On a related topic.
I tell people to use long passwords they can remember, to make sure they don't write them down.
The response is sad, and predictable...
Don't put arbitrary constraints on passwords that make them harder to remember, or easier to guess by an computer.
You should keep most of them in a vault/safe, so you only have to remember the ones that must truly be memorized (password to the vault itself, workstation login password, etc.)
@tychotithonus @ekg Unfortunately, this cannot help me because this is already part of my management strategy. I just have too many passwords which cannot go in the vault because they either fit that category or because the company that controls the logon and password change experience is a massive pain.
Looking at you specifically, Microsoft.
@Epic_Null Ah, fair
@Epic_Null @tychotithonus the "correct" solution to password rotation is to rotate the salt not the passphrases. By for example using the last login id as the salt you can generate a new hash every login, while not forcing your users to memorise a new password.
@ekg
Unfortunately, since the salt has to be stored with the hash, then once I crack a user's password, it would stay cracked forever.
@Epic_Null
I begin with the assumption that we can't force users to change passwords. That means we inherently have to accept that risk.
The only real solution to the problem of the passphrases itself being knowable is information.
Giving that we can't control where a user might have used their passphrases, forcing an actual passphrases change is at best an bandaid. That is likely to induce users to once again write down their passwords.
I should probably write what I think is the "real" solution.
The way I would like to solve this problem, that users might use compromised passwords, is a "red team" bot. That would try naive dictionary attacks against high risk accounts, when it break the passphrases the user would be informed that their passphrases is naively crackable.
This would of course require the accusation of passphrases dictionaries.
@ekg @tychotithonus I try to do this.
The password rotation is what breaks me. Especially for the ones I rarely use.
I can only come up with so many long, memorable phrases that will tell me exactly which account the password is for before it just begins to jumble.