Security comments do not need this circle jerk of incompetence the two of you are in.If you practice Mnemonic memory techniques a little bit, you'll find that memorizing a 16+ character random password generated for you by a good passgen isn't hard.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
Actual brute force attacks aren't that common, most attackers use permutating dictionary attacks. By using real words, no matter the rarity, you're reducing the possible combinations to a tiny fraction of the total... and more importantly that possibility space is what will be checked first.
Agreed. The only thing that matters is total entropy under the system of encoding. Memorizing 16 random characters takes effort. Remembering it two weeks later is even harder. The equivalent entropy from a passphrase would be 5 to 8 words. By "brute-force", I was assuming a dictionary attack. Any good brute-force attacker will, at a minimum, bias their guesses towards probable distributions.
I think you got downvotes because in the series of fuckups here, the very tiniest part is accepting user input with no attempt at verification or uniqueness or anything.So the server is trusting client input to be good? Isn't this day one infosec?
Novel indeed.
These cookies are used for "Trust This Device"-type settings right, given that they had to present the username and password? If the user/organisation required a new MFA confirmation for every login would that "overcome" this particular problem?
I mean, Dark Halo still gained admin access to the network, so there's a few other problems there.
Also, I despise the Outlook Web App.
Unless I’m not understanding the hack in the article, wouldn’t yubikey be equally vulnerable, since the hack here was to make the server think duo had said “it’s all good”? So remote hardware or not, if the server thinks it already asked, doesn’t that negate the power of a hardware key? The way it seems in the article that duo’s APi checks if it has an akey locally and if so doesn’t ask for a duo push?, when it should be programmed to always ask for just this reason. Sure it saves a little bit of bandwidth but seriously. Even with quantum entanglement or some unobservable magic like that, if the server doesn’t bother to ask, it’s not gonna matter how secure the software authentication is...Security comments do not need this circle jerk of incompetence the two of you are in.If you practice Mnemonic memory techniques a little bit, you'll find that memorizing a 16+ character random password generated for you by a good passgen isn't hard.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
Actual brute force attacks aren't that common, most attackers use permutating dictionary attacks. By using real words, no matter the rarity, you're reducing the possible combinations to a tiny fraction of the total... and more importantly that possibility space is what will be checked first.
Agreed. The only thing that matters is total entropy under the system of encoding. Memorizing 16 random characters takes effort. Remembering it two weeks later is even harder. The equivalent entropy from a passphrase would be 5 to 8 words. By "brute-force", I was assuming a dictionary attack. Any good brute-force attacker will, at a minimum, bias their guesses towards probable distributions.
1) use best practices. For pass phrases it is https://xkcd.com/936/ with maybe an extra word or so thrown in to overcome smaller dictionary sizes. Not the ignorant post OP wrote.
2) use best practices. For random gen it’s a password manager and long unique passwords for each site or app or whatever. You only memorize your recovery email(s), password manager and machine logins.
3) use best practices. Don’t make shit up. Google security best practices. Your 2nd factor needs to be a yubikey or cryptographic equivalent. Nothing else is acceptable. Everything else is inferior. Yes your bank is bad at security.
This article is about incompetent software that did _not_ use yubikey.
Subscribe to Ars for a nice yubikey as sign up bonus.
Novel indeed.
These cookies are used for "Trust This Device"-type settings right, given that they had to present the username and password? If the user/organisation required a new MFA confirmation for every login would that "overcome" this particular problem?
I mean, Dark Halo still gained admin access to the network, so there's a few other problems there.
Also, I despise the Outlook Web App.
For me the important places use yubikey:Depends. The banks and brokers and 401K/Roth operators I deal with all accept at least 20 characters now (the default length of what Keepass generates). That's still too short to use a decent passphrase, true. But it's way better than they were even a few years ago. They all, also, offer 2FA, though so far they don't accept use of an authenticator app (like MS or Google) or a hardware key like a Yubi, at least for consumer accounts. And finding the 2FA setup options can be a hunting expedition in their options forest.Bank sites tend to have low length caps that cramp this style, unfortunately.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
Getting a Yubikey for signing up with a paid Ars account was a good pitch. Unfortunately, I've found almost zero places that actually let me use it.
Depends. The banks and brokers and 401K/Roth operators I deal with all accept at least 20 characters now (the default length of what Keepass generates). That's still too short to use a decent passphrase, true. But it's way better than they were even a few years ago. They all, also, offer 2FA, though so far they don't accept use of an authenticator app (like MS or Google) or a hardware key like a Yubi, at least for consumer accounts. And finding the 2FA setup options can be a hunting expedition in their options forest.
