NIST Password Guidelines - The Nine Commandments
Written by Sue Gee   
Tuesday, 01 October 2024

The US National Institute of Standards and Technology (NIST) has issued the second public draft of the proposed new version of its Digital Identity Guidelines. It includes updated rules regarding passwords that seem refreshingly sensible. 

 passwordwide

Passwords cause headaches for developers and for users. Too weak and they provide no protection at all, too strong and it's all too easy to get personal data locked away in an impenetrable safe. Most of the time I'm happy either to accept the strong password that a new app offers me - perhaps truncating it first, which I admit does weaken it, and then let Chrome be the one that stores and retrieves it as necessary. But have you ever tried typing in one of those strong passwords that contains a mix of uppercase and lowercase letters together with a sprinkling of numbers and special characters on a mobile device? It's a nightmare. And while it used to be possible to stick to desktop apps, more and more mobile apps are being foisted on us for vital tasks such as online banking.

So it is a great relief to discover that the revised guidelines include:

" 5. Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords."

A "verifier" in this context is the entity that verifies an account holder's identity by corroborating the holder's authentication credentials and CSP stands for "credential service provide", that is the trusted entity that assigns or registers authenticators to the account holder. 

Notice the use of "SHALL NOT" for which the NIST uses caps so that we can't miss the instruction. In the past the NIST password guidelines were expressed in terms of "should" and "should not". Now it uses "SHALL/SHALL NOT" for practices that are regarded as mandatory and "SHOULD" for those that, while best practice, have some leeway.

The rule that comes top of the list shows the difference between SHALL and SHOULD:

"1.  Verifiers and CSPs SHALL require passwords to be a minimum of eight characters in length and SHOULD require passwords to be a minimum of 15 characters in length."

So, a minimum of 8 characters in a password is mandatory and a minimum of 15 is preferable.

I have to admit to being confused by the next rule:

"2 . Verifiers and CSPs SHOULD permit a maximum password length of at least 64 characters.

This presumably refers to passphrases, but "maximum" and "of at least" don't go together well - thank goodness it's just a "should". 

The next two rules encourage (SHOULD) accepting the use of all ASCII printing characters and the space character and Unicode characters in passwords.

Another of the changes that is being welcomed as putting an end to the "obsolete requirment" of having to change a password at regular intervals, something that tends to discourange users from adopting high-strength passwords:

"6. Verifiers and CSPs SHALL NOT require users to change passwords periodically. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator."

While it's quite a while now since I was asked to provide a "hint" to aid recall of a password, my most used password, to log-on to my computer does show the hint I set for it multiple times a day. It's by far the weakest of any of my passwords anyway. But I would hate to change it after 20, no 30, knocking 40 or is it more years. Does that still happen? Well if it does it's about to be outlawed by the updated rule 7:

"7. Verifiers and CSPs SHALL NOT permit the subscriber to store a hint that is accessible to an unauthenticated claimant."

I've often reflected on how insecure "mother's maiden name"  and "name of first pet" were as security questions, in particular "city you were born in". These are hardly secrets for most people but used as security questions once you've got past the password stage their use doesn't seem too bad. At least the legitimate user has a chance of remembering them. However the use of prompting users to rely on such knowledge-based authentication in choosing passwords:

"8.Verifiers and CSPs SHALL NOT prompt subscribers to use knowledge-based authentication (KBA) (e.g., “What was the name of your first pet?”) or security questions when choosing passwords."

The final rule eliminates laziness on the part of verifiers - a practice I'd not come across anyway

"9. Verifiers SHALL verify the entire submitted password (i.e., not truncate it)."

Taken as a set these proposed best practices seem fine - and there's still time to have your say, NIST invites people to submit comments on the guidelines to dig-comments@nist.gov by 11:59 pm Eastern Time on October 7.

passwordsq

More Information

SP-800-63B Draft Guidelines

Related Articles

Fluid Passwords - Never The Same Password

GOTCHA - No More Password Hacking

 

To be informed about new articles on I Programmer, sign up for our weekly newsletter, subscribe to the RSS feed and follow us on Twitter, Facebook or Linkedin.

 

Banner


Edera Releases Open Source Container Benchmark And Scanner
07/11/2024

Edera has released Am I Isolated, an open source container security benchmark that probes users runtime environments and tests for container isolation.



TestSprite Announces End-to-End QA Tool
14/11/2024

TestSprite has announced an early access beta program for its end-to-end QA tool, along with $1.5 million pre-seed funding aimed at accelerating product development, expanding the team, and scaling op [ ... ]


More News

espbook

 

Comments




or email your comment to: comments@i-programmer.info

 

Last Updated ( Thursday, 03 October 2024 )