In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)

Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.

  • expr@programming.dev
    link
    fedilink
    English
    arrow-up
    8
    ·
    7 hours ago

    That’s simply false. Increased length increases the entropy of a password, making it harder to brute force to gain access.

    You have to go out of your way to restrict the length of passwords. There’s absolutely no reason to do it, and it is contrary to all good security practices.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      3
      ·
      4 hours ago

      I’m not sure how you expect someone to brute force a web service. It is possible but it would be equivalent to a denial of service. Having long passwords for a online login makes no sense. A randomly generated 12 character password isn’t any more or less secure than a 40 character password since they both take a unrealistic amount of time to brute force.

      A 12 character password made up of standard characters would take 475,920,314,814,253,376,475,136 tries assuming you know the length. I don’t see how someone could brute force a web service.

      I will say I get annoyed at web services that require special characters since I like to use 3 words from the EFF extended word list.