On 2013-10-13 4:07 PM, Martin Vaeth <va...@mathematik.uni-wuerzburg.de> wrote:
Like passwords, these sequences should better not stay the same for
too long...

Forced changing of passwords (and I imagine the same can be said for port-knocking sequences, which I've never implemented, but am intrigued by, although I tend to avoid security-through-obscurity schemes) periodically as a way to 'better security' is one of those myths that just never seem to go away.

Enforce strong passwords and a policy that no one is to ever write a password down and put it in any publicly accessible place, and educate users how not to fall for phishing attacks, is the single most effective way to keep things secure.

Then only change a password if/when an account is compromised.

This combined with intelligent rate-limiting (with notifications/warnings to admins if/when a users account exceeds them) is all you need.

In fact I go one step further... I assign passwords, and do not even allow users to change them. I have always done this, and we have people in this office that have had the same email password (on the same gentoo server) for 12+ years.

I know that I'm probably the exception to this rule, and it is more luck than anything else, but we have never had an email account hacked (knock on wood).

I'm certainly not saying we are immune, but the claim that passwords should be forcibly changed for no reason other than the passage of some arbitrary amount of time is just plain dumb.

Reply via email to