In a change from our
advertised program...
Why Passwords Don’t
      Work
       Jon Warbrick
What are we trying to
      achieve?
What are we trying to
           achieve?
Protection from
• a bored University student
• a tabloid journalist
• an organized criminal
• the NSA
What are we trying to
           achieve?
Protection from
• a bored University student
• a tabloid journalist
• an organized criminal
• the NSA
                         Protection of
                         • a student’s photo archive
                         • the heir to the throne's email
                         • the University financial system
http://xkcd.com/538/
Licensed under a Creative Commons Attribution-NonCommercial 2.5 License http://creativecommons.org/licenses/by-nc/2.5/
Option one:
Forget passwords
Option two:
A single, fixed password
Option three:
Distribute a list
Option four:
Central verification
Option five:
Kerberos (or similar)
Other problems
Other problems
Other problems

“secret”
Other problems

“secret”
Other problems

“secret”
Where do we go from
       here?

(Why) Passwords don't work

Editor's Notes

  • #2 \n
  • #3 \n
  • #4 What security properties do you want?\nWhat are you trying to protect, and from who?\nDoes one size fit all?\n
  • #5 What security properties do you want?\nWhat are you trying to protect, and from who?\nDoes one size fit all?\n
  • #6 \n
  • #7 Oh so easy\nIt all comes down to trust\nC.f. Phoenix 30 years ago - password checking could be disabled\n
  • #8 Now we just have to trust a smaller group\nWho would do this? Oh, think of intruder alarms\n
  • #9 No longer need to trust users\nDo need to trust anyone/thing that sees the list - any user on any system and then some\nMalicious and/or incompetent\nCould use crypt, but doesn’t really help\n
  • #10 Note that this is ‘LDAP authentication’, but could be other things\nClient system still sees plaintext password\n\n
  • #11 Designed largely to solve this problem\nBut...\n
  • #12 How does the user know?\n
  • #13 How does the user know?\n
  • #14 How does the user know?\n
  • #15 How does the user know?\n
  • #16 How does the user know?\n
  • #17 How does the user know?\n
  • #18 How does the user know?\n
  • #19 How does the user know?\n
  • #20 How does the user know?\n
  • #21 How does the user know?\n
  • #22 Users can always give their PWD away\nAnd the always have to trust something which may not be safe\n
  • #23 Users can always give their PWD away\nAnd the always have to trust something which may not be safe\n
  • #24 Users can always give their PWD away\nAnd the always have to trust something which may not be safe\n
  • #25 Users can always give their PWD away\nAnd the always have to trust something which may not be safe\n
  • #26 \n