{"id":81247,"date":"2016-09-07T22:18:44","date_gmt":"2016-09-08T02:18:44","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-13T21:43:12","modified_gmt":"2021-08-14T01:43:12","slug":"stop-using-sms-for-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/stop-using-sms-for-two-factor-authentication\/","title":{"rendered":"Stop using SMS for Two-Factor Authentication"},"content":{"rendered":"<p><a href=\"http:\/\/sueschade.com\/2015\/09\/fall-football-and-fleece\/\" target=\"_blank\" rel=\"done sms is noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-92186\" title=\"Start using Two-Factor Authentication\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/time-to-adapt-small.jpg?resize=120%2C80&#038;ssl=1\" alt=\"Stop using SMS for Two-Factor Authentication\" width=\"120\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/time-to-adapt-small.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/time-to-adapt-small.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/time-to-adapt-small.jpg?w=560&amp;ssl=1 560w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>Followers of the <a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> know <a href=\"https:\/\/rbach.net\/index.php\/password-free-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">that<\/a> <strong><a href=\"https:\/\/wp.me\/p2wgaW-kzJ\" target=\"_blank\" rel=\"noopener noreferrer\">passwords<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-kTC\" target=\"_blank\" rel=\"noopener noreferrer\">suck<\/a><\/strong> and no longer provide reliable security. Because automated mass cybercrime attacks are hammering businesses daily, the <a title=\"National Institute of Standards and Technology\" href=\"http:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">National Institute of Standards and Technology<\/a> (<strong>NIST<\/strong>) is disrupting the online security status\u2013quo. <a href=\"https:\/\/web.archive.org\/web\/20190119074640\/https:\/\/www.infoworld.com\/article\/3100685\/authentication\/nist-no-longer-hot-for-sms-based-two-factor-authentication.html\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to <a href=\"http:\/\/www.infoworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>InfoWorld<\/em><\/a>, the US government&#8217;s standards body has decided that <strong>passwords are not good enough anymore<\/strong>.\u00a0NIST now wants government agencies to <strong>use two-factor authentication<\/strong> (2FA) to secure applications, networks, and systems.<\/p>\n<p><a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92190\" title=\"NIST\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nist_logo.gif?resize=110%2C56&#038;ssl=1\" alt=\"NIST logo\" width=\"110\" height=\"56\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nist_logo.gif?resize=150%2C76&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nist_logo.gif?resize=75%2C38&amp;ssl=1 75w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/two-factor-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">Two-factor authentication<\/a> is a security process where the user provides two means of identification from separate categories of credentials. The first is typically something you have, a physical token, such as a card. The second is usually something you know like a PIN number.<\/p>\n<p>The proposed standard <strong>discourages organizations from sending special codes via SMS messages.<\/strong> Many services offer two-factor authentication. They ask users to enter a one-time passcode sent via SMS into the app or site to verify the transaction. The author writes that weaknesses in the SMS mechanism concern NIST.<\/p>\n<p>NIST now recommends that developers <strong>use tokens and software cryptographic <a href=\"https:\/\/en.wikipedia.org\/wiki\/Authenticator\" target=\"_blank\" rel=\"noopener noreferrer\">authenticators<\/a> <\/strong>instead of SMS to deliver special codes. They wrote in a draft version of the DAG; &#8220;OOB [out of band] using SMS is deprecated and will no longer be allowed in future releases of this guidance.\u201d<\/p>\n<p><a href=\"http:\/\/www.smssoftwareonline.com\/smssoftwareonline\/pc-mob-sms.html\" target=\"_blank\" rel=\"(sms) message service short noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92193 \" title=\"Short Message Service (SMS)\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob.jpg?resize=102%2C90&#038;ssl=1\" alt=\"Short Message Service (SMS)\" width=\"102\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob.jpg?resize=150%2C133&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob.jpg?w=407&amp;ssl=1 407w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a>Federal agencies must use applications that conform to NIST guidelines. This means for software to be sold to <strong>federal agencies, it must follow NIST guidelines<\/strong>. <em>InfoWorld<\/em> says this is especially relevant for secure electronic communications.<\/p>\n<p><strong>SMS-based Two-Factor Authentication is considered insecure<\/strong> by NIST for a number of reasons. First, someone other than the user may be in possession of the phone. The author says an attacker with a <strong>stolen phone<\/strong> would be able to trigger the login request. In some cases, the contents of the text message <strong>appear on the lock screen,<\/strong> which means the code is exposed to anyone who glances at the screen.