Overview#
Password Anti-Pattern is an
Anti-pattern and are concepts that have been shown to be detrimental to
Best Practices Password and
user Experience
Complex passwords policies have proven to do more harm than good, resulting in users creating easy to remember passwords that are even easier to hack!
The 2019 Verizon Data Breach Investigations Report confirms that hackers are taking full advantage, revealing that hacking is the #1 cause of data breaches in 2019. The report identifies phishing and the use of stolen credentials (passwords) as the top 2 hacking techniques used is successful data breaches.
Microsoft, The National Institute of Standards and Technology (NIST) and the United States Department of Homeland Security have drastically changed their recommendations for strong passwords policies.
Both
NIST.SP.800-63B,
Microsoft and
Bruce Schneier recommend that passwords
SHOULD NOT be arbitrarily expired after some
interval.
NIST recommends to make it 256 the length does not matter because it's going to
hash down to the same number of characters anyway.
Password Periodic Changes offers no increased security in most cases.
NIST declared "
ineffective for others" and "
often a source of __frustration__ to users."
The user is asked to give the site login names and
passwords for another site in order for the first site to access address books, connection lists or other data kept on the second site.
The Password Anti-Pattern, in which a shared secret (the password) directly represents the party in question (the user). By sharing this secret password with applications, the user enables applications to access protected APIs.
Pasting of
Passwords was thought to be a good idea to prevent
brute-Force attacks on
passwords. All
password login forms should have
server-Side Login throttling schemes and allow pasting of
passwords.
National Institute of Standards and Technology (NIST) position with this statement:
Verifiers SHOULD permit claimants to use "paste" functionality when entering a memorized secret. This facilitates the use of Password Managers, which are widely used and in many cases increase the likelihood that users will choose stronger memorized secret.
Persistent Login
Cookies ("
Remember Me" functionality)
are a danger zone
CAPTCHAs against humanity#
CAPTCHAs are meant to thwart one specific category of attack: automated dictionary/
Brute-Force trial-and-error with no human operator.
Limiting
Password Maximum Length
Limiting
Password Character Composition
National Institute of Standards and Technology (
NIST) thinks Password Hints are a bad idea:
Verifiers SHALL NOT permit the subscriber to store a "hint" that is accessible to an
unauthenticated claimant.
Do not implement 'secret questions'. The '
Identity questions' feature is a security
Anti-pattern and
Password Anti-Pattern.
There might be more information for this subject on one of the following: