How strong should your Master Password be? For World Password Day we’d like to know
Just how strong should a 1Password Master Password be? We recommend that Master Passwords be generated using our wordlist generator using passwords that are four words long. This gets you something like “napery turnip speed adept”.
Among other things, this gives you the chance to learn new words. My dictionary has now informed me that “napery” means household linens such as table cloths and napkins. But let me move on from obscure vocabulary to asking about Master Password strength: What we know about Master Password strength, what we would like to know about it, and how can we get expert password crackers to help us learn?
That’s why we are announcing a password cracking challenge to be managed by Bugcrowd with cash money rewards. First prize earns $8192, second prize is half of that, and third prize is half again. The race will beginhas begun at noon Eastern Time on World Password Day, May 3, 2018. For those who want to jump right to the contest details, without reading the rest of this, you can head right over to our Bugcrowd brief or to our description. The challenge hashes/keys are now available.

What is your Master Password for?
Your Master Password is your defense against someone who manages to steal your encrypted 1Password data from your own machines. Your data on our machines is also protected by your Secret Key, making Master Password guessing futile. Unlike a human usable password, your Secret Key is completely unguessable, and that is what makes what is stored on 1Password.com uncrackable.

But your Secret Key does not protect you if data is stolen from your own devices because your Secret Key is stored on your own devices. Likewise, our Multi-Factor Authentication only defends against attempts to connect to our systems. MFA doesn’t protect you from data acquired from your own machines. So when it comes to keeping 1Password data stored on your own machine from prying eyes, your Master Password is your defense. It needs to be as strong as you can reasonably use and it must be unique.
Consider Molly (a not all that bright dog), who has a Master Password of “RabbitHunter#1”. She also has some very important Login items, such as her PawPal account within 1Password. Now suppose that Mr Talk (the neighbor’s cat) has contrived to steal data off of Molly’s laptop, including her encrypted 1Password data.
Mr Talk will set up automated password guessing software to make many thousands of guesses per second. We can slow that down with PBKDF2, but Mr Talk is doing everything on his own machines and is not connecting to any of our systems. That is why MFA doesn’t do Molly any good in these circumstances. Now if Mr Talk has some expertise in password cracking and is willing to dedicate some computer power to this, he might be able to crack that Master Password within a few hours or maybe it would take a week. However long that is is how much time Molly has to change her PawPal password and other passwords that she keeps in 1Password.
Let’s suppose that Mr Talk got Patty’s data as well. But Patty (a clever dog) used our Strong Password Generator and ended up with a Master Password of “saddle harass mod gunk”. Even if Mr Talk dedicated enormous amounts of computer resources to this, it would take decades or centuries to crack that. So Patty remains safe because she used a strong, randomly generated Master Password.
Again, for Mr Talk to have a whisker of a chance of cracking any of these passwords, he’d need to get data directly from Patty and Molly’s system, which will also provide Mr Talk with their Secret Keys. Mr Talk would not be able to launch such an attack from data acquired from our systems.
Reducing the guesswork by measuring the guessing work
How did I come up with saying “hours to a week” for Molly’s and “decades to centuries” for Patty’s? I did so with a lot of guesswork. But we’d like to improve on that guess work, and the way to do that is to invite (incentivize) expert crackers to try to crack passwords and find out just how much work they have to put into it.
Now if my guess about decades is anywhere on target for the four word password, that is simply too large of a challenge. So we are presenting a number of keys derived from three word passwords from our password generator. We are also posting all the details about how they were generated and the wordlist used.)
We are also simplifying some of the odd details of our key derivation function to focus solely on the 100,000 rounds of PBKDF2-HMAC-SHA256. This will make it easier for participants to get set up without really affecting the result of what we are trying to measure with this exercise.
We want winners
We want people to win the prizes, and we want people going into this to know that we want people to win. Otherwise we wouldn’t get participants to put in the effort that we are trying to measure.
So let me remind everyone again, the challenges that we have created here do not have the protection of the Secret Key and they are using Master Passwords that are at the weaker end of what we recommend. This contest simulates attacking only one single component of 1Password security.
Knowing your system is a good thing
It’s been nearly seven years since we helped revive the notion of wordlist-based passwords with our article Toward Better Master Passwords. And one of the many virtues of generated passwords is that they remain strong even if the attacker knows how they were generated. So with that in mind, we are also publishing the source used to generate the challenges.
How long until we have answers?
If we knew how much effort it takes to crack a three word password, we wouldn’t be giving away money to find out, would we? We also don’t know what kinds of resources people will throw at the problem. If people or teams dedicate fleets of hashing rigs at the problem they will find things more quickly than someone who just uses a couple of more ordinary computers.

