{"id":968,"date":"2012-12-14T00:00:23","date_gmt":"2012-12-14T05:00:23","guid":{"rendered":"http:\/\/jlg.name\/blog\/?p=968"},"modified":"2013-09-01T23:24:49","modified_gmt":"2013-09-02T03:24:49","slug":"i-cant-keep-on-renaming-my-dog","status":"publish","type":"post","link":"http:\/\/jlg.name\/blog\/2012\/12\/i-cant-keep-on-renaming-my-dog\/","title":{"rendered":"I can&#8217;t keep on renaming my dog"},"content":{"rendered":"<p>A clever meme hit the Internet this week:<\/p>\n<p align=\"center\"><em>\u201cStop asking me to change my password. I can\u2019t keep on renaming my dog.\u201d<\/em><\/p>\n<p>If you (or the employees you support) aren\u2019t using a password manager, clear off your calendar for the rest of the day and use the time to set one up.\u00a0 It\u2019s easy security.\u00a0 Password managers make it simple to create good passwords, to change your passwords when required, to use different passwords on every site, and to avoid reusing old passwords.<\/p>\n<p><em>The upside to using a password manager:<\/em><\/p>\n<ul>\n<li>You only need to remember two strong passwords.\u00a0 (One to log into the computer running the password manager, and one for the password manager itself.)<\/li>\n<\/ul>\n<p><em>The downside to using a password manager:<\/em><\/p>\n<ul>\n<li>All your eggs are in one basket.\u00a0 (Therefore you need to pay close attention to choosing a good master password, protecting that password, and backing up your stored passwords.)<\/li>\n<\/ul>\n<p>Generally speaking a password manager works as follows:<\/p>\n<ol>\n<li>You provide the password manager with a\u00a0<strong>master passphrase<\/strong>.<\/li>\n<li>The password manager uses your master passphrase to create (or read) an\u00a0<strong>encrypted file<\/strong>\u00a0that contains your passwords and other secrets.<\/li>\n<\/ol>\n<p>(For deeper details, see\u00a0<a href=\"http:\/\/keepass.info\/help\/base\/security.html\">KeePass\u2019s FAQ<\/a>\u00a0for a brief technical explanation or\u00a0<a href=\"https:\/\/www.dashlane.com\/download\/Security-Whitepaper-Final-Nov-2011.pdf\">Dashlane\u2019s whitepaper<\/a>\u00a0for a detailed technical explanation.\u00a0 For example, in the KeePass FAQ the authors describe how the KeePass product derives 256-bit Advanced Encryption Standard [AES] keys from a user\u2019s master passphrase,\u00a0<a href=\"http:\/\/www.jumpesp.com\/high-sodium-passwords\/\">how salt is used<\/a>\u00a0to protect against dictionary attacks, and how initialization vectors are used to protect multiple encrypted files against known-plaintext attacks.\u00a0 Other products likely use a similar approach to deriving and protecting keys.)<\/p>\n<p>Password managers often also perform useful convenience functions for you\u2014inserting stored passwords into your web browser automatically; generating strong passwords of any desired length; checking your usernames against\u00a0<a href=\"http:\/\/blog.lastpass.com\/2012\/10\/lastpass-sentry-now-checks-your-entire.html\">hacker-released lists of pwned websites<\/a>; evaluating the strength of your existing passwords; leaping tall buildings in a single bound; etc.<\/p>\n<p>The root of security with password managers is in\u00a0<strong>protecting your master password<\/strong>.\u00a0 There are three main considerations to this protection:<\/p>\n<p><strong>(A) Choose a good passphrase.\u00a0<\/strong><\/p>\n<p style=\"padding-left: 30px;\">I\u2019m intentionally using the word \u201cpassphrase\u201d instead of \u201cpassword\u201d to highlight the need to use strong, complex, high-entropy text as your passphrase.\u00a0 (Read my guidance about strong passphrases in TCS\u2019s\u00a0<em><a href=\"http:\/\/info.telecomsys.com\/better-passwords-whitepaper\">Better Passwords, Usable Security<\/a><\/em>\u00a0whitepaper.