<\/p>\n<p><em><a href=\"http:\/\/blog.maytech.net\/blog\/two-factor-authentication-%E2%80%93-whats-it-all-about\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92196\" title=\"SMS based two-factor authentication (2FA)\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?resize=110%2C75&#038;ssl=1\" alt=\"SMS based two-factor authentication (2FA)\" width=\"110\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?resize=150%2C102&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?resize=75%2C51&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?resize=768%2C524&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?resize=1024%2C698&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_image.png?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>InfoWorld<\/em> says that NIST isn&#8217;t deprecating SMS-based methods simply because someone may be able to intercept the codes by taking control of the handset, that risk also exists with tokens and software authenticators. The main reason NIST appears to be down on SMS is that it is <strong>insecure over VoIP<\/strong>.<\/p>\n<p>The author says there has been a significant increase in attacks targeting SMS-based two-factor authentication recently. <strong>SMS messages can be hijacked over some VoIP services<\/strong>. SMS messages delivered through VoIP are only as secure as the websites and systems of the VoIP provider. If an attacker can <strong>hack the VoIP servers<\/strong> or network they can intercept the SMS security codes or have them rerouted to her own phone. Security researchers have used weaknesses in the SMS protocol to remotely interact with applications on the target phone and compromise users.<\/p>\n<p><em><a href=\"http:\/\/ethw.org\/Electromechanical_Telephone-Switching\" target=\"_blank\" rel=\"(ss7) 7 signalling system noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92199\" title=\"Signalling System 7 (SS7) \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/300px-1_crossbar_ny_may_1938-59x75.jpg?resize=106%2C135&#038;ssl=1\" alt=\"Signalling System 7 (SS7) \" width=\"106\" height=\"135\" \/><\/a><a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos&#8217;<\/a> <a href=\"https:\/\/nakedsecurity.sophos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Naked Security Blog<\/a><\/em> <a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/08\/18\/nists-new-password-rules-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">further explains<\/a> some of the risks. There is malware that can redirect text messages. There are attacks against the\u00a0<strong><a href=\"http:\/\/searchnetworking.techtarget.com\/definition\/Signaling-System-7\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"main-article-info\">Signalling System 7 (SS7) protocol<\/span><\/a><\/strong><span class=\"main-article-info\">.<\/span><span class=\"main-article-info\"> SS7 controls how the <\/span><span class=\"main-article-info\">phone system works.\u00a0 (<em><strong>rb-<\/strong> <a href=\"http:\/\/arstechnica.com\/security\/2016\/04\/how-hackers-eavesdropped-on-a-us-congressman-using-only-his-phone-number\/\" target=\"_blank\" rel=\"noopener noreferrer\">Some believe<\/a> that TLA&#8217;s hacked SS7 to spy on citizens.<\/em>) <\/span>This hack <span class=\"main-article-info\">allows an attacker to <strong>divert the SMS<\/strong> containing a one-time passcode to their own device, which lets the <a href=\"http:\/\/thehackernews.com\/2016\/06\/hack-facebook-account.html\" target=\"_blank\" rel=\"noopener noreferrer\">attacker hijack any service<\/a>, including <a title=\"Twitter\" href=\"https:\/\/twitter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> (<a title=\"NYSE : TWTR\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-TWTR\/\" target=\"_blank\" rel=\"noopener noreferrer\">TWTR<\/a>), <a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> (<a title=\"NASDAQ : FB\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"noopener noreferrer\">FB<\/a>) or\u00a0<a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a href=\"https:\/\/www.gmail.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gmail<\/a>, that uses SMS to send the secret code to reset the account password.<\/span><\/p>\n<p>Mobile phone <strong>number portability<\/strong> also poses a problem for SMS security. Sophos says that phone ports, also known as <strong>SIM swaps<\/strong> can make SMS insecure. <a href=\"http:\/\/betanews.com\/2016\/02\/12\/everything-you-need-to-know-about-sim-swap-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\">SIM swap attacks<\/a> are where an attacker convinces your mobile provider to issue you a new <a title=\"Subscriber identity module\" href=\"http:\/\/en.wikipedia.org\/wiki\/Subscriber_identity_module\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">SIM card<\/a> to replace one that\u2019s been lost, damaged, stolen or that is the wrong size for your new phone.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92202 \" title=\"SIM swap attacks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pin-cards.jpg?resize=95%2C63&#038;ssl=1\" alt=\"SIM swap attacks\" width=\"95\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pin-cards.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pin-cards.