<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Password_policy_%28Draft%29</id>
		<title>Password policy (Draft) - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Password_policy_%28Draft%29"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Password_policy_(Draft)&amp;action=history"/>
		<updated>2026-04-11T21:43:52Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Password_policy_(Draft)&amp;diff=203667&amp;oldid=prev</id>
		<title>Adedov: Add links section</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Password_policy_(Draft)&amp;diff=203667&amp;oldid=prev"/>
				<updated>2015-11-20T23:27:06Z</updated>
		
		<summary type="html">&lt;p&gt;Add links section&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 23:27, 20 November 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l34&quot; &gt;Line 34:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 34:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Password Policy as a Mitigation to Passwords Threats===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Password Policy as a Mitigation to Passwords Threats===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;TODO&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;TODO&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;==Links==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# [http://openwall.info/wiki/passwdqc/policy Password strength policy considerations.] by Solar Designer&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# [http://research.microsoft.com/apps/pubs/?id=227130 An Administrator’s Guide to Internet Password Research. Dinei Florencio ˆ, Cormac Herley, and Paul C. van Oorschot. 2014]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# [http://research.microsoft.com/apps/pubs/?id=250408 Passwords and the Evolution of Imperfect Authentication.&amp;#160; Joe Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. 2015]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Adedov</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Password_policy_(Draft)&amp;diff=203664&amp;oldid=prev</id>
		<title>Adedov: Created page with &quot;'''This document is an attempt to write draft replacement for Password length &amp; complexity page.'''  ==What Is Password Policy== TODO  ==Threat Model== There are three mai...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Password_policy_(Draft)&amp;diff=203664&amp;oldid=prev"/>
				<updated>2015-11-20T23:17:47Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;This document is an attempt to write draft replacement for &lt;a href=&quot;/index.php?title=Password_length_%26_complexity&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Password length &amp;amp; complexity (page does not exist)&quot;&gt;Password length &amp;amp; complexity&lt;/a&gt; page.&amp;#039;&amp;#039;&amp;#039;  ==What Is Password Policy== TODO  ==Threat Model== There are three mai...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''This document is an attempt to write draft replacement for [[Password length &amp;amp; complexity]] page.'''&lt;br /&gt;
&lt;br /&gt;
==What Is Password Policy==&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
==Threat Model==&lt;br /&gt;
There are three main threats against to user passwords:&lt;br /&gt;
* Online attacks&lt;br /&gt;
* Offline attacks&lt;br /&gt;
* Password leaks&lt;br /&gt;
&lt;br /&gt;
===Online Attacks===&lt;br /&gt;
In this mode attacker tries to guess users passwords by sending candidate passwords directly to attacking service.&lt;br /&gt;
&lt;br /&gt;
The speed and feasibility of online attacks are defined by security mechanisms implemented by application such as rate limiting authentication requests per user, IP address, etc. As well as by overall performance of network infrastructure and application.&lt;br /&gt;
&lt;br /&gt;
===Offline Attacks===&lt;br /&gt;
If attacker have got a passwords file or a database dump or a captured traffic (e.g. Kerberos ticket or WiFi frames) and passwords are protected with some kind of crypto then attacker may mount so called offline attack.&lt;br /&gt;
&lt;br /&gt;
The speed of offline attack is defined by resources available to attacker as well as robustness of methods used to protect user's passwords. In many cases the difference is speed between online and offline mode is order of magnitude in favour of offline mode.&lt;br /&gt;
&lt;br /&gt;
===Depth vs. Breadth===&lt;br /&gt;
In context of password policy discussions it might be useful to distinguish ''targeted'' and ''untargeted'' attacks by attacker's primary goal:&lt;br /&gt;
; Targeted (depth-first) : Attacker needs to guess password of a specific user.&lt;br /&gt;
; Untargeted (breadth-first) : Attacker would be satisfied to find out any password of any account or want to collect as much valid credentials as possible. &lt;br /&gt;
&lt;br /&gt;
===Password Leaks===&lt;br /&gt;
There are plenty of threats for passwords confidentiality that have no relation to guessing techniques at all. Examples are:&lt;br /&gt;
* Phishing and social engineering attacks;&lt;br /&gt;
* Malware installed on users devices;&lt;br /&gt;
* Capturing passwords during transmissions over insecure channels;&lt;br /&gt;
* Etc.&lt;br /&gt;
&lt;br /&gt;
===Password Policy as a Mitigation to Passwords Threats===&lt;br /&gt;
TODO&lt;/div&gt;</summary>
		<author><name>Adedov</name></author>	</entry>

	</feed>