Iâ€™m pretty much unhappy with the use of â€śSecurity Questionsâ€ť â€“ things like â€śwhatâ€™s your motherâ€™s maiden nameâ€ť, or â€śwhat was your first petâ€ť. These questions are sometimes used to strengthen an existing authentication control (e.g. â€śyouâ€™ve entered your password on a device that wasnâ€™t recognised, from a country you normally donâ€™t visit â€“ please answer a security questionâ€ť), but far more often they are used as a means to recover an account after the password has been lost, stolen or changed.
Iâ€™ve been asked a few times, given that these are pretty widely used, to explain objectively why I have such little disregard for them as a security measure. Hereâ€™s the Too Long; Didnâ€™t Read summary:
Letâ€™s take them one by one:
Whatâ€™s your favourite colour? Blue, or Green. At the outside, red, yellow, orange or purple. That covers most peopleâ€™s choices, in less than 3 bits of entropy.
Whatâ€™s your favourite NBA team? Thereâ€™s 29 of those â€“ 30, if you count the 76ers. Thatâ€™s 6 bits of entropy.
Obviously, there are questions that broaden this, but are relatively easy to guess with a small number of tries â€“ particularly when you can use the next fact about Security Questions.
Whatâ€™s your motherâ€™s maiden name? Itâ€™s a matter of public record.
What school did you go to? If we know where you grew up, itâ€™s easy to guess this, since there were probably only a handful of schools you could possibly have attended.
Who was your first boyfriend/girlfriend? Many people go on about this at length in Facebook posts, Iâ€™m told. Or thereâ€™s this fact:
Whatâ€™s your porn name? Whatâ€™s your Star Wars name? Whatâ€™s your Harry Potter name?
All these stupid quizzes, and they get you to identify something about yourself â€“ the street you grew up on, the first initial of your secret crush, how old you were when you first heard saxophones.
And, of course, because of the next fact, all I really have to do is convince you that you want a free account at my site.
Every site that you visit asks you variants of the same security questions â€“ which means that youâ€™ll have told multiple sites the same answers.
Youâ€™ve been told over and over not to share your password across multiple sites â€“ but here you are, sharing the security answers that will reset your password, and doing so across multiple sites that should not be connected.
And do you think those answers (and the questions they refer back to) are kept securely by these various sites? No, because:
Thereâ€™s regulatory protection, under regimes such as PCI, etc, telling providers how to protect your passwords.
There is no such advice for protecting security questions (which are usually public) and the answers to them, which are at least presumed to be stored in a back-end database, but are occasionally sent to the client for comparison against the answers! Thatâ€™s truly a bad security measure, because of course youâ€™re telling the attacker.
Even assuming the security answers are stored in a database, theyâ€™re generally stored in plain text, so that they can be accessed by phone support staff to verify your answers when you call up crying that youâ€™ve forgotten your password. [Awesome pen-testing trick]
And because the answers are shared everywhere, all it takes is a breach at one provider to make the security questions and answers they hold have no security value at all any more.
Thereâ€™s an old joke in security circles, â€śmy password got hacked, and now I have to rename my dogâ€ť. Itâ€™s really funny, because there are so many of these security answers which are matters of historical fact â€“ while you can choose different questions, you canâ€™t generally choose a different answer to the same question.
Well, obviously, you can, but then youâ€™ve lost the point of a security question and answer â€“ because now you have to remember what random lie you used to answer that particular question on that particular site.
Yes, I know you can lie, you can put in random letters or phrases, and the system may take them (â€śYour place of birth cannot contain spacesâ€ť â€“ so, Las Vegas, New York, Lake Windermere are all unusable). But then youâ€™ve just created another password to remember â€“ and the point of these security questions is to let you log on once youâ€™ve forgotten your password.
So, youâ€™ve forgotten your password, but to get it back, you have to remember a different password, one that you never used. Thereâ€™s not much point there.
Security questions and answers, when used for password recovery / reset, are complete rubbish.
Security questions are low-entropy, predictable and discoverable password substitutes that are shared across multiple sites, are under- or un-protected, and (like fingerprints) really canâ€™t be changed if they become exposed. This makes them totally unsuited to being used as password equivalents in account recovery / password reset schemes.
If you have to implement an account recovery scheme, find something better to use. In an enterprise, as Iâ€™ve said before, your best bet is to use something that the enterprise does well â€“ the management hierarchy. Every time you forget your password, you have to get your manager, or someone at the next level up from them, to reset your password for you, or to vouch for you to tech support. That way, someone who knows you, and can affect your behaviour in a positive way, will know that you keep forgetting your password and could do with some assistance. In a social network, require the
Also, password hints are bullshit. Many of the Adobe breachâ€™s â€śpassword hintsâ€ť were actually just the password in plain-text. And, because Adobe didnâ€™t salt their password hashes, you could sort the list of password hashes, and pick whichever of the password hints was either the password itself, or an easy clue for the password. So, even if you didnâ€™t use the password hint yourself, or chose a really cryptic clue, some other idiot came up with the same password, and gave a â€śDaily Express Quick Crosswordâ€ť quality clue.