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pin-cards.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pin-cards.jpg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pin-cards.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/>Sophos also says in many places it is very easy for criminals to convince a mobile phone store to <strong><a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/06\/14\/deray-mckessons-twitter-account-hacked-with-just-his-name-and-four-digits\/\">transfer someone\u2019s phone number<\/a><\/strong> to a new SIM and therefore hijacking all their text messages.<\/p>\n<p><em>ComputerWorld<\/em> highlights a recent attack that used <strong>social engineering<\/strong> to bypass Google&#8217;s two-factor authentication. Criminals sent users text messages informing them that someone was trying to break into their Gmail accounts and that they should enter the passcode to temporarily lock the account. The passcode, which was a real code generated by Google when the attackers tried to log in, arrived in a separate text message, and users who didn&#8217;t realize the first message was not legitimate would pass the unique code on to the criminals.<\/p>\n<p>&#8220;<em>NIST&#8217;s decision to deprecate SMS two-factor <a href=\"https:\/\/web.archive.org\/web\/20220117155816\/https:\/\/nerdyloft.com\/2009\/02\/14\/password-security-how-important-is-it\/\" target=\"_blank\" rel=\"password noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92208 \" title=\"Password\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-thumb.jpg?resize=77%2C58&#038;ssl=1\" alt=\"Password\" width=\"77\" height=\"58\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-thumb.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-thumb.jpg?resize=75%2C57&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-thumb.jpg?w=219&amp;ssl=1 219w\" sizes=\"auto, (max-width: 77px) 100vw, 77px\" \/><\/a>authentication is a smart one<\/em>,&#8221; said Keith Graham, CTO of authentication provider <a title=\"SecureAuth\" href=\"http:\/\/www.secureauth.com\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">SecureAuth<\/a>. &#8220;<em>The days of vanilla two-factor approaches are no longer enough for security.<\/em>&#8221;<\/p>\n<p>For now, applications and services using SMS-based authentication can continue to do so as long as it isn&#8217;t a service that virtualizes phone numbers. Developers and application owners should explore other options, including <strong>dedicated two-factor apps. <\/strong>One example is <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">Google Authenticator<\/a>, which uses a secret key and time to generate a unique code locally on the device for the user to enter into the application.<\/p>\n<p><strong>Hardware tokens<\/strong> such as RSA&#8217;s <a title=\"RSA SecurID\" href=\"https:\/\/web.archive.org\/web\/20150317011005\/http:\/\/www.emc.com:80\/security\/rsa-securid.htm\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">SecurID<\/a> display a <a href=\"http:\/\/shop.easysign.com\/various\/wibu-dongle.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92205 \" title=\"Hardware tokens \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hardwaretoken.jpg?resize=74%2C74&#038;ssl=1\" alt=\"Hardware tokens \" width=\"74\" height=\"74\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hardwaretoken.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hardwaretoken.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hardwaretoken.jpg?w=350&amp;ssl=1 350w\" sizes=\"auto, (max-width: 74px) 100vw, 74px\" \/><\/a>new code every few seconds. A hardware <strong>security dongle<\/strong> such as <a title=\"YubiKey\" href=\"https:\/\/www.yubico.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">YubiKey<\/a>, used by many companies including Google and GitHub, supports one-time passwords, public-key encryption, and authentication. Knowing that NIST is not very happy with SMS will push the authentication industry towards more secure options.<\/p>\n<p>Many popular services and applications offer only SMS-based authentication, including Twitter and online banking services from major banks. Once the NIST guidelines are final, these services will have to make some changes.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20190913122326\/http:\/\/fingerprint-recognition-c.blogspot.com:80\/2012\/07\/fingerprint-recognition-c-source-code.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92213\" title=\"Fingerprint Recognition\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FingerprintRecognition.jpg?resize=86%2C95&#038;ssl=1\" alt=\"Fingerprint Recognition\" width=\"86\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FingerprintRecognition.jpg?resize=135%2C150&amp;ssl=1 135w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FingerprintRecognition.jpg?resize=68%2C75&amp;ssl=1 68w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FingerprintRecognition.jpg?w=225&amp;ssl=1 225w\" sizes=\"auto, (max-width: 86px) 100vw, 86px\" \/><\/a>Many developers are increasingly looking at <strong>fingerprint recognition. <\/strong><em>ComputerWorld<\/em> says this is because the latest mobile devices have fingerprint sensors. Organizations can also use adaptive authentication techniques, such as layering device recognition, geo-location, login history, or even <strong><a href=\"https:\/\/rbach.net\/index.php\/password-free-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">behavioral biometrics<\/a><\/strong> to continually verify the true identity of the user, SecureAuth&#8217;s Graham said.