If my password was able to be printed on a form sent home from my child's school, does it imply insecure password storage policies?
I have a user account for each of my children in our district website, which oversees registration, grades, identification, etc.
I was recently sent home a form from both of my children's classrooms asking us to login to our accounts so we could sign a new school year form. Printed on this piece of paper was both the username and the password for our accounts.
The security practice of sending home printed passwords is immediately discouraging, but my larger concern is how my password is stored in the district system (and ultimately, what would happen if that system were compromised).
I want to contact the webmaster, but I want to make sure I'm correct in any assumptions I make prior to shooting off my email asking that action be taken to avoid this kind of thing. I saw a related question, and want to make sure I don't jump the gun on harassing them over their storage policies.
--
Since it's been asked several times, this is a password that I set on the account, not an auto-generated password. Also, this is an account that parents control; it contains sensitive identifying information of your child. It's not intended as a student portal or anything like that.
--
Update_1 :
I got a call from the district webmaster today, wanting to discuss my email in more detail. I explained my concerns were two-fold: (a) the transmission of our password on a printed piece of paper, and (b) the ability to retrieve that password in the first place.
I was informed that the system is a legacy system, and as such has no capability of allowing a "forgot my password" feature. While the policy, they agreed, is incorrect, the alternative is to have every parent who doesn't remember their password come into the school with an ID to retrieve their password. (I was also informed that since we're in a 60% poverty district, assuming all parents have an email address for password management isn't an option). While this is and incredible inconvenient, I explained the inconvenience of likewise having someone access my accounts because they had access to my password.
I was also informed that the system is being replaced next year, which will come with more modern security features (though, I'm unsure of the storage policies on the future system).
The lady was very polite, and offered to put me in contact with their director of IT to discuss my concerns around password storage policies, which I accepted. She also offered to BCC me on an email to our school principal, requesting that future communications be issued in a sealed format.
Finally, I was slightly (and correctly) scolded for reusing my password in the first place.
passwords web-application
add a comment |
I have a user account for each of my children in our district website, which oversees registration, grades, identification, etc.
I was recently sent home a form from both of my children's classrooms asking us to login to our accounts so we could sign a new school year form. Printed on this piece of paper was both the username and the password for our accounts.
The security practice of sending home printed passwords is immediately discouraging, but my larger concern is how my password is stored in the district system (and ultimately, what would happen if that system were compromised).
I want to contact the webmaster, but I want to make sure I'm correct in any assumptions I make prior to shooting off my email asking that action be taken to avoid this kind of thing. I saw a related question, and want to make sure I don't jump the gun on harassing them over their storage policies.
--
Since it's been asked several times, this is a password that I set on the account, not an auto-generated password. Also, this is an account that parents control; it contains sensitive identifying information of your child. It's not intended as a student portal or anything like that.
--
Update_1 :
I got a call from the district webmaster today, wanting to discuss my email in more detail. I explained my concerns were two-fold: (a) the transmission of our password on a printed piece of paper, and (b) the ability to retrieve that password in the first place.
I was informed that the system is a legacy system, and as such has no capability of allowing a "forgot my password" feature. While the policy, they agreed, is incorrect, the alternative is to have every parent who doesn't remember their password come into the school with an ID to retrieve their password. (I was also informed that since we're in a 60% poverty district, assuming all parents have an email address for password management isn't an option). While this is and incredible inconvenient, I explained the inconvenience of likewise having someone access my accounts because they had access to my password.
I was also informed that the system is being replaced next year, which will come with more modern security features (though, I'm unsure of the storage policies on the future system).
The lady was very polite, and offered to put me in contact with their director of IT to discuss my concerns around password storage policies, which I accepted. She also offered to BCC me on an email to our school principal, requesting that future communications be issued in a sealed format.
Finally, I was slightly (and correctly) scolded for reusing my password in the first place.
passwords web-application
1
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
Aug 26 at 14:22
13
Wow! That's about as good a response as you can hope for! I'm impressed!
– Mike Ounsworth
Aug 28 at 18:50
add a comment |
I have a user account for each of my children in our district website, which oversees registration, grades, identification, etc.
I was recently sent home a form from both of my children's classrooms asking us to login to our accounts so we could sign a new school year form. Printed on this piece of paper was both the username and the password for our accounts.
The security practice of sending home printed passwords is immediately discouraging, but my larger concern is how my password is stored in the district system (and ultimately, what would happen if that system were compromised).
