Email-based Password Recovery - Risking or Rescuing Users?
Date: October 22 2018
Publication: 2018 International Carnahan Conference on Security Technology (ICCST)
Source 1: https://pure.royalholloway.ac.uk/portal/files/30955357/ebprro.pdf
Source 2: https://doi.org/10.1109/CCST.2018.8585576 - Subscription or payment required
Abstract or Summary:
Secret passwords are very widely used for user authentication to websites, despite their known shortcomings. Most websites using passwords also implement password recovery to allow users to re-establish a shared secret if the existing value is forgotten; many such systems involve sending a password recovery email to the user, e.g. containing a secret link. The security of password recovery, and hence the entire user-website relationship, depends on the email being acted upon correctly; unfortunately, as we show, such emails are not always designed to maximise security and can introduce vulnerabilities into recovery. To understand better this serious practical security problem, we surveyed password recovery emails for 50 of the top English language websites. We investigated a range of security and usability issues for such emails, covering their design, structure and content (including the nature of the user instructions), the techniques used to recover the password, and variations in email content from one web service to another. Many well-known web services, including Facebook, Dropbox, and Microsoft, suffer from recovery email design, structure and content issues. This is, to our knowledge, the first study of its type reported in the literature. This study has enabled us to formulate a set of recommendations for the design of such emails.
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.