\u00a0 Or if you don\u2019t read that whitepaper, at least read\u00a0<a href=\"http:\/\/xkcd.com\/936\/\">this webcomic<\/a>.)<\/p>\n<p style=\"padding-left: 30px;\">Your master passphrase should be stronger than any password you\u2019re currently using\u2014stronger than what your bank requires, stronger than what your employer requires.\u00a0 (However, it shouldn\u2019t be onerously long\u2014you need to memorize it, you will need to type it every day, and you will likely need to type it on mobile devices with cramped keyboards.)\u00a0 I recommend a minimum of\u00a0<a href=\"http:\/\/cups.cs.cmu.edu\/rshay\/pubs\/passwords_and_people2011.pdf\">16 characters<\/a>\u00a0for your master passphrase.<\/p>\n<p style=\"padding-left: 30px;\">(Side note:\u00a0 For similar reasons, another place where you should use stronger-than-elsewhere passphrases is with full-disk encryption products, such as\u00a0<a href=\"http:\/\/www.truecrypt.org\/\">TrueCrypt<\/a>\u00a0or\u00a0<a href=\"http:\/\/support.apple.com\/kb\/HT4790\">FileVault<\/a>, where you enter in a password at boot time that unlocks the disk\u2019s encryption key.\u00a0 As Microsoft\u2019s\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/magazine\/2008.11.securitywatch.aspx?=blog#id0080068\">#7 immutable law of security<\/a>\u00a0states,\u00a0<em>encrypted data is only as secure as its decryption key<\/em>.)<\/p>\n<p><strong>(B) Don\u2019t use your passphrase in unhygienic environments.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">An interesting concept in computer security is the\u00a0<a href=\"http:\/\/xkcd.com\/538\/\">$5 wrench<\/a>.\u00a0 Attackers, like electricity, follow the path of least resistance.\u00a0 If they\u2019ve chosen you as their target, and if they aren\u2019t able to use cryptographic hacking tools to obtain your passwords, then they\u2019ll try other approaches\u2014perhaps masquerading as an IT administrator and simply\u00a0<a href=\"http:\/\/www.symantec.com\/connect\/articles\/social-engineering-fundamentals-part-i-hacker-tactics\">asking you for your password<\/a>, or sending you a malicious email attachment to install a keylogger onto your computer, or hiding a pinhole spy camera in the light fixture above your desk.\u00a0 So even with strong encryption you are still at risk to social engineering attacks targeting your passwords and password manager.<\/p>\n<p style=\"padding-left: 30px;\">One way to reduce the risk of revealing your passphrase is to avoid typing it into computer systems over which you have neither control nor trust, such as systems in\u00a0<a href=\"http:\/\/research.microsoft.com\/apps\/pubs\/?id=69367\">Internet cafes<\/a>, or at\u00a0<a href=\"http:\/\/ha.cked.net\/presentations\/Hacking_Internet_Kiosks.pdf\">airport kiosks<\/a>, or at your Grandma Edna\u2019s house.\u00a0 To paraphrase public-service messages from the 1980s, when you give your passphrase to an untrusted computer you\u00a0<em>could<\/em>\u00a0be giving that passphrase to anyone who used that computer before you.<\/p>\n<p style=\"padding-left: 30px;\">For situations where you simply\u00a0<em>must<\/em>\u00a0use a computer of dubious provenance\u2014say, you\u2019re on vacation, you take a wrong turn at Albuquerque, your wallet and laptop get stolen, and you have to use your password manager at an Internet cafe to get your credit card numbers and bank contact information\u2014some password managers provide features like\u00a0<a href=\"https:\/\/lastpass.com\/support_screencasts.php?feature=onetimepasswords\">one time passwords<\/a>,\u00a0<a href=\"http:\/\/lastpass.com\/support_screencasts.php?feature=screenkeyboard\">screen keyboards<\/a>,\u00a0<a href=\"http:\/\/helpdesk.lastpass.com\/security-options\/grid-multifactor-authentication\/\">multifactor authentication<\/a>, and\u00a0<a href=\"http:\/\/help.agilebits.com\/1Password3\/1passwordanywhere.html\">web-based access<\/a>\u00a0to help make lemonade out of life\u2019s little lemons.