I want to contact the webmaster, but I want to make sure I'm correct in any assumptions I make prior to shooting off my email asking that action be taken to avoid this kind of thing. I saw a related question, and want to make sure I don't jump the gun on harassing them over their storage policies.
--
Since it's been asked several times, this is a password that I set on the account, not an auto-generated password. Also, this is an account that parents control; it contains sensitive identifying information of your child. It's not intended as a student portal or anything like that.
--
Update_1 :
I got a call from the district webmaster today, wanting to discuss my email in more detail. I explained my concerns were two-fold: (a) the transmission of our password on a printed piece of paper, and (b) the ability to retrieve that password in the first place.
I was informed that the system is a legacy system, and as such has no capability of allowing a "forgot my password" feature. While the policy, they agreed, is incorrect, the alternative is to have every parent who doesn't remember their password come into the school with an ID to retrieve their password. (I was also informed that since we're in a 60% poverty district, assuming all parents have an email address for password management isn't an option). While this is and incredible inconvenient, I explained the inconvenience of likewise having someone access my accounts because they had access to my password.
I was also informed that the system is being replaced next year, which will come with more modern security features (though, I'm unsure of the storage policies on the future system).
The lady was very polite, and offered to put me in contact with their director of IT to discuss my concerns around password storage policies, which I accepted. She also offered to BCC me on an email to our school principal, requesting that future communications be issued in a sealed format.
Finally, I was slightly (and correctly) scolded for reusing my password in the first place.
passwords web-application
I have a user account for each of my children in our district website, which oversees registration, grades, identification, etc.
I was recently sent home a form from both of my children's classrooms asking us to login to our accounts so we could sign a new school year form. Printed on this piece of paper was both the username and the password for our accounts.
The security practice of sending home printed passwords is immediately discouraging, but my larger concern is how my password is stored in the district system (and ultimately, what would happen if that system were compromised).
I want to contact the webmaster, but I want to make sure I'm correct in any assumptions I make prior to shooting off my email asking that action be taken to avoid this kind of thing. I saw a related question, and want to make sure I don't jump the gun on harassing them over their storage policies.
--
Since it's been asked several times, this is a password that I set on the account, not an auto-generated password. Also, this is an account that parents control; it contains sensitive identifying information of your child. It's not intended as a student portal or anything like that.
--
Update_1 :
I got a call from the district webmaster today, wanting to discuss my email in more detail. I explained my concerns were two-fold: (a) the transmission of our password on a printed piece of paper, and (b) the ability to retrieve that password in the first place.
I was informed that the system is a legacy system, and as such has no capability of allowing a "forgot my password" feature. While the policy, they agreed, is incorrect, the alternative is to have every parent who doesn't remember their password come into the school with an ID to retrieve their password. (I was also informed that since we're in a 60% poverty district, assuming all parents have an email address for password management isn't an option). While this is and incredible inconvenient, I explained the inconvenience of likewise having someone access my accounts because they had access to my password.
I was also informed that the system is being replaced next year, which will come with more modern security features (though, I'm unsure of the storage policies on the future system).
The lady was very polite, and offered to put me in contact with their director of IT to discuss my concerns around password storage policies, which I accepted. She also offered to BCC me on an email to our school principal, requesting that future communications be issued in a sealed format.
Finally, I was slightly (and correctly) scolded for reusing my password in the first place.
passwords web-application
passwords web-application
edited Aug 28 at 18:45
asked Aug 24 at 15:09
MrDuk
880259
880259
1
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
Aug 26 at 14:22
13
Wow! That's about as good a response as you can hope for! I'm impressed!
– Mike Ounsworth
Aug 28 at 18:50
add a comment |
1
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
Aug 26 at 14:22
13
Wow! That's about as good a response as you can hope for! I'm impressed!
– Mike Ounsworth
Aug 28 at 18:50
1
1
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
Aug 26 at 14:22
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
Aug 26 at 14:22
13
13
Wow! That's about as good a response as you can hope for! I'm impressed!
– Mike Ounsworth
Aug 28 at 18:50
Wow! That's about as good a response as you can hope for! I'm impressed!
– Mike Ounsworth
Aug 28 at 18:50
add a comment |
3 Answers
3
active
oldest
votes
Yup! If they are able to retrieve the password from the database, then they are clearly not following password storage best-practices. OWASP provides a good guide for how to do it properly:
- https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
Here's some ammunition you could use in that letter:
- You want me (the legal guardian of my child) to sign a form.
