• squid_slime@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 hour ago

    I hate these arbitrary limitations of 16 characters, 25 is unbreakable and some sites won’t slow it.

  • cley_faye@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    22 hours ago

    64 characters picked at random in [a-zA-Z0-9_] is perfectly fine if password is your only option. Special character do not increase significantly the difficulty of bruteforcing it, but introduce the risk of having to manually type "}à.å÷Â!!ç-×ô@¸Á¢±ãÕß>>úÓ}¼º¤«<_`àÅû§Æ]*ÂñçÌÿ§à®&ܱ=Ú-´ð¹é$.>=;Ö if something goes catastrophically wrong.

    • 🦄🦄🦄@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      19 hours ago

      Not being allowed to use special characters can be a sign of the website saving your password in plain text.

  • Buffalox@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    Yes because if you choose 8 characters at random, with 25 small + 25 big letters and 10 numeric, it* only 60^8 = 167,961,600,000,000 combinations.
    I think the problem is more if the system allow brute force with thousands of erroneous attempts.
    I never got the frantic entropy mindset, when the problem is much simpler to not allow endless attempts. You can allow 50 attempts, and chances would be very slim to guess even pretty moronic passwords.

    • stevedice@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 days ago

      Most websites don’t allow multiple failed logins and, even if they did, the network latency alone would make brute force attacks useless. The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes. Having different passwords for every website also protects against this so, as usual, the answer is “just use a password manager”.

      • purplemonkeymad@programming.dev
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 day ago

        The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes.

        I don’t think you need to worry about that in this case, the special character restriction suggests to me that they don’t hash it.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 days ago

        The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes.

        Seems a bit stupid if a database of passwords or other sensitive information can be brute forced.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 days ago

        just use a password manager

        I will never do that, I have a system instead. I never understood why people would want to use a password manager. To me it seems it ads an attack vector, where you could lose EVERYTHING!

        • frezik@midwest.social
          link
          fedilink
          English
          arrow-up
          0
          ·
          22 hours ago

          Passwords suck as an authentication system in general. Your own system is probably worse than what password managers do. Yes, there are problems, but so does every other solution to this, and password managers win out in the comparison.

          • Buffalox@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            21 hours ago

            Your own system is probably worse than what password managers do.

            How so? If you use a password manager across 3 platforms, that makes for 3 attack vectors.
            My personal system has guaranteed no vulnerabilities. So how do you conclude my system is worse?

            • frezik@midwest.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              21 hours ago

              My personal system has guaranteed no vulnerabilities

              If you think that’s true, then you don’t have the experience to make a secure system.

              • Buffalox@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                19 hours ago

                What? What kind of system do you think I have? The only vulnerability is if they can hack my brain.

                • frezik@midwest.social
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  15 hours ago

                  Yeah, that’s going to be a terrible system. The human brain isn’t capable of keeping track of enough entropy to create a secure password system.

                  More generally, it’s a big red flag when anybody thinks they can make a better system than publicly available and verified systems. You’re not capable of that, I’m not capable of that, Bruce Schneier is not capable of that. No matter how smart you are, you missed something. That’s why I didn’t need to know a single detail.

        • stevedice@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 days ago

          I guarantee your system is less secure than the worst password manager. Humans are inherently bad at choosing passwords, or anything to do with randomness really.

  • chuckleslord@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    I mean, 63^6 is a lot of possibilities, but just make the password longer to increase its security.

    Blocking out special characters is dumb, but as others have pointed out, they’re probably not sanitizing inputs.

    • groet@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 days ago

      Might be a minimum of 16 chars. Or the parsing is broken and treats the ’ as the end of the password

      • teletext@reddthat.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 days ago

        Yeah, I’d consider anything less than 20 characters broken. Much too likely that it’s contained in a rainbow table, regardless how many special characters you use. Can I remember many 20 character passwords? No, but my password manager can.

        • CanadaPlus@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          23 hours ago

          That’s a big rainbow table. Like, with just precomputed values and random ascii character passwords it’s on the order of 1042 entries. You can shave that down a bit probably with all the tricks rainbow tables use, but I think you’re safe.

          • teletext@reddthat.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            23 hours ago

            Base85 contains just about every printable ASCII character, so I’ll use that as a base. 8516 ~= 1031 -> extremely huge, but still feasible at least for state actors. 8520 ~= 1039 -> if I read Wolfram Alpha’s comparison correctly, that is more information than is believed to be contained in the DNA of all living creatures combined. That’s why I’d recommend >= 20 characters.

            • frezik@midwest.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              22 hours ago

              State actors don’t generally need to break passwords. They ask the company “nicely” and they get what they want. The exception would be if that password is being used to encrypt data.

        • Aganim@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          1 day ago

          I let my password manager create 32 char passwords, that should be enough for a while. But of course then you have websites that throw you a ‘your password is too long’ message and have you find out by trial and error that they only accept 12 characters.

          Or the off-by-one errors where they insist that 24 chars are the max, but in reality they accept 23. Probably never tested the limit.

          Or websites that truncate your password after X characters when registering, but not when logging in, so you end up with an incorrect password and good luck finding out which limit the registration page actually uses.

  • expatriado@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    recently did one that only cared about being very long, so i typed thispasswordisfuckinglong and it took it

    • Whats_your_reasoning@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      22 hours ago

      Some months back, there was a thread here on Lemmy where people were discussing western names written using Chinese characters. Phonetically, the names will sound alike. But meaning-wise, the characters will result in a Correct Horse Battery Staple-esque string of words.

      Which is why I have since decided to make passwords by typing random names into a Chinese name generator and using the English translated result.

      Sounds like a lot of work, but the way I see it, trying to think of new passwords is always work so I might as well have fun with it.

  • Rhynoplaz@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    “Your selected password is already being used by SwiftyFan05. Please choose another password.”