In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)

Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.

  • mcat@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 hour ago

    My worst experience so far was a webpage that trimmed passwords to 20 characters in length without telling you. Good luck logging in afterwards…

    • drewcarreyfan@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      44 minutes ago

      One of my favorite memories of how much Something Awful’s sysadmins were absolutely amateur hour back in the early 2000s was the “lappy” to “laptop” debacle. Apparently Lowtax found the term “lappy” so annoying that he ordered his system administrator to do a find/replace for every instance of “lappy,” replacing them with “laptop.”

      Unfortunately this included usernames and passwords, as well as anything that just managed to have the letters “lappy” in that order anywhere in the word. So, there was one user named ‘Clappy’ who woke up one day to find his name changed to ‘Claptop.’ Apparently this is also how people discovered that they were storing password unsalted in plain text in a fucking MySQL database, which if you’re old enough, you probably already remember that the combination of MySQL and PHPmyAdmin were like Swiss cheese when it comes to site defense. :p

  • dQw4w9WgXcQ@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 hour ago

    For a system I worked on a few years ago I got the password requirement:

    • Only upper case letters A-Z, no letter or symbols.

    • Exactly 7 characters.

    I was also recommended to make it a single word to make it memorable.

  • UpperBroccoli@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    25
    ·
    3 hours ago

    We have a customer, a big international corporation, that has very specific rules for their intranet passwords:

    • Must contain letters
    • Must contain numbers
    • Must contain special characters
    • No repeats
    • Passwords must be changed every two months
    • Not the same password as any of the last seven
    • PASSWORDS MUST BE EXACTLY EIGHT CHARACTERS LONG

    I can only assume that whoever came up with these rules is either an especially demented BofH, or they have some really really weird legacy infrastructure to deal with.

    • drewcarreyfan@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      41 minutes ago

      I am a designer, but I once did a project with a very very major and recognizable tech corporation that, no joke, implemented an 8 character limit on passwords for storage reasons.

      This company made in the tune of tens of billions of dollars per year, and they were penny-pinching on literal bytes of data.

      I can’t say who it is, but their name begins with ‘M’ and ends in ‘cAfee.’

    • Omega@discuss.online
      link
      fedilink
      English
      arrow-up
      9
      ·
      2 hours ago

      No repeats??? Like, you cant have ‘aaaa123@’ as a password?

      You’re just making it easier to brute force…

  • tauren@lemm.ee
    link
    fedilink
    English
    arrow-up
    17
    ·
    3 hours ago

    My favorite is when they don’t have this check, but silently slice the string to meet the requirement, so that you can’t login with the original password the next time.

  • 4grams@awful.systems
    link
    fedilink
    English
    arrow-up
    44
    ·
    7 hours ago

    This shit pisses me off so bad. I had an identity theft a few years back, took ages to undo, and my credit score is still impacted by it. At the time I moved to a password manager and all my passwords are 31 characters of garbage. I’ve got several, highly sensitive accounts that my passwords don’t work for, in fact one a bank, until fairly recently, had repurposed a phone number field in the DB so passwords were limited to 10 characters numeric only (I managed to get one of their IT folks on the horn to explain why the password was so awful).

    I cannot believe we live in 2025 and we still haven’t figured out passwords.

    • DarkSirrush@lemmy.ca
      link
      fedilink
      English
      arrow-up
      19
      ·
      7 hours ago

      My bank forces a 6 digit PIN as a password.

      Their 2fa is also email or text only.

      At least we can set a unique username?

      • throwawayacc0430@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        Meh, if they lock you out after X attempts, then 6 digits is fine. Hell, even 4 digits is fine if they have a lockout-policy.

        Do they have a limit on attempts?

      • 4grams@awful.systems
        link
        fedilink
        English
        arrow-up
        3
        ·
        6 hours ago

        Yeah, I’m up to 40 hide my addresses for that same reason. Figure if the password sucks, at least the email can be unique and obscure.

        • AA5B@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          2 hours ago

          168! Don’t hold back - everything gets a unique email address, a generated password, unique username and profile info.

          It’s only the damn phone number that can be used to connect my data. Can’t do anything about that.

    • bleistift2@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      6
      ·
      6 hours ago

      We have figured out passwords. Management hasn’t figured out allocating resources to security, and governments haven’t figured out fining the crap out of such companies.

    • Oniononon@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 hours ago

      all our banks and government systems and may online services work on a governments own 2fa, and there are several variants. They are linked to phone and require inputting Pins. Very comfortable, very secure and very convenient. Also very fast.