- You are using the action of logging into a website and clicking a button as a form of legal signature.
- How do you know it was actually me that logged in and clicked the button?
- How many people had access to the sheet with the username and password on its way to me? How can you prove that it was actually me that logged in and clicked the button?
- Clearly the password is stored in the database in such a way that it can be retrieved by school board staff. How can you prove that it was actually me that logged in and clicked the button?
- Were something to go wrong, I highly doubt that "signature" would hold up in court, meaning the form will not hold up in court. This seems like a liability issue for the school board and/or for me (depending on what's in the form).
- Can I get a statement from the school board's legal team that this is ok?
93
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
8
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
7
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out offirewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.
– Mike Ounsworth
Aug 27 at 18:48
4
Something something FERPA
– Acccumulation
Aug 27 at 20:47
3
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
|
show 15 more comments
NOTE: since the question was updated to specify that the password in question isn't used by the student, and was not a random initial password, the rest of this answer doesn't really apply. I concur with the other answers that parent passwords should be stored with standard salted-iterated-hash techniques. The obstacles that the school district will face in implementing this plan are much less than the equivalent for student passwords.
Speaking from experience inside K-12 information technology, I can tell you the situation is probably worse than you imagine.
Before you start to push for change, be aware that you are fighting a giant system, not a single school or district. There are some bright spots, it's basically a realm where standard security wisdom doesn't apply. Half the vendors haven't heard of any modern password storage options, or federated authentication. A lot of the students are too young to handle a password with any serious amount of entropy.
And most important of all, schools are nosier than any tin-pot dictatorship. Administrators want the ability to get into student accounts any time they think something might be wrong. The only way to do that, across all the services with their various outdated authentication schemes, is to know the password.
If you find yourself making your complaint to someone who's actually required to answer your questions, let me suggest a few:
- How many school employees have access to view student passwords?
- Is there any record showing how often a student's password has been viewed, and by which staff members?
- Is there any record of which staff members have used student passwords to log in to which student accounts, and which services they accessed?
- How many different databases within the school district contain copies of the (unencrypted, unhashed) student passwords?
- Are student passwords ever changed proactively (either after an expiration time or by the student on their own initiative) or do they remain the same forever, in the absence of a reported breach?
- Has there been a penetration test... on anything... ever?
- How many third parties (e.g. online textbook publishers) have been given a complete list of student passwords and/or full remote access to a database containing them?
- When considering the purchase of a new product or service that will involve student logins, are information security practices ever a factor in the decision?
Don't expect good answers. Expect bad answers, and plan your next move ahead of time.
And don't expect to surprise them with HIPAA and FERPA. They've heard of those, and their lawyer has probably already told them everything they're doing is fine.
20
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
3
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
7
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
1
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.
– Zoredache
Aug 27 at 19:51
|
show 5 more comments
Is this a password that you entered, or is it a randomly generated initial password that you will have to change on the first login?
In the first case, this is a sign of absolutely terrible security practices that raises pretty much every red flag imaginable. This is a massive security hole and needs to be addressed immediately. Also, you should right now change this password everywhere else you use it (let's be honest, we all re-use passwords).
This also needs to be brought to the attention of whoever is responsible for information security at the school. Or the principle. Basically the person whose career is in danger if a breach happens and makes national news.
In the second case, this is SOP, nothing to see, move along.
3
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
7
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
add a comment |
protected by Community♦ Aug 25 at 19:32
Thank you for your interest in this question.
Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
Yup! If they are able to retrieve the password from the database, then they are clearly not following password storage best-practices. OWASP provides a good guide for how to do it properly:
- https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
Here's some ammunition you could use in that letter:
- You want me (the legal guardian of my child) to sign a form.
- You are using the action of logging into a website and clicking a button as a form of legal signature.
- How do you know it was actually me that logged in and clicked the button?
- How many people had access to the sheet with the username and password on its way to me? How can you prove that it was actually me that logged in and clicked the button?
- Clearly the password is stored in the database in such a way that it can be retrieved by school board staff. How can you prove that it was actually me that logged in and clicked the button?
- Were something to go wrong, I highly doubt that "signature" would hold up in court, meaning the form will not hold up in court. This seems like a liability issue for the school board and/or for me (depending on what's in the form).
- Can I get a statement from the school board's legal team that this is ok?
93
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
8
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
7
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out offirewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.
