Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note: The above recommendations closely mirror the recommendations from Microsoft 8.

What is the current Synapse Password Policy?

...

As one group of researches points even weak passwords are secure when there is a limit on the number of failed attempts 10.  This is why bank card PIN numbers are secure even though they only have 13 bits of entropy.  With an enforced exponential backoff for failed attempts an attacker will have less than a dozen attempts per year.  With so few attempts only the most common passwords would be hacked.  A system that blocks users from selecting the most common passwords combined with exponential backoff would be secure even when users choose "weak" passwords.

References

  1. Anchor
    1
    1
    Carnavalet, Xavier et al "A Large-Scale Evaluation of High-Impact Password Strength Meters" madiba.encs.concordia.ca, 2015.
  2. Anchor
    2
    2
    Zhang, Yinqian et al "The Security of Modern Password Expiration: A n Algorithmic Framework and Empirical Analysis" cs.unc.edu, 2010.
  3. Schneier, Bruce  "Real-World Passwords" schneier.com,
  4. Goodin, Dan "Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”" arstechnica.com, 2013.
  5. Schneier, Bruce  "Choosing Secure Passwords" schneier.com, 2014.
  6. Bonneau, Joseph et al "Passwords and the Evolution of Imperfect Authentication" jbonneau.com
  7. Wheeler, Daniel  "zxcvbn : Low-Budget Password Strength Estimation" usenix.org August 10–12, 2016
  8. Anchor
    8
    8
    Hicock, Robyn "Microsoft Password Guidance" microsoft.com
  9. Egelman, Serge et al "Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection" microsoft.com
  10. Florencio, Dinei et al "Do Strong Web Passwords Accomplish Anything?" microsoft.com
  11. Goodin, Dan "How the Bible and YouTube are fueling the next frontier of password cracking" arstechnica.com, 2013

...