Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Proteus Jones
Feb 28, 2013



Sirotan posted:

I'm in the process of revamping a bunch of security policies for my org, including rolling out 2FA and changing password guidelines. I'm considering removing our requirement of forcing a password change every 90 days, as per the latest NIST recommendations. I'm curious how many other people have non-expiring passwords for their users and whether this is a good/terrible idea.

With 2FA it's fine.

And honestly, if you want to spur the adoption of 2FA, make the forced change that much more frequent for people who DON'T want to use 2FA.

I make that semi-jokingly, knowing that I'd never see the fallout other than having to hide forever from the Helpdesk.

Adbot
ADBOT LOVES YOU

Sirotan
Oct 17, 2006

Sirotan is a seal.


flosofl posted:

With 2FA it's fine.

And honestly, if you want to spur the adoption of 2FA, make the forced change that much more frequent for people who DON'T want to use 2FA.

I make that semi-jokingly, knowing that I'd never see the fallout other than having to hide forever from the Helpdesk.

Yeah the thing is, we'd likely only be able to force 2FA on anyone using VPN or attempting to change their credentials remotely. I'm 99.5% sure I'd never be able to get buy-in/money for 2FA for internal only users.

Sheep
Jul 24, 2003
With 2FA it seems like a liability since you're getting into "welp I'll just put it on a sticky note on the monitor" or "increment digit at the end" territory.

Without 2FA I'd reckon every 90 days is a decent compromise.

Sirotan
Oct 17, 2006

Sirotan is a seal.


Sheep posted:

With 2FA it seems like a liability since you're getting into "welp I'll just put it on a sticky note on the monitor" or "increment digit at the end" territory.

Without 2FA I'd reckon every 90 days is a decent compromise.

We already have a 90 day expiration, what I am considering is getting rid of that and having passwords not expire. I feel like without the expiration period they are LESS likely to write them down somewhere since they're not having to remember something new every 3 months. I'm really not sure how a 90 day expiration is inherently more secure than no expiration, to be honest. I'm still feeling it out.

What I am thinking right now is making our password guidelines match the new NIST recommendations, meaning:
-Length minimum would go from 8 to 12
-Restrict passwords based on dictionary of X number of known words (not sure how to implement this yet)
-No other restrictions on format (get rid of the pick 3 of the 4 of lowercase/uppercase/number/symbol BS)
-2FA required for any access outside our physical locations


Pros:
-Less calls to the helpdesk from the people who cannot be assed to change their password in the 2 weeks leading up to their expiration date, or forgot to update it in our VPN client, or who get on-call rotation laptops and don't authenticate on the device until they bring it home
-People will be less likely to write down a password they've had more time to remember????? (this might be a huge assumption on my part)
-New policy is more user friendly

Cons:
-Potentially compromised accounts won't expire automatically?
-IT needs to change it's policy for handling accounts for vendors/interns/contractors, and will also need to have a policy to deal with potentially inactive accounts vs just knowing they will expire in 90 days
-??????????


Is "this will make less work for the helpdesk" a bad reason to want to change password guidelines?

Dr. Arbitrary
Mar 15, 2006

Bleak Gremlin
Just install tongueprint scanners at every workstation.

Samizdata
May 14, 2007

Sirotan posted:

We already have a 90 day expiration, what I am considering is getting rid of that and having passwords not expire. I feel like without the expiration period they are LESS likely to write them down somewhere since they're not having to remember something new every 3 months. I'm really not sure how a 90 day expiration is inherently more secure than no expiration, to be honest. I'm still feeling it out.

What I am thinking right now is making our password guidelines match the new NIST recommendations, meaning:
-Length minimum would go from 8 to 12
-Restrict passwords based on dictionary of X number of known words (not sure how to implement this yet)
-No other restrictions on format (get rid of the pick 3 of the 4 of lowercase/uppercase/number/symbol BS)
-2FA required for any access outside our physical locations


Pros:
-Less calls to the helpdesk from the people who cannot be assed to change their password in the 2 weeks leading up to their expiration date, or forgot to update it in our VPN client, or who get on-call rotation laptops and don't authenticate on the device until they bring it home
-People will be less likely to write down a password they've had more time to remember????? (this might be a huge assumption on my part)
-New policy is more user friendly

Cons:
-Potentially compromised accounts won't expire automatically?
-IT needs to change it's policy for handling accounts for vendors/interns/contractors, and will also need to have a policy to deal with potentially inactive accounts vs just knowing they will expire in 90 days
-??????????