– Mike Ounsworth
Aug 27 at 18:48
4
Something something FERPA
– Acccumulation
Aug 27 at 20:47
3
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
|
show 15 more comments
Yup! If they are able to retrieve the password from the database, then they are clearly not following password storage best-practices. OWASP provides a good guide for how to do it properly:
- https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
Here's some ammunition you could use in that letter:
- You want me (the legal guardian of my child) to sign a form.
- You are using the action of logging into a website and clicking a button as a form of legal signature.
- How do you know it was actually me that logged in and clicked the button?
- How many people had access to the sheet with the username and password on its way to me? How can you prove that it was actually me that logged in and clicked the button?
- Clearly the password is stored in the database in such a way that it can be retrieved by school board staff. How can you prove that it was actually me that logged in and clicked the button?
- Were something to go wrong, I highly doubt that "signature" would hold up in court, meaning the form will not hold up in court. This seems like a liability issue for the school board and/or for me (depending on what's in the form).
- Can I get a statement from the school board's legal team that this is ok?
93
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
8
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
7
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out offirewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.
– Mike Ounsworth
Aug 27 at 18:48
4
Something something FERPA
– Acccumulation
Aug 27 at 20:47
3
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
|
show 15 more comments
Yup! If they are able to retrieve the password from the database, then they are clearly not following password storage best-practices. OWASP provides a good guide for how to do it properly:
- https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
Here's some ammunition you could use in that letter:
- You want me (the legal guardian of my child) to sign a form.
- You are using the action of logging into a website and clicking a button as a form of legal signature.
- How do you know it was actually me that logged in and clicked the button?
- How many people had access to the sheet with the username and password on its way to me? How can you prove that it was actually me that logged in and clicked the button?
- Clearly the password is stored in the database in such a way that it can be retrieved by school board staff. How can you prove that it was actually me that logged in and clicked the button?
- Were something to go wrong, I highly doubt that "signature" would hold up in court, meaning the form will not hold up in court. This seems like a liability issue for the school board and/or for me (depending on what's in the form).
- Can I get a statement from the school board's legal team that this is ok?
Yup! If they are able to retrieve the password from the database, then they are clearly not following password storage best-practices. OWASP provides a good guide for how to do it properly:
- https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
Here's some ammunition you could use in that letter:
- You want me (the legal guardian of my child) to sign a form.
- You are using the action of logging into a website and clicking a button as a form of legal signature.
- How do you know it was actually me that logged in and clicked the button?
- How many people had access to the sheet with the username and password on its way to me? How can you prove that it was actually me that logged in and clicked the button?
- Clearly the password is stored in the database in such a way that it can be retrieved by school board staff. How can you prove that it was actually me that logged in and clicked the button?
- Were something to go wrong, I highly doubt that "signature" would hold up in court, meaning the form will not hold up in court. This seems like a liability issue for the school board and/or for me (depending on what's in the form).
- Can I get a statement from the school board's legal team that this is ok?
edited Aug 24 at 15:39
answered Aug 24 at 15:29
Mike Ounsworth
38.7k1493137
38.7k1493137
93
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
8
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
7
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out offirewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.
– Mike Ounsworth
Aug 27 at 18:48
4
Something something FERPA
– Acccumulation
Aug 27 at 20:47
3
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
|
show 15 more comments
93
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
8
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
7
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out offirewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.
– Mike Ounsworth
Aug 27 at 18:48
4
Something something FERPA
– Acccumulation
Aug 27 at 20:47
3
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
93
93
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
The list of points is incredibly helpful, and provides a clear logical path leading to the conclusion of this just isn't ok.
– MrDuk
Aug 24 at 15:36
8
8
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
A plain-text password should exist in exactly one place outside the user's control. In the process that receives the encrypted version and generates the salted hash for comparison or storage. If the password itself is stored, encrypted or not, secured or not, in any form, any where, it is at risk from some form of attack. That includes on the user's system, but it's their risk, to their data, and they can choose to take risks as they see fit, while the website doesn't have that right.
