Here is the text of the NIST sp800-63b Digital Identity Guidelines.

  • LvxferreEnglish
    arrow-up
    334
    arrow-down
    0
    ·
    20 days ago
    link
    fedilink

    Reworded rules for clarity:

    1. Min required length must be 8 chars (obligatory), but it should be 15 chars (recommended).
    2. Max length should allow at least 64 chars.
    3. You should accept all ASCII plus space.
    4. You should accept Unicode; if doing so, you must count each code as one char.
    5. Don’t demand composition rules (e.g. “u’re password requires a comma! lol lmao haha” tier idiocy)
    6. Don’t bug users to change passwords periodically. Only do it if there’s evidence of compromise.
    7. Don’t store password hints that others can guess.
    8. Don’t prompt the user to use knowledge-based authentication.
    9. Don’t truncate passwords for verification.

    I was expecting idiotic rules screaming “bureaucratic muppets don’t know what they’re legislating on”, but instead what I’m seeing is surprisingly sane and sensible.

    • frezikEnglish
      arrow-up
      117
      arrow-down
      1
      ·
      20 days ago
      link
      fedilink

      NIST generally knows what they’re doing. Want to overwrite a hard drive securely? NIST 800-88 has you covered. Need a competition for a new block cipher? NIST ran that and AES came out of it. Same for a new hash with SHA3.

      • grueEnglish
        arrow-up
        27
        arrow-down
        1
        ·
        20 days ago
        link
        fedilink

        NIST generally knows what they’re doing

        For now, at least. Could change after Inauguration Day.

      • M500English
        arrow-up
        8
        arrow-down
        1
        ·
        20 days ago
        link
        fedilink

        Didn’t know about sha3.

    • catloafEnglish
      arrow-up
      59
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      I hate that anyone has to be told not to truncate passwords. Like even if you haven’t had any training at all, you’d have to be advanced stupid to even come up with that idea in the first place.

      • einlanderEnglish
        arrow-up
        24
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        Microsoft used to do that. I made a password in the late 90’s for a we service and I found out that it truncated my password when they made it after it warned my my password was too long when I tried to log in. It truncated at 16 characters.

        • catloafEnglish
          arrow-up
          7
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          The weirdest one I found was a site that would only check to see if what you entered started with the correct password. So if your password was hunter2 and you tried hunter246, it would let you in.

          Which means not only were they storing the password, but they had to go out of their way to use the wrong kind of string comparison.

          • wreckedcarzzEnglish
            arrow-up
            1
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            USAA does this. I renentl learned that, when I updated my password a few years back to my personal standard number of characters, everything was good until someone mentioned this fuck-up in a thread. USAA only checks the first 16? characters. I assume it just discards anything beyond that. Other users say that it warns and doesn’t let you enter more than that during password creation, but it/my pw mgr sure didn’t care, as I have a password several fold that limit. I took out a couple characters from my ‘set’ password, and it still logged in just fine. 16, just fine. 15, error.

            Fucking wild.

            • PieisawesomeEnglish
              arrow-up
              4
              arrow-down
              0
              ·
              20 days ago
              link
              fedilink

              I used to work there. I reported this bug every quarter until a VP told me to stop

        • chiisanaEnglish
          arrow-up
          1
          arrow-down
          0
          ·
          19 days ago
          link
          fedilink

          The LM password hash (predecessor to NTLM) was calculated in two blocks of 7 characters from that truncated 14 characters. Which meant the rainbow table for that is much smaller than necessary and if your password is not 14 characters, then technically part of the hash is much easier to brute force, because the other missing characters are just padded with null.

      • AmanduhEnglish
        arrow-up
        8
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        Can you elaborate further? Why would someone want to truncate passwords to begin with?

        • essteeyouEnglish
          arrow-up
          23
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          To save a few megabytes of text in a database somewhere. Likely the same database that gets hacked.

          • orclevEnglish
            arrow-up
            28
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            Which shouldn’t even matter because passwords are salted and hashed before storing them, so you’re not actually saving anything. At least they better be. If you’re not hashing passwords you’ve got a much bigger problem than low complexity passwords.

            • essteeyouEnglish
              arrow-up
              33
              arrow-down
              0
              ·
              20 days ago
              link
              fedilink

              The place that truncates passwords is probably not the place to look for best practices when it comes to security. :-)

              • orclevEnglish
                arrow-up
                6
                arrow-down
                1
                ·
                20 days ago
                link
                fedilink

                Hashing passwords isn’t even best practice at this point, it’s the minimally acceptable standard.

