Well, it was fun, wasn’t it?
The panic, the flying rumors, the denials. “Massive vulnerability” in a protocol we use
EVERYWHERE. What is an ordinary person
supposed to think when told your passwords could have been compromised?
So, when word comes that a password might be compromised,
you do the following:
- Log in to your password db and find the site/account’s record
- Open your browser and log into the site/account in question
- Navigate to your account preferences or find the change password link
- Enter your old password (assuming you’re using your data base, this is a copy/paste operation from the db)
- As a short-term protection from problems, copy your old password into the notes field of the record.
- Tell the db to generate a new password. In KeePass 2, there’s a button for this at
the end of the PW repeat line. I
randomly choose one of the generation algorithm options that button gives me,
on the grounds that almost anything it generates is going to be reasonably
secure. For high-stakes accounts like
my bank account, I use the highest hex key.
Sometimes I look at the password and add symbols to the numbers and
letters. But I admit that probably isn’t
really necessary most of the time.
- Save the db record, then copy/paste the new password into the password and repeat password fields in the account. Save changes.
- Log out of the account and log back in.
- Assuming the password change worked, open the db record again and erase the old password from the notes field.
- Save the new version of the db.
Keepass2 entry with Generate Password Button Circled |
All this actually takes a lot less time than it took to
write up the steps. Of course, that’s
for one account. If you have lots of
accounts you need to change, the time it takes multiplies. Do it anyway.
It would take a LOT more time to repair the damage if your passwords
have been compromised anywhere.
Which accounts do you need to fix? CNET has a list here, which they keep
updating:
http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/
http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/
The list is not in alphabetical order but that’s only a
minor inconvenience. You need to scan
the whole list anyway; it might trigger action on an account you haven’t
thought about in a while.
I had to create and memorize a new mail password by
hand. That always takes a few minutes of
concentration and a few days until I have it fully memorized and in my
fingers. Still worth it. And now done.
One thought worth repeating from my prior Security post:
whatever you do, use a different password for every account. You can’t control when vulnerabilities will
happen. But you CAN control the extent
of potential damage done to you. Use a
data base, which will generate a different password for every account.
You are responsible for your own data. Do what you need to do.
No comments:
Post a Comment