Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Writing Down Passwords? 428

Atryn wonders: "I was recently checking for the latest firmware for a Netgear router when I decided to click on their Guide to Internet Security where it states: 'Contrary to much 'expert' advice, there is very little risk writing down passwords. In fact, years from now you may discover you need them to access old files.' I'm wondering what Slashdot thinks of Netgear's recommendation." Update: 06/08 21:19 GMT by T : Reader 654043 reminds us of the Microsoft recommendation to write down passwords which ran a few weeks back, and which has some pretty sound reasoning behind it.
This discussion has been archived. No new comments can be posted.

Writing Down Passwords?

Comments Filter:
  • by winkydink ( 650484 ) * <sv.dude@gmail.com> on Wednesday June 08, 2005 @05:46PM (#12762278) Homepage Journal
    My experience with it is that it is ok. I'm not a raving proponent, but it works as advertised.
  • by goofy183 ( 451746 ) on Wednesday June 08, 2005 @05:46PM (#12762283)
    I use it and it works well. I started when I got an online banking account that wouldn't let me use my standard username. I had to have mixed case and numbers in both my username and password. I got KeepPass and now store everything in there.

    It runs in my system tray and I can click, enter my master password and have access to all my passwords. It has also let me use long random passwords for my very important sites since I don't need to remember them any more.

    Also you can use a USB key as part of the key to unlock the database so you have the something you know + something you have security.
  • Re:recommendations? (Score:2, Informative)

    by m85476585 ( 884822 ) on Wednesday June 08, 2005 @05:46PM (#12762285)
    Password Safe [sourceforge.net]
  • by Bruce Stephens ( 6634 ) on Wednesday June 08, 2005 @05:51PM (#12762349)
    May 2001 Crypto-gram [schneier.com]
  • by ikewillis ( 586793 ) on Wednesday June 08, 2005 @05:57PM (#12762418) Homepage
    vim has integrated cryptographic functionality through VimCrypt. :help :X for more information.

    I have a rather large master password list for every server at work which I store this way. It's quite handy.

  • Get a keyring (Score:5, Informative)

    by 26199 ( 577806 ) on Wednesday June 08, 2005 @05:59PM (#12762444) Homepage

    A real, physical, password keyring. ThinkGeek has some rather expensive ones, but they'll definitely do the job. I have one of the earlier (cheaper) keyrings from the same company, and it's wonderful. I have strong passwords, I don't have to worry about forgetting them, and they're secure.

  • So? (Score:2, Informative)

    by hey! ( 33014 ) on Wednesday June 08, 2005 @06:43PM (#12762868) Homepage Journal
    Give me a break. Security is designed by the need for it. There is a need to protect your email password because even email has a legal standing as a form of communication. Same goes for your personal and work files.

    So? Seems to me you may be addressing a point that the author is not raising. He's not asking if having a password is better than not having one; he's asking about the advantages and disadvantages of writing down a password?

    Suppose you value the loss of a piece of data at, say, over $50,000. Consider how you would feel about carrying the passwords to that data in your wallet.

    Sound like a bad idea?

    OK, does carrying around the keys to a new Mercedes sound like a bad idea?

    So, if we've established its not necessarily ridiculous to write your passwords down provided that you take the same care of them you do your car keys, the question remains whether there are advantages and disadvantages. The disadvantage is that your wallet may be stolen. The advantage is that you can use a key that is cryptographically hard to break, as opposed to ginning up something you can remember.

    Threat assessment is key I think.

    The password to your work account may be a good candidate for the wallet treatment. A pickpocket has to know where you work, and what your user id is, to make use of your password.

    The PIN to your ATM is a bad idea, because the pickpocket gets a complete set of what he needs to get access to your account: the card and the PIN.

  • Re:recommendations? (Score:2, Informative)

    by UnrefinedLayman ( 185512 ) on Wednesday June 08, 2005 @07:03PM (#12763098)
    ...except for the passphrase for the disk, which is encouraged to be highly complex.

    Besides, if all they need to do is encrypt a single file containing the passwords, they don't need PGP disk; PGP or GPG will work fine to encrypt the single file, with the plus side being that in ten years you don't need to find a copy of Windows XP and a copy of PGP disk to install just to retrieve 143 bytes' worth of text.
  • Re:recommendations? (Score:4, Informative)

    by dknj ( 441802 ) on Wednesday June 08, 2005 @07:07PM (#12763141) Journal
    i wrote this in 2 seconds, but it duplicates what the original post does. you need string::random [cpan.org], you could roll your own but i'm lazy and counterstrike is calling my name. enjoy!
    use String::Random;

    $pass = new String::Random;

    for($i=0;$i<26;$i+=3)
    {
    printf("%c-%s\t",($i+65),$pass->randpattern("...") );
    printf("%c-%s\t",($i+66),$pass->randpattern("...") );
    printf("%c-%s\n",($i+67),$pass->randpattern("...") );
    }
    -dk
  • Re:recommendations? (Score:2, Informative)

    by Anonymous Coward on Wednesday June 08, 2005 @09:56PM (#12764471)
    If someone found the card, a dictionary attack would be slowed down by a factor of... 1, because it's just a simple substitution cipher. Plus, you must use longer passwords, otherwise the two-char substitution means the actual key is only half as long as it is entered. It's still a neat system, because it's poor-man's two-factor authentication. You have something (a substitution cipher key), plus you know something (the original key). Strategically, it's better than storing the original key in your wallet, cheaper than an RSA fob and no authentication system tweaks are required. On the other hand, it's not the best solution either, because it essentially documents the keyspace, which makes it that much easier to brute force.

    Also, a "dictionary attack" doesn't have to mean someone scripting logons based on a dictionary. In fact, such a thing would usually not work. Assuming you could try 100 passwords/sec (pretty unlikely) it would take many, many years to exhaust an 8 char password with a 26 char keyspace. Success of a dictionary attack typically requires you have the hash and can generate & compare as many passwords/sec as you have compute power.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...