• hth@lemmy.world
    link
    fedilink
    English
    arrow-up
    101
    arrow-down
    11
    ·
    edit-2
    2 years ago

    Anytime you see a password length cap you know they are not following current security standards. If they aren’t following them for something so simple and visible, you’d better believe it’s a rat infested pile of hot garbage under the hood, as evidenced here.

    • Primarily0617@kbin.social
      link
      fedilink
      arrow-up
      48
      arrow-down
      1
      ·
      edit-2
      2 years ago

      you have to limit it somewhere or you’re opening yourself up for a DoS attack

      password hashing algorithms are literally designed to be resource intensive

        • Primarily0617@kbin.social
          link
          fedilink
          arrow-up
          9
          ·
          edit-2
          2 years ago

          Incorrect.

          They’re designed to be resource intensive to calculate to make them harder to brute force, and impossible to reverse.

          Some literally have a parameter which acts as a sliding scale for how difficult they are to calculate, so that you can increase security as hardware power advances.

          • confusedbytheBasics@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 years ago

            I was incorrect but I still disagree with you. The hashing function is not designed to be resource intensive but to have a controlled cost. Key stretching by adding rounds repeats the controlled cost to make computing the final hash more expensive but the message length passed to the function isn’t really an issue. After the first round it doesn’t matter if the message length was 10, 128, or 1024 bytes because each round after is only getting exactly the number of bytes the one way hash outputs.

              • confusedbytheBasics@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 years ago

                I’m a bit behind on password specific hashing techniques. Thanks for the education.

                My background more in general purpose one way hashing functions where we want to be able to calculate hashes quickly, without collisions, and using a consistent amount of resources.

                If the goal is to be resource intensive why don’t modern hashing functions designed to use more resources? What’s the technical problem keeping Argon2 from being designed to eat even more cycles?

    • crunchyoutside@kbin.social
      link
      fedilink
      arrow-up
      46
      ·
      2 years ago

      Are you saying that any site which does not allow a 27 yobibyte long password is not following current security standards?
      I think a 128 character cap is a very reasonable compromise between security and sanity.

    • intensely_human@lemm.ee
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      1
      ·
      2 years ago

      At my job they just forced me to use a minimum 15-character password. Apparently my password got compromised, or at least that was someone’s speculation because apparently not everyone is required to have a 15-char password.

      My job is retail, and I type my password about 50 times a day in the open, while customers and coworkers and security cameras are watching me.

      I honestly don’t know how I’m expected to keep my password secure in these circumstances. We should have physical keys or biometrics for this. Passwords are only useful when you enter them in private.

      • captainlezbian@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        2 years ago

        Yeah you should have a key card. Like not even from a security perspective but from an efficiency one. Tap a keycard somewhere that would be easily seen if an unauthorized person were to even touch or even swipe it if need be. I’m sick and tired of passwords at workplaces when they can be helped

        • intensely_human@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 years ago

          It’s an enormous corporation. They’d have to outfit every computer in the building for the yubikey. It’s not going to happen.

    • Saneless@lemmy.world
      link
      fedilink
      English
      arrow-up
      18
      ·
      2 years ago

      At least it’s 128

      I had a phone carrier that changed from a pin to a “password” but it couldn’t be more than 4 characters

    • DreamButt@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      6
      ·
      2 years ago

      In theory yes. But in practice the DB will almost always have some cap on the field length. They could just be exposing that all the way forward. Especially depending on their infastructure it could very well be that whatever modeling system they use is tightly integrated with their form generation too. So the dev (junior or otherwise) thought it would be a good idea to be explicit about the requirement

      That said, you are right that this is still wrong. They should use something with a large enough cap that it doesn’t matter and also remove the copy telling the use what that cap is