                  • pivot_rootEnglish
                    arrow-up
                    8
                    arrow-down
                    0
                    ·
                    20 days ago
                    edit-2
                    20 days ago
                    link
                    fedilink

                    Use a library. It’s far too easy for developers or project managers to fuck up the minimum requirements for safely storing passwords.

                    But, if you are wanting to do it by hand

                    • Don’t use a regular hashing algorithm, use a password hashing algorithm
                    • Use a high iteration count to make it too resource-intensive to brute force
                    • Salt the hash to prevent rainbow tables
                    • Salt the hash with something unique to that specific user so identical passwords have different hashes
                • frezikEnglish
                  arrow-up
                  2
                  arrow-down
                  1
                  ·
                  20 days ago
                  edit-2
                  20 days ago
                  link
                  fedilink

                  Sorta. Not really.

                  Key derivation algorithms are still hashes in most practical ways. Though they’re derived directly from block ciphers in most cases, so you could also say they’re encrypted. Even though people say to hash passwords, not encrypt them.

                  I find the whole terminology here to be unenlightening. It obscures more than it understands.

                  • orclevEnglish
                    arrow-up
                    2
                    arrow-down
                    0
                    ·
                    20 days ago
                    link
                    fedilink

                    A KDF is not reversible so it’s not encryption (a bad one can be brute forced or have a collision, but that’s different from decrypting it even if the outcome is effectively the same). As long as you’re salting (and ideally peppering) your passwords and the iteration count is sufficiently high, any sufficiently long password will be effectively unrecoverable via any known means (barring a flaw being found in the KDF).

                    The defining characteristic that separates hashing from encryption is that for hashing there is no inverse function that can take the output and one or more extra parameters (secrets, salts, etc.) and produce the original input, unlike with encryption.

          • frezikEnglish
            arrow-up
            1
            arrow-down
            0
            ·
            20 days ago
            edit-2
            20 days ago
            link
            fedilink

            Lots of older databases had fixed length fields, and you had to pad it if it was smaller. VARCHAR is a relatively new thing. So it’s not just saving space, but that old databases tended to force the issue.

            Nobody has an excuse today. Even Cobol has variable length strings.

    • MajorHavocEnglish
      arrow-up
      52
      arrow-down
      0
      ·
      20 days ago
      edit-2
      20 days ago
      link
      fedilink
      1. Don’t truncate passwords for verification.

      It needed to be said. Because some password system architects have been just that stupid.

      Edit: Fear of other’s stupidity is the mind killer. I will face my fear. My fear will wash over me, and when it has passed, only I will remain. Or I’ll be dead in a car accident caused by an AI driver.

      • Dhs92English
        arrow-up
        53
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        I’ve seen sites truncate when setting, but not on checking. So you set a password on a site with no stated limit, go to use said password, and get locked out. It’s infuriating

        • AshelynEnglish
          arrow-up
          23
          arrow-down
          0
          ·
          20 days ago
          edit-2
          20 days ago
          link
          fedilink

          Years back, I had that happen on PayPal of all websites. Their account creation and reset pages silently and automatically truncated my password to 16 chars or something before hashing, but the actual login page didn’t, so the password didn’t work at all unless I backspaced it to the character limit. I forgot how I even found that out but it was a very frustrating few hours.

          • orclevEnglish
            arrow-up
            5
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            Banks usually have the absolute worst password policies. It’s typically because their backend is some crusty mainframe from the 80s that limits inputs to something absurdly insecure by today’s standards and they’ve kicked the upgrade can down the road for so long now that it’s a staggeringly monumental task to rewrite it all. Thankfully most of them have upgraded at this point, but every now and then you still find one that’s got ridiculous limits like a maximum password length of 8 and only alphanumeric characters (with no 2FA obviously).

        • BrianTheeBiscuiteerEnglish
          arrow-up
          7
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          Another ridiculous policy I’ve seen (many years ago) is logging in too fast. I used to get locked out of my banks website all the time and I used autotype with KeePass so I was baffled when it wouldn’t get accepted. Eventually I had a thought to slow down the typing mechanism and suddenly I didn’t get locked out anymore.

    • dual_sport_dork 🐧🗡️English
      arrow-up
      36
      arrow-down
      0
      ·
      20 days ago
      edit-2
      20 days ago
      link
      fedilink

      Don’t bug users to change passwords periodically. Only do it if there’s evidence of compromise.

