3 points

i vs L strikes again

permalink
report
reply
2 points

Iโ€™m glad someone else noticed this right away as well

permalink
report
parent
reply
125 points
*

Anytime you see a password length cap you know they are not following current security standards. If they arenโ€™t following them for something so simple and visible, youโ€™d better believe itโ€™s a rat infested pile of hot garbage under the hood, as evidenced here.

permalink
report
reply
18 points

In theory yes. But in practice the DB will almost always have some cap on the field length. They could just be exposing that all the way forward. Especially depending on their infastructure it could very well be that whatever modeling system they use is tightly integrated with their form generation too. So the dev (junior or otherwise) thought it would be a good idea to be explicit about the requirement

That said, you are right that this is still wrong. They should use something with a large enough cap that it doesnโ€™t matter and also remove the copy telling the use what that cap is

permalink
report
parent
reply
33 points

Hashing will make every password the same length.

permalink
report
parent
reply
11 points

Right but that puts a limit on the hash algorithmโ€™s input length. After a certain length you canโ€™t guarantee a lack of collisions.

Of course the probability stays low, but at a certain point it becomes possible.

permalink
report
parent
reply
8 points

yup yup. Forgot we were talking about a protected field and not just raw data

permalink
report
parent
reply
23 points

You misunderstand the issue. The length of the password should not have any effect on the size of the database field. The fact that it apparently does is a huge red flag. You hash the password and store the hash in the db. For example, a sha256 hash is always 32 bytes long, no matter how much data you feed into it (btw, donโ€™t use sha256 to hash passwords, it was just an example. Itโ€™s not a suitable password hashing algorithm as itโ€™s not slow enough).

permalink
report
parent
reply
5 points

ur absolutely right. Idk why I was thinking about it like a normal text/char field

permalink
report
parent
reply
68 points
*

you have to limit it somewhere or youโ€™re opening yourself up for a DoS attack

password hashing algorithms are literally designed to be resource intensive

permalink
report
parent
reply
5 points
*

Edited to remove untrue information. Thanks for the corrections everyone.

permalink
report
parent
reply
5 points

See โ€œPassword Hashingโ€ here: https://en.m.wikipedia.org/wiki/Key_derivation_function

It is actually important to have a controlled cost to calculate in the forward direction too.

permalink
report
parent
reply
13 points
*

Incorrect.

Theyโ€™re designed to be resource intensive to calculate to make them harder to brute force, and impossible to reverse.

Some literally have a parameter which acts as a sliding scale for how difficult they are to calculate, so that you can increase security as hardware power advances.

permalink
report
parent
reply
3 points

Not true. Password hashing algorithms should be resource intensive enough to prevent brute force calculation from being a viable route. This is why bcrypt stores a salt, a hash, and the current number of rounds. That number of rounds should increase as CPUs get faster to prevent older hashes from existing in the wild which can be more effectively broken by newer CPUs.

permalink
report
parent
reply
7 points

Hashes are one way functions. You canโ€™t get from hash back to input

permalink
report
parent
reply
22 points

At my job they just forced me to use a minimum 15-character password. Apparently my password got compromised, or at least that was someoneโ€™s speculation because apparently not everyone is required to have a 15-char password.

My job is retail, and I type my password about 50 times a day in the open, while customers and coworkers and security cameras are watching me.

I honestly donโ€™t know how Iโ€™m expected to keep my password secure in these circumstances. We should have physical keys or biometrics for this. Passwords are only useful when you enter them in private.

permalink
report
parent
reply
5 points

Ask your boss to get you a yubikey

permalink
report
parent
reply
2 points

Itโ€™s an enormous corporation. Theyโ€™d have to outfit every computer in the building for the yubikey. Itโ€™s not going to happen.

permalink
report
parent
reply
12 points

Yeah you should have a key card. Like not even from a security perspective but from an efficiency one. Tap a keycard somewhere that would be easily seen if an unauthorized person were to even touch or even swipe it if need be. Iโ€™m sick and tired of passwords at workplaces when they can be helped

permalink
report
parent
reply

[This comment has been deleted by an automated system]

permalink
report
parent
reply
1 point

Iโ€™m going to ruin this manโ€™s whole database

permalink
report
parent
reply
3 points

Do you really need more than 128 characters?

permalink
report
parent
reply
52 points

Atleast this is reasonable, I have seen some website donโ€™t allow more than 6 character.

permalink
report
parent
reply
3 points

WTF? Are they trying to get hit with brute force attacks?

permalink
report
parent
reply
26 points

At least itโ€™s 128

I had a phone carrier that changed from a pin to a โ€œpasswordโ€ but it couldnโ€™t be more than 4 characters

permalink
report
parent
reply
3 points

my bankโ€ฆ

permalink
report
parent
reply
7 points

Thatโ€™s too many characters

permalink
report
parent
reply
63 points

Are you saying that any site which does not allow a 27 yobibyte long password is not following current security standards?
I think a 128 character cap is a very reasonable compromise between security and sanity.

permalink
report
parent
reply
12 points

Yikesโ€ฆ This thread is a wasteland of misinformation and mininformers arguing with other mininformers about whoโ€™s misinformation is less ill informed.

