office check-in
Dec. 4th, 2022 05:23 pmBefore the pandemic, I went to the office every day, as one does. Our office manager did what he could to make it an ok environment, but it has the usual pathologies. Pandemic-induced working from home has been good for me in oh so many ways. I'm fortunate to be at a point in my career where I am quite comfortable telling my employer "I really do insist". (There's some pressure, mild so far.) I'll go to the office if there's a specific reason to, like the group outing we had a few months ago, but most of the people I work with aren't local, so going to the office is social, not productive.
On the day of that outing, I learned -- via a coworker finding out the hard way -- that corporate security disables badges that haven't been used in 90 days. That makes sense, though doing it silently isn't so great. Fortunately for me, I last changed my domain password around the time of that outing, so the "time to change your password" reminder serves double duty.
A few days ago I changed my password, and today I went to the office to wave a badge at a sensor. While I was there I cleared out the last of my personal belongings; demonstrably, I no longer need to keep an umbrella or a spare USB charging cable in my desk drawer there.
(no subject)
Date: 2022-12-04 11:04 pm (UTC)open the time capsuleclean out my cubicle. Haven't been there in nearly three years, and I shudder to think what's there that didn't get done back then.(no subject)
From:(no subject)
From:(no subject)
Date: 2022-12-05 03:13 am (UTC)Recently, when they officially lifted the block on remote workers coming on site regularly (as opposed to for business-critical purposes), there were a lot of reminders that you could check in with security by email in advance to be reactivated. I imagine this reduced the traffic jam at the main gate!
(no subject)
From:(no subject)
Date: 2022-12-05 12:56 pm (UTC)In May or June I had a routine talk with my manager, and he brought up RTO "in case anybody asks me", to which I replied "We have a bunch of vacation travel coming up this summer, and would really rather it not get cancelled by catching COVID," which he thought was a good answer. Since the summer vacation season, I've been going to the office one or two days a week, until I caught COVID a week before Thanksgiving, and then
(no subject)
From:(no subject)
Date: 2022-12-05 01:04 pm (UTC)Forced password changes every 90 days? Ugh. Maybe you can point them at NIST SP 800-63B; I believe NIST was the source of the original "change passwords regularly" recommendation back in what, the 1970s? NIST refers to passwords as "memorized secrets", so section 5.1.1 is the one that applies here. Since a few years ago, per it, passwords should be >= 8 characters (with exceptions that probably don't apply in your situation), systems should allow passwords of at least 64 characters, not impose any other complexity criteria, and NOT require "arbitrary" (specifically exemplified with "periodically") password changes. As a mitigation against long-lived passwords, they instead recommend failure rate limiting, which most systems already do; it's why it takes a few seconds to get back an "incorrect username or password" even though when you type it correctly the system lets you straight in. They also suggest ways to mitigate password reuse.
https://pages.nist.gov/800-63-3/sp800-63b.html#sec5
A long, high-entropy password or passphrase that is actually committed to memory is much better from a security point of view than one that has to be changed often and therefore likely won't be as complex simply because people are generally reluctant to have to commit new passwords to memory regularly.
As an example, a six- or seven-word Diceware passphrase provides 77-90 bits' worth of security (12.9 bits per word), which is plenty enough for just about any situation, is often eminently memorable, and takes only a few seconds to type once you have memorized it if you're a decent typist. Suppose someone knows that your password is a seven word Diceware passphrase generated using a particular word list; if they can try a billion possibilities per second (which is a pretty decent rate for an offline attack by a moderately powerful adversary, and completely unreasonably fast for an online attack), it will take the attacker upwards of 40 billion years to go through all possibilities; on average, they'll hit the right one in half that time. 2^90 (possibilities) / 10^9 (attempts per second) / (365*24*60*60) (seconds in a year) ~ 3.9 * 10^10 (years to completion). A highly motivated, powerful adversary might be able to raise that a few orders of magnitude, bringing the average time to completion down to, say, a few million years. No one is going to do that; they are going to try to get in through some other means where the complexity of the password doesn't matter.
/The Internet Dog
(no subject)
From:(no subject)
Date: 2022-12-05 01:20 pm (UTC)(My office wants be back every day; I've been going in 3-4 days in practice; fewer if I have a good reason. I wear the best masks I can, all the time... and eat lunch outside.)
(no subject)
From: