Last Friday, I was locked out of one of my email accounts by the provider because of “too many failed login attempts”.
None of which I made—it was someone trying to hack my account. I was told that this is a new “security feature”. But I have a good password, and I don’t want to be locked out of my account at any time.
In my case, I had to wait all weekend for a password reset, since this particular organization was closed on weekends. This pretty much makes this email provider useless for anything but trivial stuff; the account could be locked at any time.
What such security features really do is to play into the hands of hackers, allowing trivially easy denial of service attacks. Denial of service attacks are typically in the context of web sites (overwhelming a site), but can be applied to email or any kind of login account on a web site. For example:
- Dig up 100 million email addresses (many ways to do this).
- Fake login attempts N+1 times, where N is the cutoff for locking the account. Starting Friday night of course, so customer support staff are thinned out.
- Sit back and laugh as 100 million users find themselves locked out of their email, if only for a day or two.
- Repeat each day (hey, bot nets are cheap).
Variations include targeting specific providers. Web sites that lock accounts this way are in essence implementing denial of service support for hackers.
There are many other ways to approach this, other than this crude bludgeon. For starters, allowing the user to decline this behavior (perhaps requiring an especially strong password), an option to notify a user about activity, additional prompts if a login occurs after failures, two factor authentication including apps like Authy, etc.
Corollary — nuisance messsages from “password reset” dialogs
Apple provides an iForgot.apple.com site to reset a password. It’s an ongoing headache for me, since Apple kicks me over there if I type my password wrong just twice (which I do sometimes do if my hands are stiff and cold). Very annoying behavior. But 1Password eliminates that issue for me now. Except not in iTunes or the AppStore, where 1Password doesn’t apply. So it still gets me on a regular basis.
That is relatively minor. The bigger headache is the regular recept of this message below, which is some hacker-generated thing (not me). And sometimes this is followed or preceded by an Apple “account locked” email, similar to that discussed above. Ditto for my Apple Developer account, which generally locks me out every month or so.
Apple has a 2-step authentication approach for purchases, but it’s unclear if it has been applied the idea to the above nuisance factors. Now enabled, MPG will soon see.