Is "this will make less work for the helpdesk" a bad reason to want to change password guidelines?

There's an easy procedural way to deal with the laptop rotation. Just make the users have to authenticate on the laptop as part of the pickup procedure.

SyNack Sassimov
May 4, 2006

Let the robot win.
            --Captain James T. Vader


Sirotan posted:

We already have a 90 day expiration, what I am considering is getting rid of that and having passwords not expire. I feel like without the expiration period they are LESS likely to write them down somewhere since they're not having to remember something new every 3 months. I'm really not sure how a 90 day expiration is inherently more secure than no expiration, to be honest. I'm still feeling it out.

What I am thinking right now is making our password guidelines match the new NIST recommendations, meaning:
-Length minimum would go from 8 to 12
-Restrict passwords based on dictionary of X number of known words (not sure how to implement this yet)
-No other restrictions on format (get rid of the pick 3 of the 4 of lowercase/uppercase/number/symbol BS)
-2FA required for any access outside our physical locations


Pros:
-Less calls to the helpdesk from the people who cannot be assed to change their password in the 2 weeks leading up to their expiration date, or forgot to update it in our VPN client, or who get on-call rotation laptops and don't authenticate on the device until they bring it home
-People will be less likely to write down a password they've had more time to remember????? (this might be a huge assumption on my part)
-New policy is more user friendly

Cons:
-Potentially compromised accounts won't expire automatically?
-IT needs to change it's policy for handling accounts for vendors/interns/contractors, and will also need to have a policy to deal with potentially inactive accounts vs just knowing they will expire in 90 days
-??????????


Is "this will make less work for the helpdesk" a bad reason to want to change password guidelines?

As far as the special restrictions, you'd need to install one of the third party password filters, since AD flat out doesn't do anything about that (Microsoft is supposedly hinting it will, but at this point that would be Server two-thousand....next and who knows). I'd looked into a few of them a while back - Anixis and nFront seemed to be the two best choices, and I'd decided on Anixis, but then the client dragged their feet so I never installed it, i.e. can't help you with actual experience on that.

My philosophy has always been that I'd prefer they had longer passwords that changed less often, simply because theoretically people are more likely to be amenable to longer passwords that way, and if you make them change every month they're just going to add a 1, 2, 3, 4 etc to the end of the previous password. (I think Anixis can also block this kind of thing by requiring the new password be different by x number of characters during the password change). True, they'll probably do that anyway even with changing it every 6 months or whatever, but for me it's always about trying to get as much buy-in as possible. Granted, that's also because I'm at an MSP so we can never be the voice of authority requiring security or else, but I don't think changing passwords every 30 days really enhances security all that much considering the human factor involved.

The other piece of this is enabling SSO everywhere for everything period the end. As far as I'm concerned it's a goddamn requirement up there with having a firewall. Not just for user convenience and added buy-in that they don't have multiple passwords to remember/write down on post-its, but also for centralization of security and management - disable a departing user one place and their access is blocked to all company resources. This is still a difficult requirement sometimes because a lot of butt services either don't know how to SSO or charge a shitload for the privilege DOCUSIGN YOU MOTHERFUCKERS. But not doing SSO always seems to cause headaches down the line and can really bite you in the rear end if a helpdesk person forgets to disable someone's access to some service that isn't SSO'd.

Super Slash
Feb 20, 2006

You rang ?

Sirotan posted:

I'm curious how many other people have non-expiring passwords for their users and whether this is a good/terrible idea.
I'm not sure if it counts since we don't use 2FA, but the only area I set non-expire passwords to are our field sales agents but only because the only thing they require a user account for to hook up exchange to their mobile phone for E-mail. They never even so much a touch a computer however we are planning to roll out laptops to them so that will soon change, the only other user to have a non-expire is the managing director; but it's his company he can do whatever the gently caress he wants.

Mo_Steel
Mar 7, 2008

Let's Clock Into The Sunset Together

Fun Shoe

Super Slash posted:

[...]the only other user to have a non-expire is the managing director; but it's his company he can do whatever the gently caress he wants.