<\/p>\n<p>NIST acknowledged that biometrics is becoming more widespread as a method for authentication, but refrained from issuing a full recommendation. The recommendation was withheld because\u00a0<strong>biometrics aren&#8217;t considered secret<\/strong> and can be obtained and <a href=\"https:\/\/wp.me\/p2wgaW-kLj\" target=\"_blank\" rel=\"noopener noreferrer\">forged by attackers through various methods<\/a>.<\/p>\n<p>Biometric methods are acceptable only when used with another authentication factor, according to the draft guidelines. NIST wrote in the DAG;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>[Biometrics] can be obtained online or by taking a picture of someone with a camera phone (e.g. facial images) with or without their knowledge, lifted from objects someone touches (e.g., latent fingerprints), or captured with high-resolution images (e.g., iris patterns for blue eyes)<\/em><\/p>\n<p><em style=\"font-size: 16px; text-align: justify;\"><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mindreadingheadgear.jpg?ssl=1\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-92217\" title=\"Biometrics\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mindreadingheadgear.jpg?resize=96%2C96&#038;ssl=1\" alt=\"Biometrics\" width=\"96\" height=\"96\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mindreadingheadgear.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mindreadingheadgear.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mindreadingheadgear.jpg?w=450&amp;ssl=1 450w\" sizes=\"auto, (max-width: 96px) 100vw, 96px\" \/><\/a><\/em><\/p>\n<p>At this point, it appears NIST is moving away from recommending SMS-based authentication as a secure method for out-of-band verification. They are soliciting feedback from partners and NIST stakeholders on the new standard. They told <em>InfoWorld<\/em>, &#8220;<em>It only seemed appropriate for us to engage where so much of our community already congregates and collaborates.<\/em>\u201d<\/p>\n<p>You can review the draft of <strong>Special Publication 800-63-3: Digital Authentication Guidelines<\/strong> on <a href=\"https:\/\/github.com\/usnistgov\/800-63-3\" target=\"_blank\" rel=\"noopener noreferrer\">Github<\/a> or on NIST\u2019s <a href=\"https:\/\/pages.nist.gov\/800-63-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">website until Sept. 17.<\/a> Sophos recommends security researcher <a href=\"https:\/\/twitter.com\/jimfenton\" target=\"_blank\" rel=\"noopener noreferrer\">Jim Fenton&#8217;s<\/a> <a href=\"http:\/\/www.slideshare.net\/jim_fenton\/toward-better-password-requirements\" target=\"_blank\" rel=\"noopener noreferrer\">presentation<\/a> from the <a href=\"https:\/\/bsideslv2016.sched.org\/type\/Passwords\" target=\"_blank\" rel=\"noopener noreferrer\">PasswordsCon event<\/a> in Las Vegas that <a href=\"http:\/\/www.slideshare.net\/jim_fenton\/toward-better-password-requirements\" target=\"_blank\" rel=\"noopener noreferrer\">sums up the changes<\/a>.<\/p>\n<p><a href=\"https:\/\/venturebeat.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>VentureBeat<\/em><\/a> <a href=\"http:\/\/venturebeat.com\/2016\/07\/31\/the-govt-says-sms-codes-arent-safe-so-now-what\/\" target=\"_blank\" rel=\"noopener noreferrer\">offers some suggestions<\/a> to replace your SMS system:<\/p>\n<ul>\n<li>Hardware tokens that generate time-based codes.<\/li>\n<li>Apps that generate time-based codes, such as the Google Authenticator app\u00a0or RSA SecurID,<\/li>\n<li>Hardware dongles based on the <a href=\"https:\/\/guide.duo.com\/u2f\" target=\"_blank\" rel=\"noopener noreferrer\">U2F standard<\/a>.<\/li>\n<li>Systems that use push notifications to your phone.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.lifehacker.com.au\/2016\/08\/which-form-of-two-factor-authentication-should-i-use\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Which Form Of Two-Factor Authentication Should I Use?<\/a> (lifehacker.com.au)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NIST is warning  that SMS-based Two-Factor Authentication methods are too insecure and they wants everybody to use a a never form of 2FA<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,3275,2099,2759,536,92,1864,2213,949,2541,4,2762,1384,281,2758,1546],"class_list":["post-81247","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-800-63","tag-authentication","tag-github","tag-goog","tag-google","tag-government","tag-multi-factor-authentication","tag-nist","tag-passwords","tag-security","tag-short-message-service","tag-sms","tag-sophos","tag-ss7","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=81247"}],"version-history":[{"count":22,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81247\/revisions"}],"predecessor-version":[{"id":132349,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81247\/revisions\/132349"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=81247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=81247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=81247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}