off our Active Directory accounts
pulling
the passwords via Kerberos from our domain controllers. This however will also cause the issue of one system being compromised and they all
get compromised. It's a risk/benefit write-off thing - we think the risk is worth it as the other option IS the dreaded post-it notes. -----Original Message----- From: Securi Net [mailto:securinet2004 () yahoo ca] Sent: Friday, 21 April 2006 2:44 AM To: security-basics () securityfocus com Subject: Password Management Hello list members, Does anyone know of any password management standards that are out there? I am looking at drafting an Enterprise wide strategy for managing passwords, which should encompass change, exceptions to change,
password
storage security, secure practices, categorization of accounts, etc. What I am trying to accomplish is to give a robust and resilient structure to all the best practices out there around password management. I don't expect to find a silver bullet, but would welcome any
feedback.
Regards CP __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
------------------------------------------------------------------------
- This List Sponsored by: Webroot Don't leave your confidential company and customer records
un-protected.
Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php
------------------------------------------------------------------------
--
------------------------------------------------------------------------ -
This List Sponsored by: Webroot Don't leave your confidential company and customer records
un-protected.
Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php
------------------------------------------------------------------------ --
------------------------------------------------------------------------ - This List Sponsored by: Webroot Don't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php ------------------------------------------------------------------------ -- ------------------------------------------------------------------------ - This List Sponsored by: Webroot Don't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php ------------------------------------------------------------------------ -- ------------------------------------------------------------------------- This List Sponsored by: Webroot Don't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php --------------------------------------------------------------------------
Current thread:
- RE: Password Management, (continued)
- RE: Password Management Donald N Kenepp (Apr 25)
- RE: Password Management cv arun (Apr 25)
- Re: Password Management Ansgar -59cobalt- Wiechers (Apr 26)
- RE: Password Management Utz, Ralph (Apr 24)
- Re: Password Management James Harless (Apr 24)
- Re: Password Management James Harless (Apr 24)
- Re: Password Management Derek Schaible (Apr 25)
- Re : Password Management frrrwww-ml (Apr 25)
- RE: Password Management Beauford, Jason (Apr 24)
- Re: Password Management PCSC Information Services (Apr 24)
- RE: Password Management Steve Armstrong (Apr 25)
- RE: Password Management Utz, Ralph (Apr 25)