      This is a big one. Especially in corporate environments where most of the users are, shall we say, not tech savvy. Forcing people to comply with byzantine incomprehensible password composition rules plus incessantly insisting that they change their password every 7/14/30 days to a new inscrutable string that looks like somebody sneezed in punctuation marks accomplishes nothing other than enticing everyone to just write their password down on a Post-It and stick it to their monitor or under their keyboard.

      Remember: Users do not care about passwords. From the perspective of anyone who isn’t a programmer or a security expert, passwords are just yet another exasperating roadblock some nerd keeps putting in front of them that is preventing them from doing whatever it is they were actually trying to do.

      • StarbuncleEnglish
        arrow-up
        32
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        Everyone I’ve spoken to who has a password change rule just changes one character from their previous password. It does NOTHING.

        • dual_sport_dork 🐧🗡️English
          arrow-up
          21
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          That works great until some dickhole implements the old, “New password cannot contain any sequence from your previous (5) passwords.

          This also of course necessitates storing (multiple successive!) passwords in plain text or with a reversible cipher, which is another stupid move. You’d think we’d have gotten all of this out of our collective system as a society by now, and yet I still see it all the time.

          All of these schemes are just security theater, and actively make the system in question less secure while accomplishing nothing other than berating and frustrating its users.

          • dgmibEnglish
            arrow-up
            8
            arrow-down
            0
            ·
            20 days ago
            edit-2
            20 days ago
            link
            fedilink

            This also leads to stupid rules like you can’t change your password more than once a day, to prevent someone from changing their password 5 times and then changing it back to what it was before.

          • StarbuncleEnglish
            arrow-up
            8
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            HA, I hope you’re joking. Surely nobody’s actually done that, right? Riiiight?

        • Flying_HellfishEnglish
          arrow-up
          13
          arrow-down
          0
          ·
          20 days ago
          edit-2
          20 days ago
          link
          fedilink

          “I just increment the number at the end” is a phrase I’ve heard so many times

    • magic_smokeEnglish
      arrow-up
      19
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      NIST are bureaucrats sure, but bureaucrats with lots and lots of practical experience.

    • TanohEnglish
      arrow-up
      13
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      Only issue I see is that the 8 chars required is very short and easy to brute force. You would hope that people would go for the recommended instead, but doubt it.

    • perviouslyinerEnglish
      arrow-up
      11
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      re #7, I hope they are also saying no ‘secret questions’ to reset the password?

      • BuddahrifficEnglish
        arrow-up
        13
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        Yeah, I think 7 and 8 both cover that. I recently signed up for an account where all of the “security questions” provided asked about things that could be either looked up or reasonably guessed based on looked up information.

        We live in a tech world designed for the technically illiterate.

        • eronthEnglish
          arrow-up
          10
          arrow-down
          0
          ·
          20 days ago
          edit-2
          20 days ago
          link
          fedilink

          I usually invent answers to those and store those answers in a password manager. Essentially turns them into backup passwords that can be spoken over the phone if necessary.

          Where was I born? “Stallheim, EUSA, Mars”

          Name of first pet? “Groovy Tuesday”

          It’s fun, usually.

          • BuddahrifficEnglish
            arrow-up
            5
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            I tried that without a password manager for a little while. But then my answers were too abstract to remember, so now I also use a password manager for that.

          • subtextEnglish
            arrow-up
            4
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            What is the first name of your first best friend?

            eoY&Z9m4LNRDY!Gzdd%q98LYiBi8Nq

            Oh old eoY&Z9m4LNRDY!Gzdd%q98LYiBi8Nq and I go way back! I met eoY&Z9m4LNRDY!Gzdd%q98LYiBi8Nq in Pre-K and we’ve been inseparable ever since.

            It is quite annoying if they’re a service that makes you read aloud your security questions to phone reps to prove your identity. One of my retirement accounts requires that and I have to sigh and read out the full string. I’ve changed it since to an all lowercase, 20 digit string as a compromise.

            • NotMyOldRedditNameEnglish
              arrow-up
              5
              arrow-down
              0
              ·
              19 days ago
              edit-2
              19 days ago
              link
              fedilink

              20 character all lowercase is very secure as long as its random words / letters that would make it unguessable by knowing you.

              Edit: you could also prefix it if you think you’d have to read it

              “This question is stupid fuck nuts house gravel neptune cow.

