[Cryptography] New SSL/TLS certs to each live no longer than 47 days by 2029
Kent Borg
kentborg at borg.org
Fri Apr 18 10:38:21 EDT 2025
On 4/18/25 9:46 AM, Peter Gutmann wrote:
> Kent Borg <kentborg at borg.org> writes:
>
>> I also saw Schneier once say that there is no need for password bullet
>> characters because shoulder-surfing is no longer a big problem. Except it is
>> *because* of obscured password typing that shoulder-surfing is no longer such
>> a problem.
> And it's entirely because I wear leopard-proof underwear that I've never been
> attacked by a leopard out in the street (although I did see one eating
> someone's face once).
Bravo, but on the flipside, not every preventative measure works. Did
you know that people who regularly wear parachutes are *far* more likely
to die jumping out of airplanes than are people who have never even put
on a parachute? Makes you think.
> Arguably, blanking passwords actually makes things worse because you never get
> to see the password you're typing, leading to both problems in memorising
> passwords that you never see and ease of exploitation by attackers when people
> mistype their passwords, don't realise it, and instead try various other
> passwords on the assumption that they've entered the wrong one for the site
> (both of those are from password studies, and there's several more problems
> that are created through password blanking).
Good points. I do think that user interfaces should have the option of
letting the user see what has been typed, but defaulting blind is still
good. I sometimes type my password into a text editor (providing a
specific pesky child I know isn't handy) so I can be sure I have typed
it correctly, and then I paste it into the
three-tries-and-we-break-things input.
That is part of why I am a fan of horse-stable-battery style login
passwords (https://xkcd.com/936/). They are real words and my fingers
know how to type real words, so they are easier to type blind. This
doesn't work so well with good encryption passphrases (which are
different from login passwords and need to be much longer--a shame no
one knows this), so they always hard to type blind.
Recently I typed my password wrong and the second-chance web page
wouldn't let me type my whole password, because I suppose Javascript
programmers use relatively short passwords. I had to go back to the
original page before the bank locked me out.
> The real reason why they're
> blanked is because it was done that way on ASR-33s more than half a century
> ago and is now a required part of the login ceremony,
Hmmm. I'm not sure modern programmers have such an appreciation of
history. If they did the Macintosh UI wouldn't have gone downhill over
the years. (How many copies of their excellent, old "User Interface
Guidelines" book still exist inside Apple? I suspect very few, and fewer
every time a few more geezers retire. Yes, young programmers, like all
programmers, are very traditional, and this is traditional, but it is
also something pretty easy to reinvent. There *are* very good reasons
for blanking passwords (even if you might argue there are better reasons
not to).
> along with getting three
> guesses at your password which is something I've never been able to find the
> origin of.
From bank ATMs? A 4-digit PIN seems terribly insecure, if one doesn't
limit failed attempts, but not bad at all if one does. (I once had a
bank card with a 6-digit PIN, but they reverted to 4-digits. I suppose
"4" was too baked in around the world.)
-kb, the Kent who is glad he never scored a used ASR-33, they are big
and noisy, messy, apparently a pain to maintain, and not actually very
useful, even if they might be a lot of nostalgic fun.
More information about the cryptography
mailing list