114
submitted 1 week ago by Showroom7561@lemmy.ca to c/privacy@lemmy.ca

It's infuriating to create a "strong password" with letters, numbers, upper and lowercase, symbols, and non-repeating text... but it has to be only 8 to 16 characters long.

That's not a "strong" password, random characters or not.

Is there a limitation that somehow prevents these sites from allowing more than 16 characters?

I'm talking government websites, not just forums. It seems crazy to me.

top 50 comments
sorted by: hot top controversial new old
[-] Retro_unlimited@lemmy.world 23 points 6 days ago

I had the opposite issue… how the heck do I need a username over 1000 characters? lol

[-] hightrix@lemmy.world 17 points 6 days ago

Because the requirement was to allow user names, the dev asked what the limit should be, the PM said, “I don’t care, make it 1000”, and so the dev did it.

Source: I’ve been working in software far too fucking long.

[-] Showroom7561@lemmy.ca 5 points 6 days ago

That's some malicious compliance right there! 😂

[-] phoenixz@lemmy.ca 15 points 6 days ago

Irá usually bad backend design, bad frontend design, all made by people who are only vaguely aware of security, and how it works.

It's the same bunch that brought us "change your password every two weeks" and other insane anti security designs. They make it worse without even realizing it.

Do hope that your passwords aren't stored in plain text!

[-] ICastFist@programming.dev 8 points 6 days ago

Probably running on code from before 2000.

[-] Creat@discuss.tchncs.de 71 points 1 week ago

It's a massive red flag. It implies that they are actually storing the password instead of a (preferably salted) hash and that they have no idea what good security practices are. Storing a hash leads to same size strings, no matter the length on the password.

[-] sugar_in_your_tea@sh.itjust.works 14 points 6 days ago

And there's no reason a database can't store a very long hash as well. Storage is cheap for this kind of thing.

[-] sik0fewl@lemmy.ca 10 points 6 days ago

That's why I only store and compare the first 8 characters.

Why not store the whole thing?

[-] sik0fewl@lemmy.ca 8 points 6 days ago

I'm joking of course, but the reason would be the database column is 8 characters.

If only there was a SQL command that could alter an existing table...

[-] jagged_circle@feddit.nl 3 points 6 days ago

They shouldn't be using salted hashes since a decade or more. Best is to use a memory hard password hash function like argon

[-] brisk@aussie.zone 2 points 5 days ago

Can you expand on this? My experience with Argon is looking up a Wikipedia page in response to this comment, but it looks like it uses a salt as an input?

[-] jagged_circle@feddit.nl 1 points 5 days ago* (last edited 5 days ago)

Its a password specific function. Its also memory hard.

As oposed to generation a salt and passing that with the password through sha256 or something, which is bad practice

[-] wesker@lemmy.sdf.org 55 points 1 week ago

It's informative. It informs you that you shouldn't use the site, if possible. Because it's also suggestive of poor security practices in general.

load more comments (2 replies)
[-] Thorry84@feddit.nl 51 points 1 week ago

There are valid reasons to limit password length. For example when a hashing function is used that requires a lot of processing power and the amount of power required to calculate the hash is related to the length. In that (very common) case, a denial of service attack vector is exposed. By simply spamming insane long passwords into a login form for example, the servers calculating the hash get easily overloaded. Even with rate limiting, only a small number of attacking nodes can be used to pull down a site.

So a maximum number of characters for a password is a valid thing to do. HOWEVER the maximum length for this purpose is usually set at something like 2048 or 4096 characters.

There is no excuse for a max password length of 16, that's just terrible.

[-] some_guy@lemmy.sdf.org 10 points 1 week ago

Sixteen is the minimum where I work. We upped it at the end of last year. Fortunately, we also fixed our password policy to expire annually. It used to be every three months, which leads to recycling.

[-] jagged_circle@feddit.nl 8 points 6 days ago

NIST recommended to never have passwords expire since like 3 decades. You gotta get rid of that. It makes your org less secure.

Probably best to just fire whoever set that up. They're clueless

[-] filcuk@lemmy.zip 3 points 6 days ago

These policies typically come from top management. They'd have to fire themselves.

[-] sugarfoot00@lemmy.ca 7 points 6 days ago

There's always recycling. Or changing that final character from a 1 to a 2, etc. The human brain just cant handle the complexity otherwise.

[-] teft@lemmy.world 2 points 6 days ago

Use a couple words instead of letters, you’ll find it easier to remember and not use repeats. Bicycle Uber Pancake 4* should be more secure than some random bunch of letters you’ll forget.

Just use a password manager. No need to remember anything besides your master password. That works for pretty much everything, except I guess computer logins.

[-] teft@lemmy.world 3 points 6 days ago

Well yes everyone should use a password manager but some people can't load a password manager onto their work computer and therefore are more likely to use non-random passwords. It's easier to remember a passphrase than a random password.

Fortunately, we force everyone to use a password manager at my company. SSO all the things!

[-] Kazumara@discuss.tchncs.de 1 points 5 days ago

We got SSO systems too, unfortunately, there are about 3 of them, lol. The old ADFS, the current Microsoft login (possibly cloud AD, not sure), and our own ID product that we offer to customers.

[-] NotMyOldRedditName@lemmy.world 3 points 6 days ago

You could put a timeout on the hash function so that it can't be abused that way, but then... why not just make a limit so it can't anyway.

load more comments (3 replies)
[-] originalucifer@moist.catsweat.com 25 points 1 week ago

ive mostly noticed this on old systems.. where the field length for password was decided by an intern 30 years ago.

load more comments (5 replies)
load more comments
view more: next ›
this post was submitted on 30 May 2025
114 points (98.3% liked)

privacy

4487 readers
120 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 3 years ago
MODERATORS