portal entry

select a category, or use search below
(searches all categories and all time range)
Title:

Why you should limit password length

| View in Portal
March 09, 2019 01:00:07 PM GMT
6 Comments
<p>Allowing long passwords is good but could also be used as an attack vector</p>
<p>The post <a rel="nofollow" href="https://coldfusion.adobe.com/2019/03/limit-password-length/">Why you should limit password length</a> appeared first on <a rel="nofollow" href="https://coldfusion.adobe.com">ColdFusion</a>.</p>
Labels: Blog, ColdFusion, Modern CFML, blog, Hacking, modern cfml

Comments:

How long is too long? Long enough to accept a pass phrase such as billygoatatemyredsocks. I would put a limit on the max length of between 24 and 36 chars. I don't think it's too stressful for CF to encrypt a password that long. It just depends on how many requests per second an attacker makes. A developer shouldn't have to make a choice between making their site less vulnerable to this type of attack or letting users choose a strong yet easy to remember password.
Comment by Gary Fenton
1910 | March 11, 2019 09:25:07 PM GMT
<a href="https://coldfusion.adobe.com/profile/Gary__F">Gary__F</a> I'd allow passwords of at least 1,000 characters - some password generators I've seen will give you a 2,048 character password. The attackers were using passwords with millions of characters in. I can't see why a real user would have a password that long so would block based on that. Using a password 1,000 characters long took 11ms with the PBKDF2WithHmacSHA1 Algorithm in a test I've just run. It's when my 'password' is 10,000,000 chars long you start to see a noticeable impact (~300ms). With no limit you can submit much longer password strings. Although 300ms may not sound like much, if you've got multi-requests coming in all taking 300ms you will start to run out of resource.
Comment by aliaspooryorik
1916 | March 12, 2019 08:44:30 AM GMT
John, that's interesting--though your last comment that a 10 million character password might take 300ms does kind of dampen the concern suggested in the post. :-) Still, you clarify that the problem was when a bad actor was "sending multiple login requests in a short period of time". Fair enough. I'd propose a different solution (and valuable for reasons beyond your scenario, such as stopping brute force login attempts). You could have your CF code (or that of any app server processing logins) start making the requester wait progressively longer and longer after each failed login. It could be 100ms, then 200ms, then 400ms, then 800ms, then 1600ms, then 3200ms, then 6400ms, and so on. You see that a "normal" user gets a few tries with less than a second delay, but then they quickly get bogged down. And of course, one could throw another 0 on those, if they wanted even a few failed logins to become painful. This may seem overkill for your particular problem, but your point was that they make a number of failed requests in a row. This would stop that, and more important it would stop brute-force password attacks. Of course, you have to track the "requester" in some way (by IP, or via a cookie, etc.) and a clever attacker could spread their requests around. A system (application) could handle that as well, imposing an increasing failure wait for ALL requests if some large number of failed logins was being detected in a short time across many requesters (by which I mean if the ratio of bad to good logins starts to increase significantly in some short period of time.) Hope that's all helpful to someone. I'm open to feedback or comment, of course.
Comment by Charlie Arehart
1918 | March 13, 2019 03:39:53 AM GMT
Hi Charlie, Good feedback - and I do that for brute force attacks (locking the account completely for set period of time after <code>n</code> failed attempts). In this case the attack was a Denial of Service attack, so adding a <code>sleep(n)</code> would actually help the attacker as your thread is tied up for longer so you'd quickly hit the concurrent request limit and so nobody else can login. The attackers were not trying to gain access to the system, just take it offline by using up the server resources, hence why the used passwords over a million characters long, as those take longer to process. Attackers are an inventive bunch! For anyone else reading - I can highly recommend looking at Foundeo FuseGuard as way of reducing the number of attack vectors that can be used against your site.
Comment by aliaspooryorik
1921 | March 13, 2019 03:18:03 PM GMT
John, you’re asserting that the throttle of failed login requests would tie up resources, because you would do a sleep. Don’t do that. You don’t need to “tie up the thread”, nor sleep it. You just need logic that makes them wait the stated ms or secs before you would allow another login.
Comment by Charlie Arehart
1920 | March 13, 2019 03:20:06 PM GMT
Sorry Charlie, misunderstood your suggestion. I do lock the account completely for set period of time after <code>n</code> failed attempts, that is similar to your suggestion although it does only protect when an attacker is targeting a single account. With brute force attacks against a number of accounts, it's much harder to prevent. You can use a session / cookie or IP to detect the 'user', but I've found that more often than not these types of attack use bots nets so you can't rely on a session or cookies and the IP is not consistent. You can use a CSRF token to get around that, so it all comes down to building up layers of defence. I hope it doesn't sound like I'm suggesting in the post that limiting password length is all you need to do to defeat attacks.
Comment by aliaspooryorik
1922 | March 13, 2019 04:09:20 PM GMT