Getting a Yubikey for signing up with a paid Ars account was a good pitch. Unfortunately, I've found almost zero places that actually let me use it.
Not sure that hardware 2FA would help here. If they have access to master secrets it's like encryption where the bad guy knows all your keys.
At that point it's game over. Which is why the whole cloud thing is so insecure. You do not have control over keys so there is always at least the cloud provider who has full access to all your data.
Add to that SSO which promotes use of very short and simple passwords as you have to type it in bazillion times a day to login into your computer and it's not surprising that security is a joke in most places.
Edit about 20 min after the original post:
Now that I think about it. dedicated hardware on both ends might work for 2FA as there is no way to remotely extract secrets out of the hardware. This might also work for some types of encryption. But if your entire system is compromised it's hard to defend anything even with dedicated hardware backing.
So say we all!
If you want secure there is only one way and this man knew how:
![]()
Novel indeed.
These cookies are used for "Trust This Device"-type settings right, given that they had to present the username and password? If the user/organisation required a new MFA confirmation for every login would that "overcome" this particular problem?
I mean, Dark Halo still gained admin access to the network, so there's a few other problems there.
Also, I despise the Outlook Web App.
If you configured your server to require new MFA confirmation for every login, the hackers could just turn that setting off. Or do something else. Fundamentally, MFA is intended as a mitigation for client compromise (e.g., due to phishing, password reuse, etc.) . MFA does not protect against server compromise.
Your short random password is is 36^8, or 2 821 109 907 456 possible combinations.I used to memorize random passwords like bahopre3[...] Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words[...]
So, nuke it from orbit as the only way to be sure?Once hacked, the only safe thing to do is rebuild everything.
A friend of mine's wife worked at a large company with a high profile CEO (donated lots of money and took sides on political issues). They got hacked by a foreign hacker group that was on the opposite sides of those issues, the hackers defaced their websites and stole data. They ended up purchasing, re-rack, rebuild everything. Nothing that was there before was trusted, not network infrastructure, not servers, not storage.
Once hacked, the only safe thing to do is rebuild everything.
A friend of mine's wife worked at a large company with a high profile CEO (donated lots of money and took sides on political issues). They got hacked by a foreign hacker group that was on the opposite sides of those issues, the hackers defaced their websites and stole data. They ended up purchasing, re-rack, rebuild everything. Nothing that was there before was trusted, not network infrastructure, not servers, not storage.
I’m a bit confused by the writing: is this saying that Dark Halo, APT29, and Cozy Bear are all the same?
Yes.
Also: I’m not managing to work out message flows for the 2FA thwart. Probably because I don’t sufficiently understand how Duo works, but the article assumes I do.
Fair enough. Essentially 2FA expects two things in order for you to login: 1) A password hash that matches the hash value in the password database. 2) A value that was generated by a 2FA server and sent to a device owned by the user.
This hack bypassed the second of those, by hacking the 2FA server. This hack unveiled the secret the server uses to generate 2FA values. With knowledge of this secret a hacker can generate their own 2FA keys without ever contacting the server again.
When a 2FA server is compromised, it's game over for 2FA. Basically period. The primary advantage for a hacker in generating their own values, is there is less chance of getting detected. By compromising the 2FA server once, there are fewer logs/sessions indicating the server was compromised. It helps them remain stealthy longer. So either way this attacker could have bypassed 2FA. But the method they used was clever for stealth reasons.
Yes!I don't think they hacked the 2FA server itself. The article describes that the attackers stole an "akey" from the OWA server, and used that to generate a token that bypasses 2FA auth.
Works great until you have some security-czar who decides words are bad and bans dictionary words or anything more than like 3 letters long without a number/symbol from being any sub-string regardless of how long you intended to make it.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
Umm, "WhatTheHeckThisIsTheStupidestThingEver" and "Matthew"Works great until you have some security-czar who decides words are bad and bans dictionary words or anything more than like 3 letters long without a number/symbol from being any sub-string regardless of how long you intended to make it.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
I also like rules where they say no more than 2-3 letters that are any other part of your account information. For example, at university I learned "WhatTheHeckThisIsTheStupidestThingEver" is too similar to "Matthew" to be permitted.
Generally I've noticed the more certifications they have in their signature, the more absurd they will make/enforce the rules. People with 1-2 are okay, people with multiple lines wrapping on an email-signature are impossible to work with and find fault with everything including pre-approved whitelisted stuff.
Bank sites tend to have low length caps that cramp this style, unfortunately.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
The akey is needed to authenticate to the Duo service when it’s time to phone home to Duo and initiate second factor auth. So the interesting bits here are how exactly the akey was compromised, but more so... how the actor was able to use that akey to bypass the call to the Duo service. Was it configured not to prompt for MFA on every login?
Depends. The banks and brokers and 401K/Roth operators I deal with all accept at least 20 characters now (the default length of what Keepass generates). That's still too short to use a decent passphrase, true. But it's way better than they were even a few years ago. They all, also, offer 2FA, though so far they don't accept use of an authenticator app (like MS or Google) or a hardware key like a Yubi, at least for consumer accounts. And finding the 2FA setup options can be a hunting expedition in their options forest.
Getting a Yubikey for signing up with a paid Ars account was a good pitch. Unfortunately, I've found almost zero places that actually let me use it.
Not sure that hardware 2FA would help here. If they have access to master secrets it's like encryption where the bad guy knows all your keys.
At that point it's game over. Which is why the whole cloud thing is so insecure. You do not have control over keys so there is always at least the cloud provider who has full access to all your data.
Add to that SSO which promotes use of very short and simple passwords as you have to type it in bazillion times a day to login into your computer and it's not surprising that security is a joke in most places.
Edit about 20 min after the original post:
Now that I think about it. dedicated hardware on both ends might work for 2FA as there is no way to remotely extract secrets out of the hardware. This might also work for some types of encryption. But if your entire system is compromised it's hard to defend anything even with dedicated hardware backing.
I'd agree with your comment about cloud 2FA (aka "outsourcing of your 2FA") - if one ran their own YubiKey OTP validation infrastructure, and protected the OTP secrets at-rest with YubiHSM 1 devices, it would considerably raise the bar.
The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
The akey is needed to authenticate to the Duo service when it’s time to phone home to Duo and initiate second factor auth. So the interesting bits here are how exactly the akey was compromised, but more so... how the actor was able to use that akey to bypass the call to the Duo service. Was it configured not to prompt for MFA on every login?
It's common to have session and location/network aware rules for 2FA. Inside the corporate network make it unneeded, or just once per session or maybe time period. Outside or untrusted networks would require it per session, or at every auth request. May vary based on personal or corporate systems as well. This was OWA, but that doesn't mean external access.
Folks tend to complain a lot about it, so this is seen as a way to reduce the end -user impact and still maintain a good level of security.
The akey is needed to authenticate to the Duo service when it’s time to phone home to Duo and initiate second factor auth. So the interesting bits here are how exactly the akey was compromised, but more so... how the actor was able to use that akey to bypass the call to the Duo service. Was it configured not to prompt for MFA on every login?
Not that I have any actual idea. But Having used Duo in the past there is an ability to disable 2FA for a particular account. Presumably one would need to have that akey handy in order to update that setting
Well there ya go -- I can't even make an example without falling over the rules worse than I realized.Umm, "WhatTheHeckThisIsTheStupidestThingEver" and "Matthew"Works great until you have some security-czar who decides words are bad and bans dictionary words or anything more than like 3 letters long without a number/symbol from being any sub-string regardless of how long you intended to make it.The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
I also like rules where they say no more than 2-3 letters that are any other part of your account information. For example, at university I learned "WhatTheHeckThisIsTheStupidestThingEver" is too similar to "Matthew" to be permitted.
Generally I've noticed the more certifications they have in their signature, the more absurd they will make/enforce the rules. People with 1-2 are okay, people with multiple lines wrapping on an email-signature are impossible to work with and find fault with everything including pre-approved whitelisted stuff.
If you want secure there is only one way and this man knew how:
![]()
The best passwords are easy for humans to remember and hard for machines to brute-force. Phrases of unrelated words tend to be ideal.
I used to memorize random passwords like bahopre3 (one digit away from one of my old passwords that was compromised). But random numbers and symbols add entropy less quickly than just adding words.
Something like "purple dog flowers" or "social squash Augustus" is trivially easy to remember, but surprisingly difficult to brute-force. If there are 1000 common English words, then each word is about as good as 2 to 3 letters. If you use one or more obscure words, the passphrase gets radically stronger. Despite having more letters, I've found that pass-phrases are faster to type than passwords, and rather than mess with capitalization, numbers, and symbols, which are all slow to type, I prefer to just add more words.
Also, best to use a password manager so that you only need one or two actual passphrases.
LENGTH adds entropy quickly. Words have a tendency to add length.
Which is fine if you're brute forcing digit by digit/character by character, but that's not what people do.
