• casmael@lemm.ee
    link
    fedilink
    arrow-up
    62
    ·
    4 days ago

    ^Password must be 12 characters long and contain lower and upper case letters, a number, a special character, your mum, a solution to the Middle Eastern crisis, the last digit of pie and god’s middle name^

  • KamikazeRusher@lemm.ee
    link
    fedilink
    arrow-up
    30
    ·
    4 days ago

    Error. Password must be 12-31 characters and contain all of the following:

    • A lowercase letter
    • An uppercase letter
    • A numeric digit
    • At least one but no more than two special characters

    It must also not contain any of the following:

    • More than three repeating characters
    • Your first or last name
    • An email address
    • The last four digits of your SSN
    • Your birth year
    • The website name
    • An undiscovered prime
    • More than 80% of your previous password
  • LordKitsuna@lemmy.world
    link
    fedilink
    arrow-up
    16
    ·
    4 days ago

    I like testing websites maximum length. I’ll set bitwarden random generator to like 100 and see if it accepts the password. After that I start testing if it’s actually using the whole password or arbitrarily cutting it off early without telling me

    • deo@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      17
      ·
      4 days ago

      i have totally run into stuff that silently truncates the password i give it. It’s always something like online banking that you would hope has robust enough security standards to hash that shit, too… The one in particular i’m thinking of silently truncated the password in the reset-password form, but not for the log-in form. Took me forever to figure out wtf was going on there.

      • undefined@links.hackliberty.org
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        2 days ago

        Banks are still doing SMS-based 2FA. And after doing some security training at work written by the FBI and seeing it suggest switching letters/numbers around to make a password “more secure” (like th15); I’ve completely lost confidence in banks’ security standards.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        Banks are world class leaders in technical inertia. Almost certainly at some point when they’re designing their system they’ve got a interface from the 1970s or maybe even the 1980s if it’s a new bank, that has to work with everything else which has the limited input fields. And that just propagates to all the other systems in these weird ways

        Oh yeah we’re using a file system that integrates over LDAT but it only looks at the first eight characters cuz the rest are used for the domain etc etc etc

  • PunnyName@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    4 days ago

    Just do the correcthorsebatterystaple method from xkcd.

    giantblueconifercaddy

    Make shit up. Add special characters at the end, and capitalize the first letter, as needed.

    • undefined@links.hackliberty.org
      link
      fedilink
      arrow-up
      2
      ·
      2 days ago

      This isn’t great advice because dictionary attacks exist. Password crackers are smart enough to replace letters/numbers switched around too; at least that was the case back in 2009 when I cracked ~20 passwords in half a second.

    • ssj2marx@lemmy.ml
      link
      fedilink
      arrow-up
      15
      ·
      4 days ago

      I like this in principle, but many people have a lot of passwords to remember, and reusing one complex password on all of your accounts is bad opsec, which is why I recommend a password manager.