      • 4grams@awful.systems
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 hours ago

        Don’t get me wrong, there are systems that work. I built up a very successful smart card based system many years ago after a failed audit. I initially hated the idea but in the end we built a crazy secure environment that was very easy to use and maintain. That project is long since obsolete but after doing that one, over a decade ago, I figured things were headed in the right direction.

        I think I’m extra sensitive right now because my aging mom has made the issue acute. She’s not the same as she was a few years ago and helping her with all her online accounts has become a nightmare. It’s just too complicated for many folks.

  • SCmSTR@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    10
    ·
    6 hours ago

    One time I worked a job where you had to make EXACTLY a 12 character password using only ten letters and two numbers.

  • Mark@lemmy.world
    link
    fedilink
    English
    arrow-up
    24
    ·
    7 hours ago

    How about creating a new account, letting bitwarden create a password, only for them to send me a clear text copy of that passwod in their confirmation email…

    • RaccoonBall@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 hours ago

      I spent way too much time on this the first time I came across it

      Joyously frustrating game

  • 4am@lemm.ee
    link
    fedilink
    English
    arrow-up
    18
    ·
    edit-2
    8 hours ago

    Don’t worry, pretty soon they will just block password managers from autofilling fields on their login page so that you HAVE to remember your password! Then you’ll be happy it can’t be that long, you can only fit so much on a post-it note on the side of your monitor

    /s

    EDIT: I think there should be a law against blocking password managers for filling in fields. Any brute force bots are going to submit HTTP requests directly anyway; no one is hitting the DOM to do that

    • bleistift2@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      4
      ·
      6 hours ago

      think there should be a law against blocking password managers for filling in fields.

      I’ve never heard of anyone trying to do that. I couldn’t even imagine how a website could detect a password manager.

      • BradleyUffner@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        2 hours ago

        I’ve had banks do it in the past. It’s not that they can “detect” the password manager, they just use a method that’s incompatible with them.

        They have a fake input field and capture keypress events via JavaScript directly from the dom, then just make it look like you typed in to the input field. They don’t read the password from the input field, they build it up in memory from those key press events.

        It also completely breaks accessibility software, which is the main reason I think the industry moved away from doing it for the most part.

      • PracticalParrot@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 hours ago

        I’ve seen a couple of times. It’s the same ones that block copy/paste on password fields. The workaround is to write a short python script using pyautogui or similar to “type” out the clipboard content.

  • The Infinite Nematode@feddit.uk
    link
    fedilink
    English
    arrow-up
    34
    ·
    9 hours ago

    My mum told be the other day she logged onto a new bank, gave it a 12 character password then couldn’t get back in after. When she got through to their customer services they said that it was an 8 character password limit (!), but it just never said on the register screen.

  • tarsisurdi@lemmy.eco.br
    link
    fedilink
    English
    arrow-up
    107
    ·
    edit-2
    12 hours ago

    I once registered an account with a random ~25 characters long password (Keepass PM) for buying tickets on https://uhuu.com.br/

    The website allowed me to create the account just fine, but once I verified my e-mail, I couldn’t log into it due to there being a character limit ONLY IN THE LOGIN PASSWORD FIELD. Atrocious.

    EDIT: btw, the character limit was 12

    • FiniteLooper@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      I’ve had this exact same thing happen.

      I’ve also had it happen where you have the two fields to verify the password is the same. One had a maxlength set in it, and the other didn’t. I was for sure entering the same password and I was so confused until I opened up the dev tools and inspected the inputs.

      • AA5B@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        I’ve seen this behavior too, I forget where. For me it was a bit easier since the fields displayed a different number of stars. I did spend too long trying to figure out how my password manager could be failing that way

      • scintilla@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        3
        ·
        4 hours ago

        I understand a cap of like 64 characters or something to keep storage space down for a company with millions of users. other than that it doesn’t make a ton of sense.

  • brax@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    5
    ·
    6 hours ago

    Banks are the fucking worst for this. I assume it’s because they’re built on some 500 year old CICS mainframe.

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    14
    ·
    3 hours ago

    There is little point of having a long password. Online accounts don’t have the same issues as encryption

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        13 minutes ago

        You haven’t provided any evidence to support your claim. Online accounts can’t easily be brute forced.

        If a hash is leaked you just change the password. As long as you aren’t reusing the same password everywhere you are fine.

    • expr@programming.dev
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 hours ago

      That’s simply false. Increased length increases the entropy of a password, making it harder to brute force to gain access.

