On Jul 18, 2009, at 4:38 AM, Damian Myerscough wrote:

Hello,

Just out of curiosity how do you let your users change their passwords?


Adding to this, do you have a forgot password feature that perhaps gives them passwords to a master control panel of some form?

Did you distribute their passwords to them via an email at some point in time? If a password exists in email, some worm will find it and reveal it to someone else at some point in time.

I suspect the problem you are having has nothing to do with the strength of your password policy. You could have users with passwords of a very simple nature, and that would probably not change your troubles.

Even the most well thought out password will be compromised if there are ways to do so outside of a dictionary attack. In your case, I think you need to determine what the details are of your users who are being compromised. What is their platform, what email client do they use, etc. I would bet that Linux and Mac are not in that mix, if they are not, you can start to look into what virus/worm/trojan does this sort of malicious act, and provide a simple tool to remove it for your users.

If it is phishing attacks, there is little you can do, as you will simply not be able to educate your users. You may consider sending them off to openDNS, or implementing such features yourself, as they have built in phishing url detection. Using something like FireFox or Safari that has phishing url detection built in will help as well.

At this point, I would find the cause, so you can work to solve it, I strongly suspect it has nothing to do with password quality.

Have you looked at the IP space of the AUTH's that come in one a compromised account? You may find they all come from the same place, if you have no users in that space, blackhole that IP space from authing.
--
Scott * If you contact me off list replace talklists@ with scott@ *

Reply via email to