this post was submitted on 26 Sep 2024
91 points (100.0% liked)

Cybersecurity

5631 readers
109 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
top 8 comments
sorted by: hot top controversial new old
[–] linearchaos@lemmy.world 39 points 1 month ago (2 children)

The latest NIST guidelines now state that:

Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords and
Verifiers and CSPs SHALL NOT require users to change passwords periodically. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
[–] halcyoncmdr@lemmy.world 12 points 1 month ago

Makes sense. Most compromises aren't brute force attacks. Allow all the characters and any brute force that is attempted will have to assume they're part of it.

Removing required periodical changes means people are less likely to use the same password and just increment a number added to the end. A compromised password with a setup like that is still compromised, they can make an educated guess as to what the new number is based on when was compromised compared to now.

[–] UID_Zero@infosec.pub 7 points 1 month ago (2 children)

Please don’t take those recommendations out of context.

They also recommend MFA, but people only ever bring up the “no rotation” bit.

[–] Zorsith@lemmy.blahaj.zone 5 points 1 month ago

Are they at least recommending non-SMS MFA now?

[–] linearchaos@lemmy.world 4 points 1 month ago

Emphasis was from the article, not mine.

They also recommend not using knowledge based prompts, allowing at least 64: characters,

[–] AstridWipenaugh@lemmy.world 18 points 1 month ago

This is the most excited I've been about a NIST standard in a good while

[–] collapse_already@lemmy.ml 13 points 1 month ago

My favorite error is "password is too long."

[–] p03locke@lemmy.dbzer0.com 3 points 1 month ago* (last edited 1 month ago)

NIST SP 800-63b already did that several years ago. People just need to follow it.