– Gypsy Spellweaver
Aug 24 at 19:11
7
7
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out of
firewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.– Mike Ounsworth
Aug 27 at 18:48
@MontyHarder I'm specifically trying to stay away from attacking their IT practices because IT people are very good at making word-salad out of
firewall, encryption, admin-only, trusted-employee, etc
and believing their solution is good enough. That's why I presented a strictly lawyer-centric argument that the way they've built the system does not achieve the basic functionality of collecting a legally-binding signature.– Mike Ounsworth
Aug 27 at 18:48
4
4
Something something FERPA
– Acccumulation
Aug 27 at 20:47
Something something FERPA
– Acccumulation
Aug 27 at 20:47
3
3
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
@AlexanderKosubek the world has a long history of accepting paper signatures as ... signatures, and a whole forensics industry around determining if a signature is fake. I don't think that's the same difference ...
– Mike Ounsworth
Aug 28 at 10:42
|
show 15 more comments
NOTE: since the question was updated to specify that the password in question isn't used by the student, and was not a random initial password, the rest of this answer doesn't really apply. I concur with the other answers that parent passwords should be stored with standard salted-iterated-hash techniques. The obstacles that the school district will face in implementing this plan are much less than the equivalent for student passwords.
Speaking from experience inside K-12 information technology, I can tell you the situation is probably worse than you imagine.
Before you start to push for change, be aware that you are fighting a giant system, not a single school or district. There are some bright spots, it's basically a realm where standard security wisdom doesn't apply. Half the vendors haven't heard of any modern password storage options, or federated authentication. A lot of the students are too young to handle a password with any serious amount of entropy.
And most important of all, schools are nosier than any tin-pot dictatorship. Administrators want the ability to get into student accounts any time they think something might be wrong. The only way to do that, across all the services with their various outdated authentication schemes, is to know the password.
If you find yourself making your complaint to someone who's actually required to answer your questions, let me suggest a few:
- How many school employees have access to view student passwords?
- Is there any record showing how often a student's password has been viewed, and by which staff members?
- Is there any record of which staff members have used student passwords to log in to which student accounts, and which services they accessed?
- How many different databases within the school district contain copies of the (unencrypted, unhashed) student passwords?
- Are student passwords ever changed proactively (either after an expiration time or by the student on their own initiative) or do they remain the same forever, in the absence of a reported breach?
- Has there been a penetration test... on anything... ever?
- How many third parties (e.g. online textbook publishers) have been given a complete list of student passwords and/or full remote access to a database containing them?
- When considering the purchase of a new product or service that will involve student logins, are information security practices ever a factor in the decision?
Don't expect good answers. Expect bad answers, and plan your next move ahead of time.
And don't expect to surprise them with HIPAA and FERPA. They've heard of those, and their lawyer has probably already told them everything they're doing is fine.
20
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
3
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
7
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
1
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.
– Zoredache
Aug 27 at 19:51
|
show 5 more comments
NOTE: since the question was updated to specify that the password in question isn't used by the student, and was not a random initial password, the rest of this answer doesn't really apply. I concur with the other answers that parent passwords should be stored with standard salted-iterated-hash techniques. The obstacles that the school district will face in implementing this plan are much less than the equivalent for student passwords.
Speaking from experience inside K-12 information technology, I can tell you the situation is probably worse than you imagine.
Before you start to push for change, be aware that you are fighting a giant system, not a single school or district. There are some bright spots, it's basically a realm where standard security wisdom doesn't apply. Half the vendors haven't heard of any modern password storage options, or federated authentication. A lot of the students are too young to handle a password with any serious amount of entropy.
And most important of all, schools are nosier than any tin-pot dictatorship. Administrators want the ability to get into student accounts any time they think something might be wrong. The only way to do that, across all the services with their various outdated authentication schemes, is to know the password.
If you find yourself making your complaint to someone who's actually required to answer your questions, let me suggest a few:
- How many school employees have access to view student passwords?
- Is there any record showing how often a student's password has been viewed, and by which staff members?
- Is there any record of which staff members have used student passwords to log in to which student accounts, and which services they accessed?
- How many different databases within the school district contain copies of the (unencrypted, unhashed) student passwords?
- Are student passwords ever changed proactively (either after an expiration time or by the student on their own initiative) or do they remain the same forever, in the absence of a reported breach?
- Has there been a penetration test... on anything... ever?
- How many third parties (e.g. online textbook publishers) have been given a complete list of student passwords and/or full remote access to a database containing them?
- When considering the purchase of a new product or service that will involve student logins, are information security practices ever a factor in the decision?
Don't expect good answers. Expect bad answers, and plan your next move ahead of time.
And don't expect to surprise them with HIPAA and FERPA. They've heard of those, and their lawyer has probably already told them everything they're doing is fine.
