Recently, I've been thinking a lot recently about Ars Technica's article on passwords. Couple that with having read Knights of the Rainbow Table, the short story commissioned from Cory Doctorow for The Tomorrow Project, and I've gotten a bit worried about password security.
The password I use at work on a daily basis is 18 characters long. My web server's password is significantly longer. Yes, I've got a mnemonic to memorize the thing, and no, you're not likely to find a significant portion of it in any dictionary. But is it good enough?
Most of what's discussed in the article, and what's dealt with in Knight of the Rainbow Table deals with cracking stolen hashes. And so in theory if limits are placed on the number of password attempts, the problem goes away until there's another leak of password data. But we can't rely on data never being leaked.
I've got an issue with sites that limit what characters I can use in a password (I'm talking about you, Twitter. Why can't I use a space?) or require that I have capitals and special characters (is "Password1" really more secure than "thome thtupid pathword"?) Validation like this on password creation works great to prevent your mom from using "fluffykitty" as her password. But it also lets crackers know which combinations can be eliminated. And it's kind of annoying.
Increasingly, sites are letting people sign in with their Google or Facebook credentials. This is fine. Two-factor authentication helps a lot. I've used Google sign-in for a small number of low-security sites and apps, but putting too many eggs in one basket doesn't give me the warm and fuzzies. And I'm hesitant to trust Google too much. I'm certainly not going to trust Facebook.
The list of passwords that have been cracked scares me. The screenshot used shows MD5 hashes for passwords like $0ccerba11, Wtamu@13, and qeadzcwrsfxv1331. So how are you going to get by with that password of Bosco123! that you've used for everything since 2002? Pick a new password. Here are some suggestions.
Cory Doctorow posits a day in the not-too-distant future in which passwords are dead. Someday, Moore's Law may make even beefier hash algorithyms like SHA512crypt, bcrypt, scrypt, and PBKDF2 obsolete. Someday, someone may indeed create rainbow tables complete up to 100 or even 1000 characters. For the time being, passwords still work. They just work better if you create good ones.
Okay, I am kidding. I definitely realized recently that I needed to upgrade my passwords. I have been slowly doing that, but I also make the mistake of using the same one for most things, or at least a variation of the same one.
Thanks for posting that link to the password manager. I will have to try it.