• rog@lemmy.one
    link
    fedilink
    arrow-up
    22
    arrow-down
    2
    ·
    edit-2
    2 years ago

    Best practice in 2023 is a simple, sufficiently long but memorable passphrase. Excessive requirements mean users just create weak passwords with patterns.
    [Capital letter]basic word(number){special character}

    Enforcing password changes doesnt help either. It just creates further patterns. The vast majority of compromised credentials are used immediately or within a short time frame anyway. Changing the password 2 months later isnt going to help and passwords like July2023!, which are common, are weak to begin with.

    A non expiring, long, easily remembered passphase like
    forgetting-spaghetti-toad-box
    Is much more secure than a short password with enforced complexity requirements.

    • kevincox@lemmy.ml
      link
      fedilink
      arrow-up
      22
      arrow-down
      1
      ·
      2 years ago

      Drop “memorable”. 99.9% of your passwords should be managed by your password manager and don’t need to be memorized. On one or two passwords that you actually need to type (like your computer login) need to be memorable.

      • demonsword@lemmy.world
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        2 years ago

        99.9% of your passwords should be managed by your password manager

        this looks like a sensible approach until you remember password managers can be cracked, too. I’m with GP on this, a passphrase is easier to remember and is good enough for most use cases, if you need more security you should be using some form or another of 2FA anyway

  • Sonotsugipaa@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    19
    arrow-down
    3
    ·
    2 years ago

    Infuriating fact: if a service has maximum password length limits (lower than 1000 characters), they’re reversibly storing your password and if they’re that lazy it’s probably plain text

    • newsonic@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      2
      ·
      2 years ago

      Nope. No point in storing > 256 or even 128 chars for a password anyway. Useless storage wasted. Also it doesn’t really mean they store the password badly in the server.

    • Anemia@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      Couldn’t it just be that they’re using something like bcrypt which won’t take any chars above its limit into account (knowing that there’s a limit will pretty much never matter to a user but why obscure the fact)? What does it even mean to store it reversibly, just because they have a char limit doesn’t mean they are encrypting the password, could just be some frontend shenannigans as well.

    • Sibbo@sopuli.xyz
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      They may just base their limit on one or a few block sizes of the hash function.

      • kevincox@lemmy.ml
        link
        fedilink
        arrow-up
        6
        ·
        2 years ago

        That sounds incredibly unlikely. I would be good money that 99% of password length limits are not based on concrete limits. Things like “100 should be enough 🤷” must be way more common.

        I doubt 1% of programmers are away of their hashes block size. It is also probably irrelevant since after the first round everything is fixed size anyways.

    • rubythulhu@beehaw.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 years ago

      Fun fact: Lemmy instances cap at 60. they’re not storing reversibly, they’re just using bcrypt and rather than pre-hashing the pw before bcrypt like most bcrypt users do, they just truncate to 60.

  • Bappity@lemmy.world
    link
    fedilink
    arrow-up
    14
    ·
    2 years ago

    I don’t get why some sites limit your usage of special characters and have miniscule max lengths?? looking at you PayPal you piece of shit

  • csm10495@sh.itjust.works
    link
    fedilink
    arrow-up
    13
    ·
    2 years ago

    There was a website where I was making an account and it was like: no semicolons.

    To this day I wonder if that was how they blocked sql injection.

    • pazukaza@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      2 years ago

      The only security threat would be the site itself. How do they know other users have the same password?

      Options:

      • They have your password in plain text in their DB. CHEFF KISS

      • They aren’t using salts.

      • They are using the same salt for everyone.

      All of them concerning.

  • jg1i@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    2 years ago

    The right answer is use a password manager to generate and store a long password. Then it doesn’t matter.

  • Crazyslinkz@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    2 years ago

    Does anyone use the generator from chrome anymore? Like a 2023 password for me is “suggest strong password”…