This thread is:

  • 50% technology illiteracy
  • 25% Dunning Kruger valley
  • 10% Actual knowledge
  • Everyone else just here for the ride
permalink
report
reply
15 points

This comment could just be copy-pasted to so many threads

permalink
report
parent
reply
2 points

Seems like they donโ€™t consider a period to be a โ€œspecial characterโ€

permalink
report
reply

Yeah I think thatโ€™s the main issue. It wouldnโ€™t take it with spaces so I put the periods instead. Rage face

permalink
report
parent
reply
21 points

Thatโ€™s not the issue here as the special character check passes. Itโ€™s the validation between the two fields thatโ€™s broken.

permalink
report
parent
reply
21 points

Most probably not broken at all.

I.hate.password.
l.hate.password.

The first is a capital i, the second is a lower case L.

permalink
report
parent
reply
13 points

I noticed as well. I tested for it by zooming in and seeing if their tops align with the top of the h. Capital I is shorter than lower case L

permalink
report
parent
reply
12 points

So OP is a big fat phony?

permalink
report
parent
reply

OP here, reading all the comments and theories as to why the I or L or whatever isnโ€™t a match. I copy and pasted it after it didnโ€™t like my typing skills, tried it twice and no goโ€ฆ I believe the periods arenโ€™t an acceptable special character even though they technically are. It also would not accept spaces in-between words, I was first gonna use โ€œI hate passwordโ€ for my password but no go there.

The password it accepted was weak AF, two โ€œstupid-wordsโ€ strung together.

permalink
report
parent
reply
18 points

No, one is an uppercase โ€œIโ€ while the other is a lowercase โ€œL.โ€ lI โ€” you can see the difference when you compare it to the nearby โ€œh.โ€

permalink
report
parent
reply
7 points

Ah, so OP was up to shenanigans??? I should have suspected as much from that mischievous miscreant!!!

permalink
report
parent
reply
53 points

I know this a a joke, but please use a password manager, it is such a game changer.

Bitwarden is free and E2E encrypted and if you want additonal feature, they only cost 10 bucks pre year. You can even use it with anonaddy to hide your email, which is also totally free and open source.

permalink
report
reply
7 points

Iโ€™m already using Bitwarden but I hadnโ€™t heard about anonaddy, thanks for the tip!

permalink
report
parent
reply
6 points
*

They work like a miracle together https://bitwarden.com/blog/add-privacy-and-security-using-email-aliases-with-bitwarden/

What is even more surprising is that even the free tier is perfectly usable, but consider paying if you have the money to support them.

permalink
report
parent
reply
11 points

What are those premium features? I never felt like I was missing something from the free bitwarden

permalink
report
parent
reply
6 points

yubikey/fido2 support is what Iโ€™d probably consider premium for

permalink
report
parent
reply
1 point

One of them is password sharing if I remember well.

permalink
report
parent
reply
1 point

You can have an org with free and share passwords that way.

permalink
report
parent
reply
8 points

You can have it generate 2FA TOTP.

permalink
report
parent
reply
7 points

2FA one time code was the reason I got premium (and obviously support FOSS project). It is a slight security downgrade, but a whole lot of QOL upgrade.

I also imagine hardware key support like yubikey would be very appealing for many.

permalink
report
parent
reply

Mildly Infuriating

!mildlyinfuriating@lemmy.world

Create post

Home to all things โ€œMildly Infuriatingโ€ Not infuriating, not enraging. Mildly Infuriating. All posts should reflect that.

I want my day mildly ruined, not completely ruined. Please remember to refrain from reposting old content. If you post a post from reddit it is good practice to include a link and credit the OP. Iโ€™m not about stealing content!

Itโ€™s just good to get something in this website for casual viewing whilst refreshing original content is added overtime.


Rules:

1. Be Respectful

Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

โ€ฆ


2. No Illegal Content

Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means: -No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

โ€ฆ


3. No Spam

Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

โ€ฆ


4. No Porn/Explicit

Content


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

โ€ฆ


5. No Enciting Harassment,

Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

โ€ฆ


6. NSFW should be behind NSFW tags.

-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

โ€ฆ


7. Content should match the theme of this community.

-Content should be Mildly infuriating.

-At this time we permit content that is infuriating until an infuriating community is made available.

โ€ฆ


8. Reposting of Reddit content is permitted, try to credit the OC.

-Please consider crediting the OC when reposting content. A name of the user or a link to the original post is sufficient.

โ€ฆ

โ€ฆ


Also check out:

Partnered Communities:

1.Lemmy Review

2.Lemmy Be Wholesome

3.Lemmy Shitpost

4.No Stupid Questions

5.You Should Know

6.Credible Defense


Reach out to LillianVS for inclusion on the sidebar.

All communities included on the sidebar are to be made in compliance with the instance rules.

Community stats

  • 6K

    Monthly active users

  • 962

    Posts

  • 57K

    Comments