People compile lists of common words/phrases, and then mutate them in a number of ways. (All A becomes 4, all e become 3, every other A etc.)
I wrote a parser that would take a language dictionary and dump out a bunch of the mutations pre-calculated, then concatenated in a bunch of different common methods.
Without those mutations you look at a phrase like "correct horse battery staple" and see 25 to 28 (spaces?) characters or points of entropy.
I look at a phrase like "correct horse battery staple" and I see 4 points of entropy.
It's not clear to me what's clever about this. "Steal the secret key" is the canonical, brute-force way to evade a security measure.
If they'd find a way to do it *without* access to the keys, it would be clever (and much more worrying.)
from an article on the FireEye/Solarwinds attack https://www.bloomberg.com/news/articles ... g-own-hackCarmakal said the hackers took advanced steps to conceal their actions. “Their level of operational security is truly exceptional,” he said, adding that the hackers would operate from servers based in the same city as an employee they were pretending to be in order to evade detection.
Volexity refers to the state-sponsored hacker group as Dark Halo.
Once hacked, the only safe thing to do is rebuild everything.
I have to say password policy is one of my recurring gripes. At work, they insist on a time-expiring alphanumeric 8-character password: forcing you to repeatedly make (and remember) a new one is counter-productive and enforced 8-characters is laughably insecure these days.
Not a week goes by without needing to create a password to do something and it is odds-on that a reasonably secure browser-generated item will fail one or more of the arcane rules that most sites seem to require. “Must have between 9 and 11 characters”, “Can’t have more than three numbers”, “Must have one but no more than four capital letters”, “Can't have a lower-case ‘q’ in it”, ”Must be typed using only the left hand, except on Tuesdays”, etc.
I know for a fact that if I have to create a password myself, it will likely have nowhere near the entropy that an automatically generated one will of the same size, and probably include some unconscious biases that would make it orders of magnitude easier to crack.
My simple lay point-of-view from outside of the security industry is that the more artificial constraints you place on a password, the easier it becomes to determine. On the other hand, I appreciate having a rough idea of how relatively secure a particular phrase is, especially if it might be being reused or already forms part of a password database - quite a few sites seem to be implementing things like this.
Next I need Apple and MS to fix their OS to use yubikey on login + password instead of some goddamned pin or memorized 20+ char password. Although the Apple Watch unlock is nice and hopefully equivalent. But when that fails, I want some 2nd factor action.
I’m a bit confused by the writing: is this saying that Dark Halo, APT29, and Cozy Bear are all the same?
Also: I’m not managing to work out message flows for the 2FA thwart. Probably because I don’t sufficiently understand how Duo works, but the article assumes I do.
Funny old thing, that’s what a lot of my peers do when faced with this kind of mounting inconvenience. If I were trying to break into someone’s account at my organisation, I would assume a 2-3 number prefix or postfix to a simple password. When real security is made difficult by those enforcing, it generally goes out with the bath water...We have the same issue and I firmly blame the idiocy that is SSO. In order to remotely access all our corporate data (yeay for MS cloud, not) I have to use the same password I have to type in bazillion times every day. A password that we have to change every few months. Guess the effect. Every single person has a "password#" that is slowly incremented. Since you are typing it so often it's a simple one and there you go for security. Sure 2FA is supposedly turned on but doesn't seem to do much (only time I was asked for it was when I went to check my settings that it is in fact turned on).
In a sane world we would be using hardware 2FA (something MS still struggles with for a simple windows login). Slightly more expensive but at least it avoids the issue of super simple passwords being used for everything.
Unfortunately you must use the OWA (on Chrome) if you plan to exclusively use hardware MFA (e.g. Yubikey) via an Android device because neither Outlook for Android (or Firefox's Android browser) support FIDO2, U2F, etc... I'm still not clear why Firefox broke its mobile support for U2F or why it's taking so long to get fixed.Novel indeed.
These cookies are used for "Trust This Device"-type settings right, given that they had to present the username and password? If the user/organisation required a new MFA confirmation for every login would that "overcome" this particular problem?
I mean, Dark Halo still gained admin access to the network, so there's a few other problems there.
Also, I despise the Outlook Web App.
I’m a bit confused by the writing: is this saying that Dark Halo, APT29, and Cozy Bear are all the same?
Also: I’m not managing to work out message flows for the 2FA thwart. Probably because I don’t sufficiently understand how Duo works, but the article assumes I do.
I use Duo for work. You can set it to remember a computer and then you only have to do the 2FA once a month. I believe that’s what they’re exploiting with the cookie.