Money is time
It may be more useful to ask about the cost of cracking a password versus how much time it takes. In any particular cracking attempt there will be some combination of fixed costs and variable costs ranging from developing the expertise and equipment depreciation to the cost of the electricity used to run and cool the machines. We want to develop an estimate that considers the total cost. So we hope that the challenge takes long enough that the results will show a useful mixture of fixed and variable costs.
We’ve also structured the contest as a race. The first to find a password will earn $8192, while the second place prize is $2048 and the the third place prize is $1024.
My own wild guess is that it could take anywhere between $250 and $2000 worth of effort to crack one of these three word passwords from our list, and so we’re offering a first prize that is double the higher end guess. This way it should be worth their time to switch some of their coin mining rigs over to password cracking.
What now?
If you would like to participate, head over to Bugcrowd for the official rules and to get set up with them if you are not already a Bugcrowd researcher, as all submissions will go through them. Details can also be found in our crackme challenge Github repository.
If you’d like to just follow along at home before and after the starting gun on World Password Day, keep following us on Twitter, Facebook, or your favorite place to do such things. And if you would like to discuss things further, just join us in our discussion forums. We’ve set up a specific discussion in our Lounge for this discussion.





I’m getting a 404 error on the page you linked above https://bugcrowd.com/onepasswordgame Can you please fix that, Jeffrey?
Hey, Yalu! I hope you don’t mind my popping in here for Jeffrey. He’s doing a lot of coordinating for this, so we’re all trying to help him out where we can. We’re waiting on BugCrowd to make that page public still, which is why we included a (perhaps too easy to miss) parenthetical for now that it’s not yet live. Of course, I can totally understand being super excited and clicking anyway. I’d probably have done the same. 😉 Hang tight and we’ll update the link text as soon as the page is active and available to everyone. 🙂
Thanks Yalu. And thanks Kate for filling in for me while I was on the phone.
It’s always hard to coordinate release of posts, and so we ended up a bit ahead of bugcrowd. If there is further holdup, I’ll edit our post to remove those links until there is something to link to.
The bugcrowd link to the official rules are now live. https://bugcrowd.com/onepasswordgame
Hah! Love your creative blog posts, probably the most engaging security blog I’ve read. I do however object to the typecasting of cats. 😿
You’re not wrong, but we will continue the tradition none the less.
And the race has begun! Again, for discussion let’s use this discussion in our forums: https://discussions.agilebits.com/discussion/89318/world-password-day-cracking-challenge/
There are 6,157,668,625,289 possible passwords if they come from that AgileBits file. With 100,000 iterations I’ve calculated it would take over 40 years to iterate the entire list on my hardware. Not sure how anyone is going to get this without getting insanely lucky or spending thousands of dollars on hardware.
You and me both, Sam. It would certainly be ridiculous to try to crack these on the hardware that I have at my finger tips.
But some people have highly specialized hardware and software for going at these things.
Indeed, as I just posted in our forums, there’s at least one contestant who looks like they should hit a result after a matter of weeks. There may also be teams of such people working on it, who distribute the work.
We are interested in knowing how hard/expensive this is for people who have expertise and specialized resources. So while that might exclude a lot of people from meaningfully participating, it will help us get the data that we need.
Cheers, -j
On June 11 we doubled the prizes for this cracking competition.
Why are we doubling the prizes?
Well it looks like my initial guess about how hard it is to crack these was too pessimistic (from the defender’s point of view). It’s been more than a month since launch, and we still don’t have any submissions.
But we want this to be a winnable challenge, so we need to make sure that the incentives work for participants. We also want it to be worth the resources that people have dedicated to cracking. If it turns out that someone spends a few thousand dollars in electricity to crack these, we want to reward them fairly.
It’s not surprising that my initial guess was off in one direction or the other. We are running this challenge exactly so that we can improve our estimates. And we did prepare for this situation. In our original announcement we said
As always, details and update will be posted in our discussion forums: We have a specific topic set up for this. https://discussions.agilebits.com/discussion/89318/world-password-day-cracking-challenge