Researchers: Poor password practices hurt security for all
IDG News Service - A large-scale study of password-protected Web sites revealed a lack of standards across the industry that harms end-user security, according to two researchers working at the University of Cambridge in England.
In particular, the weak implementations of password-based authentication at lower-security sites compromises the protections offered at higher-security sites because individuals often re-use passwords, Joseph Bonneau and Soren Preibusch asserted in a paper presented at the Workshop on the Economics of Information Security in Cambridge, Mass., Monday.
Attackers can use low-security Web sites such as news outlets to figure out passwords associated with certain e-mail addresses, and then use those passwords to access accounts at higher-security sites such as e-commerce vendors, Bonneau said.
In an effort that the researchers said is the largest empirical investigation into password implementations to date, they collected data from 150 Web sites and found widespread "questionable design choices, inconsistencies, and indisputable mistakes," according to Bonneau and Preibusch.
The researchers seemed disinclined to blame users for re-using passwords or making them easy to guess, arguing that most users have too many online accounts to manage them all securely.
"Sites' decisions to collect passwords can be viewed as a tragedy of the commons, with competing Web sites collectively depleting users' capacity to remember secure passwords," they wrote.
The large majority -- 78% -- of sites examined failed to provide users with feedback or advice on choosing a strong password. Only five sites let the user register password hints, a strategy that will encourage users to come up with stronger passwords. Just seven sites required users to mix numbers and letters, and only two demanded that passwords include non-alphanumeric characters as well.
Bonneau and Preibusch also identified widespread weaknesses in how passwords are submitted to the server when users log in. Only three sites used techniques that prevent the server from receiving a user's cleartext password at login, although two of those collected cleartext passwords at enrollment.
Most of the sites, 126 in all, seemed to allow unlimited attempts to guess a password; the researchers used a script that attempted incorrect guesses 100 times, after which a person typing in the correct password was able to log in successfully. This indicates that most sites don't bother to protect against guessing attacks, they said.
Overall, recognized best practices in password security are widely ignored, Bonneau and Preibusch said. Well over half the sites failed to use TLS (transport layer security) to protect password transmission at every stage -- some used it at enrollment but not at the login or update point, for example.
In what Bonneau called the "worst practice in the industry", 29% of sites tested e-mailed users cleartext passwords. In addition, 83% allowed unrestricted probing for user membership, and 84% permitted unrestricted password guessing.
The sites whose owners are the worst offenders are content sites as newspaper Web sites which don't tend to store sensitive user information, the researchers said. Conversely, sites that store payment details had significantly stronger security practices, the researchers said.
So why do so many sites collect passwords when the practice is generally harmful when poorly implemented? Those sites with poor password practices also seem to be those with an interest in collecting e-mail and personal data about their users.
While broader adoption of delegated protocols such as OpenID would help, Bonneau and Preibusch are pessimistic that the market will support such solutions at the cost of these opportunities to collect user information.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts