FTC Chief Technologist Lorrie Cranor wrote in March it is time to reconsider mandatory password changes.
Unless there is reason to believe a password has been compromised or shared, requiring regular password changes may actually do more harm than good in some cases. (And even if a password has been compromised, changing the password may be ineffective, especially if other steps aren’t taken to correct security problems.)
The prime reason given is users pick bad passwords. That doesn’t seem like a justification to me to not change passwords. It is a problem that could be avoided by using a password similarity rule in your password rules. You could force longer passwords to encourage passphrases. I do agree government password policies get a bit ridiculous (8 digit pin that must be changed used in conjunction with SecurID. That just seems like overkill).
I like to use a password manager. This allows most of my passwords to be something long and unknown. They are protected by a strong password, and a second factor of authentication. Educating people about using these tools seems like a great way to go. At any rate, I didn’t want to make this rare post a rehash of old password arguments. The Cranor post is worth reading.
This week Troy Hunt of haveibeenpwned.com received a copy of 68 million accounts from Dropbox. A hack occurred in 2012 and at the time Dropbox forced a reset to some accounts. If a user didn’t change their password since that hack they would be effected. If they changed that password, but used the same credentials elsewhere they would be effected.
The idea of changing the password only in case of known compromise is defeated when you realize that you don’t always know about compromise. Companies don’t disclose. Or they don’t force a password change and you miss the announcement. Or you change the password for that account but use the same password somewhere else.
While changing a password every 90 days is overkill for most accounts, there is a happy medium between that and never changing them. Using a password manager (or at least the correct password manager) will let you know the age of your password (age starting from the point you add it to the database . Obviously it doesn’t know the actual password set date. Some password managers are able to attempt change the password for you, so you only have to click a button (works on specific sites only).
In either case proactive monitoring for compromise is important. You can enroll your username or email at haveibeenpwned.com to be notified about new breaches that affect your accounts. Some password managers have this functionality built-in.
I received the following voicemail on my home number today.
“The reason of this call is to inform you that the IRS is filing lawsuit against you to get more information about this case file. Please call immediately on our department number 347-637-6615. I repeat 347-637-6615. Thank you.”
While tax season is the high season for this particular scam, “The IRS is filling a lawsuit against you” strikes fear into the heart of the recipient any time of year. Scams are designed to get you to take action. Even when you’re familiar with scams like this, you take pause.
The IRS will send written notice of tax due. Phone calls like this are not the norm. For more information check out this this alert at the IRS website.
This week Tenable released a new “plugin” (what they call a vulnerability detection) named “Web Server HTTP Header Information Disclosure”, plugin id 88099. In spite of even the title saying it only an information disclosure vulnerability, they rate this a medium. In my environment that means we need to address it. I think its a little crazy for an information disclosure vulnerability to be rated that high. It turns out Tenable has ceded vulnerability severity ratings to the CVSS system. So because this has a CVSS score of 5 it has to be rated moderate.
Now with SecurityCenter, I’d be able to change the security severity of this detection. I’m not sure that’s possible in Nessus. Even so, when scanning servers for other people, you cant just change the results of the scan. And now the problem, the other party’s security people dont have the ability to make rational security decisions. They just want all the detections gone.
Having a web server banner is one of those vulnerability detections from 15 years ago. Its kind of weird that Tenable is just writing this detection now. Having a server banner visible isn’t some vulnerability in the server software. Its part of the standard. Who is removing this information supposed to stop? It might stop a script that checks server versions and the applies a specific exploit or test (perhaps it would stop a naive vulnerability scanner). That’s about it.
It would be one thing if it were easy to change. For example removing “x-powered-by:asp.net” is easy to remove. Removing an IIS version is probably going to require URLscan as if this were IIS4.
I had some Windows 2008 R2 servers in Amazon AWS EC2. To save some money, they were turned off when they weren’t needed. I noticed when I did boot them that they had some time issues apparently jumping from Eastern US time to UTC time for a while before switching back.
It seems when you search for time issues, specifically when you have a *nix Host Operating System set to UTC and a Windows guest OS set to a local timezone people will link you to the “RealTimeIsUniversal” registry key.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TimeZoneInformation\RealTimeIsUniversal = 1 REG_DWORD
The problem is, that registry key was already set.
Further searching brought me to Amazon’s article about setting the time for a Windows OS.
This had a couple of suggestions. To make sure that KB2800213 and KB2922223 are installed. After some searching it turned out that KB2800213 was superseded by KB2922223. Also KB2922223 was already installed.
Checking the Windows Event Log found the time was changed by the Citrix Tools for Virtual Machines service. “C:\Program Files (x86)\Citrix\XenTools\XenGuestAgent.exe”
I verified that this service was causing the issue by restarting just the service. Sure enough, the time changed to UTC. Then when I opened up time in Windows and had it check against the NTP server, it changed back to local time.
To resolve the problem, I upgraded the Amazon EC2 Paravirtual Driver. This had a prerequisite to update EC2Config.
With a solution found and tested on one server, I turned over the resolution on the other servers to the System Administrators.
Incorrect time impacts security logs and any subsequent troubleshooting or investigation. According to Amazon, issues like this can cause problem with DHCP leases. There can any number of unknown application problems. I expect Kerberos wouldn’t be very happy either.
I moved this site over to Cloudflare.
The previous CDN doesn’t give SSL to free accounts. I’ve wanted to get SSL on here for many reasons, such as using SSL to protect my logins. Additionally the use of SSL is necessary for the SPDY protocol, which should speed up the site. I”m expecting Cloudflare to migrate to HTTP/2 as that becomes the new standard. Google reportedly also gives a tiny page ranking boost to encourage the adoption of SSL.
I also like that using Cloudflare means I can have DNSSec (which I haven’t turned on yet). By hosting my DNS with Cloudflare, I no longer need to pay for a Dyn account as was necessary with the last CDN I was using. (due to the way my webhost does DNS).
If you notice anything not working let me know in the comments.
Management types are always trying to push BitLocker rather than third party encryption because its free. “Free” as in, “included in Windows Professional/Enterprise”. They never consider the less obvious costs in usability and to the helpdesk. The Windows guys would even team up with the management types complaining that non-Microsoft full disk encryption products made system deployment difficult. (There are of course ways to work with things like MDT in McAfee encryption. I don’t know about the other versions.)
For me it always came down to two main things.
- It’s not acceptable security to me to use Bitlocker without pre-boot authentication.
- Using Bitlocker with pre-boot authentication is kind of annoying.
a. Bitlocker preboot authentication requires a per machine password. Users would need to know this additional password rather than the single signon used by non-Microsoft alternatives.
b. The password recovery options available are kind of cumbersome.
This month, Microsoft released security bulletin MS15-122 to patch a vulnerability in Bitlocker when used without pre-boot authentication. This attack involves spoofing a domain controller.
Dell Secureworks has identified targeted attacks occurring through LinkedIn.
In this attack, a fake user with a network of connections is created. Under the guise of a recruiter, they contact targets of opportunity, think sysadmins at a target company. The victim is enticed to go to a purported resume submission website. And then you have malware.
- As always, on LinkedIn be aware that people may not be who they claim to be.
- If you are going to apply for a job, go the known, established website of a company, and click on something like “Careers” to find a link to their jobsite. Where it’s an external recruiter contacting you, take care in establishing their bona fides.
- Dont be part of the problem. Only accept connections from people you know and trust. Your connection is an implicit endorsement to other people.
I was just recommending LastPass on a corporate Chatter. Then I read that LogMeIn has bought LastPass.
LogMeIn isn’t one of my favorite companies IIRC it is quite impossible to block LogMeIn’s enterprise security circumventing product without blocking remote support sessions also. This is becuase they use the same servers for each. GoToMyPC on the other hand provided a ways specifically to block its use in an enterprise, and kept their gotoassist/gotomypc servers separate. This was a few years ago so perhaps things have changed.
Since that time LogMeIn annoyed people by doing away with their free product (making my need to block it much less). And also engaged in rampant price hikes for those foolish enough to pay for the service.
Even if none of the above were true, our passwords make a huge target. LastPass was believed to be a security company who realized they’d lose everything if they failed to protect our encrypted passwords. Even then twice now we’ve all had to change our master password out of an abundance of caution. Now they’re being bought by a company that doesn’t seem to have the same drive for security.
It is very disappointing.
an old one, but new to me.