20
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
3
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
7
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
1
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.
– Zoredache
Aug 27 at 19:51
|
show 5 more comments
NOTE: since the question was updated to specify that the password in question isn't used by the student, and was not a random initial password, the rest of this answer doesn't really apply. I concur with the other answers that parent passwords should be stored with standard salted-iterated-hash techniques. The obstacles that the school district will face in implementing this plan are much less than the equivalent for student passwords.
Speaking from experience inside K-12 information technology, I can tell you the situation is probably worse than you imagine.
Before you start to push for change, be aware that you are fighting a giant system, not a single school or district. There are some bright spots, it's basically a realm where standard security wisdom doesn't apply. Half the vendors haven't heard of any modern password storage options, or federated authentication. A lot of the students are too young to handle a password with any serious amount of entropy.
And most important of all, schools are nosier than any tin-pot dictatorship. Administrators want the ability to get into student accounts any time they think something might be wrong. The only way to do that, across all the services with their various outdated authentication schemes, is to know the password.
If you find yourself making your complaint to someone who's actually required to answer your questions, let me suggest a few:
- How many school employees have access to view student passwords?
- Is there any record showing how often a student's password has been viewed, and by which staff members?
- Is there any record of which staff members have used student passwords to log in to which student accounts, and which services they accessed?
- How many different databases within the school district contain copies of the (unencrypted, unhashed) student passwords?
- Are student passwords ever changed proactively (either after an expiration time or by the student on their own initiative) or do they remain the same forever, in the absence of a reported breach?
- Has there been a penetration test... on anything... ever?
- How many third parties (e.g. online textbook publishers) have been given a complete list of student passwords and/or full remote access to a database containing them?
- When considering the purchase of a new product or service that will involve student logins, are information security practices ever a factor in the decision?
Don't expect good answers. Expect bad answers, and plan your next move ahead of time.
And don't expect to surprise them with HIPAA and FERPA. They've heard of those, and their lawyer has probably already told them everything they're doing is fine.
NOTE: since the question was updated to specify that the password in question isn't used by the student, and was not a random initial password, the rest of this answer doesn't really apply. I concur with the other answers that parent passwords should be stored with standard salted-iterated-hash techniques. The obstacles that the school district will face in implementing this plan are much less than the equivalent for student passwords.
Speaking from experience inside K-12 information technology, I can tell you the situation is probably worse than you imagine.
Before you start to push for change, be aware that you are fighting a giant system, not a single school or district. There are some bright spots, it's basically a realm where standard security wisdom doesn't apply. Half the vendors haven't heard of any modern password storage options, or federated authentication. A lot of the students are too young to handle a password with any serious amount of entropy.
And most important of all, schools are nosier than any tin-pot dictatorship. Administrators want the ability to get into student accounts any time they think something might be wrong. The only way to do that, across all the services with their various outdated authentication schemes, is to know the password.
If you find yourself making your complaint to someone who's actually required to answer your questions, let me suggest a few:
- How many school employees have access to view student passwords?
- Is there any record showing how often a student's password has been viewed, and by which staff members?
- Is there any record of which staff members have used student passwords to log in to which student accounts, and which services they accessed?
- How many different databases within the school district contain copies of the (unencrypted, unhashed) student passwords?
- Are student passwords ever changed proactively (either after an expiration time or by the student on their own initiative) or do they remain the same forever, in the absence of a reported breach?
- Has there been a penetration test... on anything... ever?
- How many third parties (e.g. online textbook publishers) have been given a complete list of student passwords and/or full remote access to a database containing them?
- When considering the purchase of a new product or service that will involve student logins, are information security practices ever a factor in the decision?
Don't expect good answers. Expect bad answers, and plan your next move ahead of time.
And don't expect to surprise them with HIPAA and FERPA. They've heard of those, and their lawyer has probably already told them everything they're doing is fine.
edited Aug 25 at 13:10
answered Aug 25 at 2:40
anon-insider
2213
2213
20
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
3
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
7
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
1
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.
– Zoredache
Aug 27 at 19:51
|
show 5 more comments
20
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
3
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
7
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
1
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.
– Zoredache
Aug 27 at 19:51
20
20
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9. Do student records contain any health-related info? HIPAA violations can be very expensive.