      You have to go out of your way to restrict the length of passwords. There’s absolutely no reason to do it, and it is contrary to all good security practices.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 minutes ago

        I’m not sure how you expect someone to brute force a web service. It is possible but it would be equivalent to a denial of service. Having long passwords for a online login makes no sense. A randomly generated 12 character password isn’t any more or less secure than a 40 character password since they both take a unrealistic amount of time to brute force.

        A 12 character password made up of standard characters would take 475,920,314,814,253,376,475,136 tries assuming you know the length. I don’t see how someone could brute force a web service.

        I will say I get annoyed at web services that require special characters since I like to use 3 words from the EFF extended word list.

    • CaptainBasculin@lemmy.bascul.in
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      2 hours ago

      Think of it from a random guess perspective. Guessing a number randomly generated between 0-16 is easier than guessing one between 0-8.

      Now think that all passwords are stored in certain amount of bits, so let’s compare 4 and 8 bits.

      Each bit has a chance to be either 0 or 1, so guessing a single bit’s possibility is 1/2.

      Guessing the correct orientation of 4 different bits takes 1/24 = 1/16

      Guessing the correct orientation of 8 different bits takes 1/28 = 1/256

      Now think passwords being stored in more bits(=longer password)

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        1 hour ago

        At a certain point it doesn’t matter as the password is effectively unguessable.

        One weakness with longer passwords is that if they are created by humans chances are it will be easier to guess the pattern. This is true for all human created passwords but I think the longer ones are worse since there is more space to create a easily guessable pattern.

    • irelephant [he/him]🍭@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      Assuming a breach, and hashes are released, its significantly harder to bruteforce a long password.

      Some (a lot) poorly set up websites may not even have a limit on password attempts, or cooldowns.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        1 hour ago

        It won’t matter if you use a password manager. You shouldn’t rely on the website to keep your password safe. They could be storing it in plain text for all you know. (It has happened before)

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        42 seconds ago

        As long as the adversary doesn’t have the ability to brute force the password locally, you have the ability to reset in the event of a leaked hash and you aren’t reusing passwords you are fine with a shorter password. Obviously be mindful of easily guessable passwords or ones that are very short. However, a 12 computer generated password is fine.

  • Buffalox@lemmy.world
    link
    fedilink
    English
    arrow-up
    36
    ·
    edit-2
    6 hours ago

    Your password MUST contain big and small letters, and contain at least 1 number character and 1 spacial character, it MUST be 8 characters long, and it MUST be typed on a German Cherry keyboard between 8-9 PM, using ONLY 1 finger while blindfolded and listening to ABBA music. BUT NO SPACES ALLOWED!!!
    This is because of something called entropy we never even read about so we have zero understanding of it. Of course combined with lousy programming, so safety is all on you.

    Making all these possibilities OPTIONAL would actually make for safer passwords (higher entropy), as would using multiple words separated by spaces. The only meaningful way to accept a password would be to test it against common bad passwords, and test the entropy to determine acceptable levels. There is no good reason a password couldn’t be 10 words and at least 127 characters. There is no way that should stress a properly designed modern system.

      • WanderingThoughts@europe.pub
        link
        fedilink
        English
        arrow-up
        9
        ·
        8 hours ago

        Had that yesterday.

        “Must use special characters!”

        “Okay, no problem. Here you go.”

        “Not that one! It’s too special!”

        “Dude, I haven’t even touched extended ASCII yet.”

    • Kushan@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      10 hours ago

      You have described all of the guidelines that NIST, Microsoft, GCHQ and a few other institutions now recommend for password security.

      And yet I still have to have this argument with so-called security engineers and my favourite, compliance officers.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 hours ago

        the guidelines that NIST, Microsoft, GCHQ and a few other institutions now recommend for password security

        Because they are morons that don’t understand entropy.
        Requiring at least 1 number increases entropy less than simply allowing the use of numbers, and then recommending it.
        But most password queries are lousy at describing what’s allowed when creating it, and they generally don’t describe it at all when you enter it for access.
        The second part can be crucial for remembering exactly how the password was created, because what is now required, used to often not even be possible to use!

    • RedditRefugee69@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 hours ago

      I like the ones that just tell you your password strength.

      Subtle shaming of bad passwords without giving bad actors hints as to what the minimum (and thus most likely) password is.

    • 0x0@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      9
      ·
      10 hours ago

      I love when there are so many rules that my first few randomly-generated passwords are rejected.

      • AA5B@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        Even worse, when you can’t figure out why, or how to configure the generator, then end up having to type your own anyway