[ARIN-consult] [arin-announce] Consultation on Password Security for ARIN Online Accounts

Scott Leibrand scottleibrand at gmail.com
Tue Feb 16 14:44:21 EST 2021


No, it would apply on login, not just password change. The proposal says it would apply when “A user enters a password during Account Setup, Password Change, Password Reset or User Login in ARIN Online.“ 

Note the “or User Login” clause. 

I support option 3. 

I’m not sure if there is any good way to build a local DB of all compromised passwords: IIUIC, HIBP has a number of non-public databases they check as well as the more widely known ones. Based on that, I support checking against HIBP. 

Scott

> On Feb 16, 2021, at 9:33 AM, Chris Woodfield <chris at semihuman.com> wrote:
> Hi John, ARIN staff - 
> 
> To be clear, is this an operation that would be executed only upon a password change? While I definitely support that flow, I’d be curious if we’re also checking the existing account base against known password leaks.
> 
> If this is being checked upon password change, I believe that Option #3 is the best way to go, as this 1. provides immediate protection of the account and 2. Helps educate users as to the hazards of password re-use.
> 
> If there’s any planned or existing checks of existing passwords against haveibeenpwned, I’d react to a match with a required password change (with an explanation of the reason why) at next login, or a way to disable the login if the account isn’t logged into within a specific period of time (say, 30 days); this would need to generate a custom message when the user does try to log in that leads to the “forgotten password” flow.
> 
> LMK if this helps.
> 
> Thanks,
> 
> -C
> 
>> On Feb 16, 2021, at 8:11 AM, ARIN <info at arin.net> wrote:
>> 
>> Since October 2020, the ARIN Online system has been subject to a series of dictionary-based password guessing attacks. Because of the protective measures currently in place, some customer accounts were locked during these attacks.  ARIN staff has been heavily engaged in mitigating these attacks, and we are seeking community feedback on potential steps ARIN can take to reduce the risk of future attacks and to help customers ensure they are using strong passwords. Password dictionary guessing attacks continue to be a problem in the industry, and this effort should help reduce the extent of previously exposed passwords for our ARIN Online user base.
>> 
>> Password Check Proposal
>> 
>> To help ARIN customers make sure they aren’t using a password that has been exposed and shared publicly online, when someone updates their password or creates a user account in ARIN Online, it is proposed that ARIN should check the database "haveibeenpwned (https://haveibeenpwned.com)" to see if they are trying to use a password that has been compromised. ARIN will not send the password, but rather we encrypt the password and send part of the encrypted password to the Have I been Pwned (HIBP) Service (https://haveibeenpwned.com/API/v3#PwnedPasswords) to see if it matches a compromised password.  Actual passwords are never sent or used in any query, nor is your user ID or email shared as part of this check.
>> 
>> How would it work?
>> 
>> 1.    A user enters a password during Account Setup, Password Change, Password Reset or User Login in ARIN Online. 
>> 2.    ARIN encrypts the password and sends part of the encrypted password to the Have I been Pwned (HIBP) Service (https://haveibeenpwned.com/API/v3#PwnedPasswords) and returns all possible matches in their database. (Your actual password is never sent or used in any query.) 
>> 3.    We compare the full encrypted password to the results sent by HIBP to see if there is a match.
>> 4.    If there is a match we will notify the customer.
>> 
>> Optional Outcomes
>> 
>> We are interested in the community’s thoughts on the possible outcomes when we identify a password that has been exposed in a data breach according to the HIBP service. There are three options:
>> 
>> 1.    Issue a caution message but allow the password.
>> 2.    Issue a warning message and notify the customer that they need to change their password within a defined time period, but not at the current point of login.
>> 3.    Issue warning message that requires the customer to select and set a different password immediately.
>> 
>> The feedback you provide during this consultation will help inform how we move forward to increase security of ARIN Online for all customers. Thank you for your participation in the ARIN Consultation and Suggestion Process. 
>> 
>> Please provide comments to arin-consult at arin.net. You can subscribe to this mailing list at:
>> 
>> http://lists.arin.net/mailman/listinfo/arin-consult
>> 
>> This consultation will remain open through 5:00 PM ET on 16 March 2021. 
>> 
>> Regards,
>> 
>> John Curran  
>> President and CEO  
>> American Registry for Internet Numbers (ARIN)
>> 
>> 
>> _______________________________________________
>> ARIN-Announce
>> You are receiving this message because you are subscribed to
>> the ARIN Announce Mailing List (ARIN-announce at arin.net).
>> Unsubscribe or manage your mailing list subscription at:
>> https://lists.arin.net/mailman/listinfo/arin-announce
>> Please contact info at arin.net if you experience any issues.
> 
> _______________________________________________
> ARIN-Consult
> You are receiving this message because you are subscribed to the ARIN Consult Mailing
> List (ARIN-consult at arin.net).
> Unsubscribe or manage your mailing list subscription at:
> https://lists.arin.net/mailman/listinfo/arin-consult Please contact the ARIN Member Services
> Help Desk at info at arin.net if you experience any issues.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.arin.net/pipermail/arin-consult/attachments/20210216/d072263a/attachment-0001.htm>


More information about the ARIN-consult mailing list