1 / 32

Testing of Password Policy

Anton Dedov. Testing of Password Policy. ZeroNights 2013. Who Am I. Software Developer and Security Engineer @ Parallels Automation Open source developer Mail: adedov@gmail.com Twitter: @ brutemorse. Motivation.

yates
Télécharger la présentation

Testing of Password Policy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Anton Dedov Testing of Password Policy ZeroNights 2013

  2. Who Am I • Software Developer and Security Engineer@ Parallels Automation • Open source developer • Mail: adedov@gmail.com • Twitter: @brutemorse

  3. Motivation • It is hard for application developers to choose between existing password meters reasonably. • Worse, some implement their own [or customize existing] without understanding of security and psychological implications. • Need some framework/criteria that would help reasonable choice.

  4. NAÏVE SECURITY MODEL

  5. Untargeted Online Attacks Common passwords User base 100 K 100 K • 1 guess per user / day • 2 days to find first password • 100 days to find 50 passwords 10 K 5 K 2.5 K • 1 guess per user / day • 10 days to find first password • 1.5yr to find 50 passwords

  6. Targeted Online Attacks • 10 failed attempts  1 hour block • 240 attempts per user / day • 7200 attempts per user / month • 86400attempts per user / year • More IP-s scale linearly

  7. Offline Attacks • Huge dictionaries • Specialized hardware and clusters • No time/complexity limitations except • Enforced password quality • Hash speed • Salt uniqueness

  8. Testing Password Meters

  9. Candidates • Plesk • jquery.complexify • zxcvbn • libpwquality • passwdqc

  10. Method • Apply meters to password bases • Dictionary attacks with JtR • Rule-based attacks with JtR • Collect essential parameters

  11. Apply Meters • Requirement: meter should provide unambiguous signal about if password is accepted or not. • Passwdqc tells straight “OK” or “Bad”. • Others return score. Minimal accepted score documented.

  12. Password Bases • Real customers • RockYou all • CMIYC-2010 not cracked • Random passphrases • Random 10-char passwords Red for attacks; blue for psychological acceptance.

  13. Dictionaries

  14. Rules

  15. Cracking Sessions

  16. Cracking Sessions • 25 attacks per password base per meter • Min dictionary size 817 • Max dictionary size 396M RockYou dictionary was not used against RockYou password base.

  17. Parameters • M – passwords approved by meter • D – attack dictionary size • C – # of guessed passwords during attack • Attack effectiveness • Attack economy

  18. Online Attacks Effectiveness For dictionaries < 100K Max guess rate 0.007%

  19. Max Attack Effectiveness

  20. Max Attack Economy

  21. Average Attack Economy

  22. Guesses Totals

  23. Guesses Totals

  24. Psy. Acceptance: User Passwords

  25. Psy. Acceptance: User Passwords

  26. Psy. Acceptance: Hard Passwords

  27. Psy. Acceptance: Hard Passwords

  28. The “editors” choice

  29. Conclusions • Test your security tools for security • Avoid write your own security tools • All tested meters protect from online attacks • Also seem protect from offline attacks(for slow hashes and unique salts) • But most tend to deny more passwords than it is necessary, including known to be hard ones • Passwdqc and zxcvbnlook best

  30. Where to go? • Bigger dictionaries and brute force • Testing on real people to • Learn evolution of “common passwords” lists • Test psychological acceptance empirically • More meters?

  31. Special thanks Alexander PeslyakSolar Designer

  32. Bonus: time to process RockYou…(MBP 2011)

More Related