– WGroleau
Aug 25 at 3:11
9
9
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
"How many school employees have access to view student passwords?" Just an anecdote to highlight how important this first point is, I happen to know an older gentleman who, up until just a couple years ago, used his SSN as his password on just about everything. He had no idea that passwords can ever be cracked, so his reasoning was just use something he's already keeping a secret anyways. This or any other sensitive information might be in the password field, and if someone sees a plain text 9 digit number for a password... well you can imagine how awful this can be for unsuspecting parents.
– Davy M
Aug 26 at 3:07
3
3
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
@DavyM That's exactly why storing passwords should be an offense punishable by kicking to the end of the perpetrators life - because some website run by incompetents will be publishing this gentleman's passwords.
– gnasher729
Aug 27 at 13:37
7
7
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
There is no reason why staff members should use student passwords to log into student accounts. None. A properly-designed system can allow privileged ("Administrator" or "root") accounts to temporarily assume another account's identity with no need to know that account's password to do so, and log the fact that it happened, so no identity theft is thereby accomplished. If the system in question is not so-designed, then it's further evidence that the architects and administrators are Doing It Wrong™.
– Monty Harder
Aug 27 at 18:43
1
1
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.– Zoredache
Aug 27 at 19:51
If the system in question is not so-designed
- I see you haven't worked in K12. Sometimes I think 'Doing it Wrong' is our slogan. But seriously, K12 funding usually sucks and there is lots and lots of software that sucks from a security stand point.– Zoredache
Aug 27 at 19:51
|
show 5 more comments
Is this a password that you entered, or is it a randomly generated initial password that you will have to change on the first login?
In the first case, this is a sign of absolutely terrible security practices that raises pretty much every red flag imaginable. This is a massive security hole and needs to be addressed immediately. Also, you should right now change this password everywhere else you use it (let's be honest, we all re-use passwords).
This also needs to be brought to the attention of whoever is responsible for information security at the school. Or the principle. Basically the person whose career is in danger if a breach happens and makes national news.
In the second case, this is SOP, nothing to see, move along.
3
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
7
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
add a comment |
Is this a password that you entered, or is it a randomly generated initial password that you will have to change on the first login?
In the first case, this is a sign of absolutely terrible security practices that raises pretty much every red flag imaginable. This is a massive security hole and needs to be addressed immediately. Also, you should right now change this password everywhere else you use it (let's be honest, we all re-use passwords).
This also needs to be brought to the attention of whoever is responsible for information security at the school. Or the principle. Basically the person whose career is in danger if a breach happens and makes national news.
In the second case, this is SOP, nothing to see, move along.
3
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
7
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
add a comment |
Is this a password that you entered, or is it a randomly generated initial password that you will have to change on the first login?
In the first case, this is a sign of absolutely terrible security practices that raises pretty much every red flag imaginable. This is a massive security hole and needs to be addressed immediately. Also, you should right now change this password everywhere else you use it (let's be honest, we all re-use passwords).
This also needs to be brought to the attention of whoever is responsible for information security at the school. Or the principle. Basically the person whose career is in danger if a breach happens and makes national news.
In the second case, this is SOP, nothing to see, move along.
Is this a password that you entered, or is it a randomly generated initial password that you will have to change on the first login?
In the first case, this is a sign of absolutely terrible security practices that raises pretty much every red flag imaginable. This is a massive security hole and needs to be addressed immediately. Also, you should right now change this password everywhere else you use it (let's be honest, we all re-use passwords).
This also needs to be brought to the attention of whoever is responsible for information security at the school. Or the principle. Basically the person whose career is in danger if a breach happens and makes national news.
In the second case, this is SOP, nothing to see, move along.
answered Aug 25 at 9:47
Tom
4,762729
4,762729
3
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
7
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
add a comment |
3
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
7
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
3
3
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
Comments clarify that it is your first case which applies. The delivery method "sent home from children's classrooms" implies that the letter was printed and handled by potentially several staff before being handed to the student to take home. I'd accept "nothing to see" if it'd been an auto-generated email announcement, possibly even "tolerable" if it'd been a snail-mail letter from the main office, but as it seems here, not even that's ok
– Gypsy Spellweaver
Aug 25 at 14:37
7
7
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
I don't reuse passwords, thanks LastPass.
– EralpB
Aug 27 at 13:14
add a comment |
protected by Community♦ Aug 25 at 19:32
Thank you for your interest in this question.
Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
1
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
Aug 26 at 14:22
13
Wow! That's about as good a response as you can hope for! I'm impressed!
– Mike Ounsworth
Aug 28 at 18:50