<\/p>\n<p><strong>(C) Make regular backups of your encrypted file.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">If you have a strong passphrase [(A)] and you keep your passphrase secret [(B)] then it doesn\u2019t matter where copies of your encrypted file are stored.\u00a0 The strong encryption means that your file won\u2019t be susceptible to a brute-force or password-guessing attack even if an attacker obtains a copy of your file.\u00a0 (Password management company LastPass had a\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/LastPass_Password_Manager#Security_breach\">possible security breach<\/a>\u00a0of their networks in 2011.\u00a0 Even so, users with strong passphrases had \u201c<a href=\"http:\/\/news.cnet.com\/8301-1009_3-20060464-83.html\">no reason to worry.<\/a>\u201d)\u00a0 As such you are safely able to make backup copies of your encrypted file and to store those backups in a convenient manner.<\/p>\n<p style=\"padding-left: 30px;\">Some password managers are designed to store your encrypted file on your local computer.\u00a0 Other managers (notably LastPass) store your encrypted file on cloud servers managed by the same company, making it easier to synchronize the password file across all devices you use.\u00a0 Still other managers integrate easily with third-party cloud storage providers (notably Dropbox) for synchronization across multiple devices, or support direct synchronization between two devices over a Wi-Fi network.\u00a0 (In all remote-storage cases I\u2019ve found, the file is always encrypted locally before any portion of the file is uploaded into the cloud.)<\/p>\n<p style=\"padding-left: 30px;\">Whichever type of manager you use, be aware that\u00a0<em>that one file holds your only copy of<\/em>\u00a0<em>all of your passwords<\/em>\u2014it is\u00a0<strong>critical<\/strong>\u00a0that you not lose access to the contents of the file.\u00a0 Computers have\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Ariane_5_Flight_501\">crashed<\/a>.\u00a0 Password management companies have disappeared (<a href=\"https:\/\/twitter.com\/Logaway\">Logaway<\/a>\u00a0launched on May 4, 2010, and ceased operations on February 2, 2012).\u00a0 Cloud services have<a href=\"http:\/\/articles.businessinsider.com\/2011-04-28\/tech\/29958976_1_amazon-customer-customers-data-data-loss\">lost data<\/a>\u00a0and have experienced\u00a0<a href=\"http:\/\/www.zdnet.com\/blog\/saas\/seven-lessons-to-learn-from-amazons-outage\/1296\">multi-day disruptions<\/a>.\u00a0 Protect yourself by regularly backing up your encrypted file, for example by copying it onto a USB dongle\u00a0(whenever you change or add a password) or by printing a hard copy every month to stash in a safe deposit box.<\/p>\n<p>If you maintain a strict separation between your home accounts and your work accounts\u2014for example to keep your employer from snooping and\u00a0<a href=\"http:\/\/boston.cbslocal.com\/2012\/06\/05\/why-employers-want-your-facebook-password\/\">obtaining your Facebook password<\/a>\u2014simply set up two password managers (one on your home laptop, the other on your work PC) using two unique passphrases as master keys.<\/p>\n<p>Password manager software is easy to set up and use.\u00a0 The biggest problem you\u2019ll face is choosing from among the cornucopia of password managers.