Boy do I know that feeling. I've come to the sad conclusion that at the end of the day you can only advise your higher-ups to the best of your ability; it's up to them to accept it or reject it.

duz
Jul 11, 2005

Come on Ilhan, lets go bag us a shitpost


With 2fa, the usual password rules don't matter anymore. And password expiration is for breach mitigation, not security as it effectively reduces security.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

duz posted:

With 2fa, the usual password rules don't matter anymore. And password expiration is for breach mitigation, not security as it effectively reduces security.

This. IIRC, the "rotate every 3 months" advice comes from a back of the envelope calculation from decades ago on how long it would take to brute force passwords if the hashes were stolen.

Renegret
May 26, 2007

THANK YOU FOR CALLING HELP DOG, INC.

YOUR POSITION IN THE QUEUE IS *pbbbbbbbbbbbbbbbbt*


Cat Army Sworn Enemy
Today on new and exciting causes of service outages:

http://www.nydailynews.com/news/national/small-plane-crashes-street-bayonne-n-article-1.2976636

I thought I've seen everything but a plane crash is a new one to me.

QuiteEasilyDone
Jul 2, 2010

Won't you play with me?
To be entirely unfair, a pair of plane crashes destroyed a good portion of the Microwave point to point infrastructure in downtown Manhattan some 15+ years ago

Ghostlight
Sep 25, 2009

maybe for one second you can pause; try to step into another person's perspective, and understand that a watermelon is cursing me



Too soon.

Virigoth
Apr 28, 2009

Corona rules everything around me
C.R.E.A.M. get the virus
In the ICU y'all......



QuiteEasilyDone posted:

To be entirely unfair, a pair of plane crashes destroyed a good portion of the Microwave point to point infrastructure in downtown Manhattan some 15+ years ago

:vince: :911: we forgot

MiniFoo
Dec 25, 2006

METHAMPHETAMINE

Renegret posted:

Today on new and exciting causes of service outages:

http://www.nydailynews.com/news/national/small-plane-crashes-street-bayonne-n-article-1.2976636

I thought I've seen everything but a plane crash is a new one to me.

RE: A ticket came in: "Let me do my job, okay?" he said before hanging up

Renegret
May 26, 2007

THANK YOU FOR CALLING HELP DOG, INC.

YOUR POSITION IN THE QUEUE IS *pbbbbbbbbbbbbbbbbt*


Cat Army Sworn Enemy

QuiteEasilyDone posted:

To be entirely unfair, a pair of plane crashes destroyed a good portion of the Microwave point to point infrastructure in downtown Manhattan some 15+ years ago

Remedy doesn't go back that far for us :colbert:


if there's no ticket it never happened

angry armadillo
Jul 26, 2010

Renegret posted:

Today on new and exciting causes of service outages:

http://www.nydailynews.com/news/national/small-plane-crashes-street-bayonne-n-article-1.2976636

I thought I've seen everything but a plane crash is a new one to me.

I've always chuckled when I see risk docs that go out of their way to mention things like air traffic incidents or severe enough flooding to cause server room damage (etc)

But now I suppose extremely unlikely is more accurate than never

Thanks Ants
May 21, 2004

#essereFerrari


Virigoth posted:

:vince: :911: we forgot

a_pineapple
Dec 23, 2005


I reeeeeeeeeally want to do some sort of biometrics because fingerprint scanners are becoming pretty common on business-grade laptops these days. Then I remember how many drive-bys we get like "My phone restarted and now it's asking me for my passcode to unlock. I can't remember it because I always use my thumbprint. Can you unlock?"

Paladine_PSoT
Jan 2, 2010

If you have a problem Yo, I'll solve it

angry armadillo posted:

I've always chuckled when I see risk docs that go out of their way to mention things like air traffic incidents or severe enough flooding to cause server room damage (etc)

But now I suppose extremely unlikely is more accurate than never

Risk mitigation addendum: If the cause of the outage involved hospitalizations or fatalities, gently caress it, go home.

Javid
Oct 21, 2004

:jpmf:

vas0line posted:

I reeeeeeeeeally want to do some sort of biometrics because fingerprint scanners are becoming pretty common on business-grade laptops these days. Then I remember how many drive-bys we get like "My phone restarted and now it's asking me for my passcode to unlock. I can't remember it because I always use my thumbprint. Can you unlock?"

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Javid posted:

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!
:cripes:

Virigoth
Apr 28, 2009

Corona rules everything around me
C.R.E.A.M. get the virus
In the ICU y'all......



Javid posted:

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!

