In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)

Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.

  • mcat@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 months ago

    My worst experience so far was a webpage that trimmed passwords to 20 characters in length without telling you. Good luck logging in afterwards…

    • drewcarreyfan@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      One of my favorite memories of how much Something Awful’s sysadmins were absolutely amateur hour back in the early 2000s was the “lappy” to “laptop” debacle. Apparently Lowtax found the term “lappy” so annoying that he ordered his system administrator to do a find/replace for every instance of “lappy,” replacing them with “laptop.”

      Unfortunately this included usernames and passwords, as well as anything that just managed to have the letters “lappy” in that order anywhere in the word. So, there was one user named ‘Clappy’ who woke up one day to find his name changed to ‘Claptop.’ Apparently this is also how people discovered that they were storing password unsalted in plain text in a fucking MySQL database, which if you’re old enough, you probably already remember that the combination of MySQL and PHPmyAdmin were like Swiss cheese when it comes to site defense. :p

  • absGeekNZ@lemmy.nz
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I like it that the site says the max length…this is not common. I wish it was.

    • pleasejustdie@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 months ago

      The problem is a password hash is a fixed length regardless of the password, so if this is implemented correctly there is no need for a maximum password length. These things raise my security flag because it makes me think they are storing the password in plain text instead of doing proper practice and storing the hash only.

  • oo1@lemmings.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    You’ve got to stop all those who put: abcdefghijklmnopqrstuvwxyz

    That’s my password for most things, any hackers die of RSI before they get in.

    • pleasejustdie@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 months ago

      It’ll be caught by a dictionary attack. at least do something to break up their sequential order.

  • foggy@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Okay so I agree with you that a longer password is better but this in no way indicates clear text password storage.

    • troed@fedia.io
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      It does. If you hash the user passwords, which you should, the hash is always the same length and it’s thus irrelevant how many characters the user’s password consists of.

      Now, it’s not certain though, which wasn’t claimed either, because the front end developer might have other reasons for setting limits. The backend shouldn’t care though.

      • x00z@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        The backend should care though. Even if strings can have an unlimited amount of characters, you don’t want to go and hash a gigabyte of data. In lower level languages you don’t have magic strings either so you might do something like char password[64].

        There’s many reasons to limit raw password length. Not many good ones to have it as small as 24 (or even 64) though.

        • hummingbird@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          There is no good reason so send the passwors itself to the server. Send the hash and you will have a fixes length of data to send anyway.

          And even if insist in sending the password over the wire, there is no problem on the backend to handle longer passwords than that, so that no one will run into a limit in practice. We’re talking about bytes here, not even a kb.

          • IphtashuFitz@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            Proper hashing of a password includes a salt that should be kept private. This means the password should definitely be passed to the server in plaintext. The server adds the salt to the password, then hashes it.

            This adds more protection should an attacker somehow manage to get access to your hashed passwords. Even if they identify the type of hashing mechanism used it will prevent the use of rainbow tables, dictionary attacks, etc. against the hashes.

            • troed@fedia.io
              link
              fedilink
              arrow-up
              0
              ·
              2 months ago

              While I’m not arguing for doing the crypto client side, the salt isn’t needed to be private - only unique.

              • IphtashuFitz@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 months ago

                It definitely needs to be private. If an attacker can obtain both the password hashes and the salt(s) (via the same database vulnerability for example) then they have everything they need to run offline attacks against the passwords.

                • troed@fedia.io
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  2 months ago

                  No, it most definitely does not need to be private. The idea with salt is to invalidate rainbow tables. If you’re “keeping it private” it’s just another password.

                  The salt and the password (or its version after key stretching) are concatenated and fed to a cryptographic hash function, and the output hash value is then stored with the salt in a database. The salt does not need to be encrypted, because knowing the salt would not help the attacker.

                  https://en.wikipedia.org/wiki/Salt_(cryptography)

  • tarsisurdi@lemmy.eco.br
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 months ago

    I once registered an account with a random ~25 characters long password (Keepass PM) for buying tickets on https://uhuu.com.br/

    The website allowed me to create the account just fine, but once I verified my e-mail, I couldn’t log into it due to there being a character limit ONLY IN THE LOGIN PASSWORD FIELD. Atrocious.

    EDIT: btw, the character limit was 12

  • 4am@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    edit-2
    2 months ago

    Don’t worry, pretty soon they will just block password managers from autofilling fields on their login page so that you HAVE to remember your password! Then you’ll be happy it can’t be that long, you can only fit so much on a post-it note on the side of your monitor

    /s

    EDIT: I think there should be a law against blocking password managers for filling in fields. Any brute force bots are going to submit HTTP requests directly anyway; no one is hitting the DOM to do that

  • lennee@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    edit-2
    2 months ago

    funniest experience that ive had is that i made a psn (playstation network) account with a 64 (iirc, might have been 32, dont remember) character password. That worked making the account on my PC on their website. Never was able to log into that account on my playstation tho and the error message was just some generic error. Support didnt know what was going on and i didnt either until it dawned on me. The password was too long for the console. Changed the whole thing to a shorter one and now it works everywhere. Used to work on their website, not in the app, not on console. Fun.