\u00a0 A\u00a0<strong>partial<\/strong>\u00a0list I just compiled, in alphabetical order, includes:\u00a0<a href=\"https:\/\/agilebits.com\/onepassword\">1Password<\/a>,\u00a0<a href=\"http:\/\/www.anypassword.com\/\">AnyPassword<\/a>,\u00a0<a href=\"http:\/\/www.animabilis.com\/\">Aurora Password Manager<\/a>,\u00a0<a href=\"http:\/\/www.clipperz.com\/\">Clipperz<\/a>,\u00a0<a href=\"http:\/\/www.ascendo-inc.com\/DataVault.html\">DataVault<\/a>,\u00a0<a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a>,\u00a0<a href=\"http:\/\/www.handypassword.com\/\">Handy Password<\/a>,\u00a0<a href=\"http:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/password-manager?domain=kaspersky.com\">Kaspersky Password Manager<\/a>,\u00a0<a href=\"http:\/\/keepass.info\/\">KeePass<\/a>,\u00a0<a href=\"https:\/\/keepersecurity.com\/\">Keeper<\/a>,<a href=\"https:\/\/lastpass.com\/\">LastPass<\/a>,\u00a0<a href=\"https:\/\/identitysafe.norton.com\/\">Norton Identity Safe<\/a>,\u00a0<a href=\"http:\/\/paranotic.com\/\">Paranotic Password Manager<\/a>,\u00a0<a href=\"http:\/\/www.moonsoftware.com\/password_agent\">Password Agent<\/a>,\u00a0<a href=\"http:\/\/passwordsafe.sourceforge.net\/\">Password Safe<\/a>,\u00a0<a href=\"http:\/\/www.selznick.com\/products\/passwordwallet\/\">Password Wallet<\/a>,\u00a0<a href=\"http:\/\/www.mirekw.com\/winfreeware\/pins.html\">PINs<\/a>,\u00a0<a href=\"http:\/\/www.roboform.com\/\">RoboForm<\/a>,\u00a0<a href=\"http:\/\/www.thycotic.com\/products_secretserver_overview.html\">Secret Server<\/a>,\u00a0<a href=\"http:\/\/www.splashdata.com\/splashid\/\">SplashID<\/a>,\u00a0<a href=\"http:\/\/www.stickypassword.com\/\">Sticky Password<\/a>,\u00a0<a href=\"http:\/\/www.tk8.com\/\">TK8 Safe<\/a>, and\u00a0<a href=\"http:\/\/upm.sourceforge.net\/\">Universal Password Manager<\/a>.\u00a0 There is even a\u00a0<a href=\"http:\/\/mandylionlabs.com\/\">hardware-based password manager<\/a>\u00a0available.<\/p>\n<p>Your top-level considerations in choosing a password manager are:<\/p>\n<ol>\n<li>Does it run on your particular OS or mobile device?\u00a0 (Note that some password managers sometimes charge, or charge extra, to support synchronization with mobile devices.)<\/li>\n<li>Do you already use Dropbox on all your devices?\u00a0 If not, consider a manager that provides its own cloud storage (LastPass, RoboForm, etc.)\u00a0 If so, and only if you would prefer to manage your own encrypted file, choose a service that supports Dropbox (1Password, KeePass, etc.)<\/li>\n<\/ol>\n<p>I don\u2019t recommend or endorse any particular password manager.\u00a0 I\u2019ve started using one of the \u201cpremium\u201d (paid) password managers and am astonished at how much better\u00a0<em>any<\/em>\u00a0of the managers are over what I\u2019d been using before (an unencrypted manual text-file-based system that I\u2019d hacked together last millennium).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A clever meme hit the Internet this week: \u201cStop asking me to change my password. I can\u2019t keep on renaming my dog.\u201d If you (or the employees you support) aren\u2019t using a password manager, clear off your calendar for the rest of the day and use the time to set one up.\u00a0 It\u2019s easy security.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,7],"tags":[],"_links":{"self":[{"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/posts\/968"}],"collection":[{"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/comments?post=968"}],"version-history":[{"count":1,"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/posts\/968\/revisions"}],"predecessor-version":[{"id":969,"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/posts\/968\/revisions\/969"}],"wp:attachment":[{"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/media?parent=968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/categories?post=968"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/jlg.name\/blog\/wp-json\/wp\/v2\/tags?post=968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}