:cripes:

Thanks Ants
May 21, 2004

#essereFerrari



baquerd
Jul 2, 2007

by FactsAreUseless

Javid posted:

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!

This limits access in case the thief goes with the expedient of cutting off your finger. Defense in depth and all that.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

baquerd posted:

This limits access in case the thief goes with the expedient of cutting off your finger. Defense in depth and all that.

If the dude wants to go through the trouble of cutting off my finger to get into my phone? Go ahead buddy, gently caress, I'll unlock it without you cutting off my finger and then walk away like nothing happened.

thebigcow
Jan 3, 2001

Bully!
They don't need your actual finger to defeat a fingerprint scanner.

FWIW I have a Nexus 5X with a fingerprint scanner, it only requires the PIN once after powering on.

Javid
Oct 21, 2004

:jpmf:
That's one more time than is acceptable when using an unlock method other than "pin"

GreenBuckanneer
Sep 15, 2007

thebigcow posted:

They don't need your actual finger to defeat a fingerprint scanner.

FWIW I have a Nexus 5X with a fingerprint scanner, it only requires the PIN once after powering on.

ME too. I rarely ever reboot my phone but I'm worried this 7.1.2 update will suddenly cause the bootlooping thing I read about :v:

pr0digal
Sep 12, 2008

Alan Rickman Overdrive
A client is complaining that they're not getting fast enough speeds to their offsite replica and their IT team swears the connection is gigabit. We run a whole battery of tests, removing the NFS share and our backup application from the mix and showing speeds of around ~360 mbps just from client to client over the WAN connection. They were also complaining of the replication slowing down their house network but I'm pretty sure that was a routing issue that was sorted out.

After some considering of the obviously less than gigabit speeds I decided to run a few internet speed tests just to verify their connection is gigabit (I'm assuming their house outbound and WAN outbound are going over the same pipe). The results I come up with are defiantly not gigabit...more in line with the speeds I was seeing during the tests. Well that would explain the "slow speeds" :v:

Shot off a nice e-mail to their IT team explaining the findings and implying that, yet again, it's not our equipment please stop blaming stuff on it. Or someone doesn't understand bits vs bytes.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Javid posted:

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!

First of all, don't use a fingerprint reader if you really do care about your data. They can be thwarted and there is nothing protecting you legally should your phone be seized.

Second of all... :tif:

spankmeister
Jun 15, 2008






Fingerprints and other biometrics should only be used as a second factor imo.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Javid posted:

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!

:catstare:

Zamboni Apocalypse
Dec 29, 2009

Dr. Arbitrary posted:

Just install tongueprint scanners at every workstation.

"This tongue is expired, boy!"

A Pinball Wizard
Mar 23, 2005

I know every trick, no freak's gonna beat my hands

College Slice
:eyepop:

SyNack Sassimov
May 4, 2006

Let the robot win.
            --Captain James T. Vader


Zamboni Apocalypse posted:

"This tongue is expired, boy!"

"This tongue does not meet acceptable minimum length requirements".

It's either a security protocol or what your mom said HEYOHHHHHHH

apseudonym
Feb 25, 2011

Javid posted:

I was really excited to be getting a phone with a fingerprint reader until I actually got it and found out it forces you to put in a code every so often regardless, thus defeating the time-saving purpose of having a fingerprint reader in a spot you'd normally grab the thing. Way to almost implement a good idea!

Yeah this was done on purpose. :cripes: I didn't think I'd have to explain why.

thebigcow posted:

FWIW I have a Nexus 5X with a fingerprint scanner, it only requires the PIN once after powering on.

This is not correct. It requires it periodically as well.

Javid
Oct 21, 2004

:jpmf:
So why then?

The entire point of the reader, as far as the user is concerned, is that it's a locking method that requires no extra time or remembering of passwords, but that still keeps other people out to the extent that it matters. If I have to type in a code, I may as well just not use the fingerprint reader, or not lock it at all. I don't have nuclear codes or company info on my personal phone, so who cares?

I feel like security people tend to forget an actual human with work to do has to deal with the poo poo they put out.

Adbot
ADBOT LOVES YOU

Klaus Kinski
Nov 26, 2007
Der Klaus

apseudonym posted:

This is not correct. It requires it periodically as well.

Nope. I have both a 5x and a xperia x compact and the only time they require pin or graphical password is after powering on or failing the fingerprint unlock a ton of times.

  • Locked thread