        • frezikEnglish
          arrow-up
          5
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          Sarah Palin had her Yahoo mail account hacked because of those “security” questions. In 2008. We should be well past the time where they are a thing.

          • BuddahrifficEnglish
            arrow-up
            2
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            Q: What do you often see when you look out your back window?

            A: Vladimir Putin riding a horse shirtless.

            Hey maybe the GOP got connected with Putin because he was often at Palin’s backyard BBQs when he would ride over to say hi when he saw the gathering.

            Though I also just noticed there’s only two letters different between Putin and Palin Maybe it was just Putin in a wig the whole time.

      • LvxferreEnglish
        arrow-up
        1
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        I think so, based on the original: “Verifiers and CSPs [credential service providers] SHALL NOT permit the subscriber to store a hint that is accessible to an unauthenticated claimant. With “shall not” being used for hard prohibitions.

    • hamsterkillEnglish
      arrow-up
      11
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      I was expecting idiotic rules screaming “bureaucratic muppets don’t know what they’re legislating on”, but instead what I’m seeing is surprisingly sane and sensible

      NIST knows what they’re doing. It’s getting organizations to adapt that’s hard. NIST has recommended against expiring passwords for like a decade already, for example, yet pretty much every IT dept still has passwords expiring at least once a year.

    • cybersandwichEnglish
      arrow-up
      10
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      I think if you do allow 8 character passwords the only stipulation is that you check it against known compromised password lists. Again, pretty reasonable.

      • LvxferreEnglish
        arrow-up
        6
        arrow-down
        0
        ·
        20 days ago
        edit-2
        20 days ago
        link
        fedilink

        That stipulation goes rather close to #5, even not being a composition rule. EDIT: see below.

        I think that a better approach is to follow the recommended min length (15 chars), unless there are good reasons to lower it and you’re reasonably sure that your delay between failed password attempts works flawlessly.

        EDIT: as I was re-reading the original, I found the relevant excerpt:

        If the CSP [credential service provider] disallows a chosen password because it is on a blocklist of commonly used, expected, or compromised values (see Sec. 3.1.1.2), the subscriber SHALL be required to choose a different password. Other complexity requirements for passwords SHALL NOT be imposed. A rationale for this is presented in Appendix A, Strength of Passwords.

        So they are requiring CSPs to do what you said, and check it against a list of compromised passwords. However they aren’t associating it with password length; on that, the Appendix 2 basically says that min length depends on the threat model being addressed; as in, if it’s just some muppet trying passwords online versus trying it offline.

    • General_EffortEnglish
      arrow-up
      6
      arrow-down
      0
      ·
      20 days ago
      link
      fedilink

      You should accept Unicode; if doing so, you must count each code as one char.

      Hmm. I wonder about this one. Different ways to encode the same character. Different ways to calculate the length. No obvious max byte size.

      • dual_sport_dork 🐧🗡️English
        arrow-up
        10
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        Who cares? It’s going to be hashed anyway. If the same user can generate the same input, it will result in the same hash. If another user can’t generate the same input, well, that’s really rather the point. And I can’t think of a single backend, language, or framework that doesn’t treat a single Unicode character as one character. Byte length of the character is irrelevant as long as you’re not doing something ridiculous like intentionally parsing your input in binary and blithely assuming that every character must be 8 bits in length.

        • frezikEnglish
          arrow-up
          5
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          It matters for bcrypt/scrypt. They have a 72 byte limit. Not characters, bytes.

          That said, I also think it doesn’t matter much. Reasonable length passphrases that could be covered by the old Latin-1 charset can easily fit in that. If you’re talking about KJC languages, then each character is actually a whole word, and you’re packing a lot of entropy into one character. 72 bytes is already beyond what’s needed for security; it’s diminishing returns at that point.

        • General_EffortEnglish
          arrow-up
          1
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          If the same user can generate the same input, it will result in the same hash.

          Yes, if. I don’t know if you can guarantee that. It’s all fun and games as long as you’re doing English. In other languages, you get characters that can be encoded in more than 1 way. User at home has a localized keyboard with a dedicated key for such a character. User travels across the border and has a different language keyboard and uses a different way to create the character. Euro problems.

          https://en.wikipedia.org/wiki/Unicode_equivalence

          Byte length of the character is irrelevant as long as you’re not doing something ridiculous like intentionally parsing your input in binary and blithely assuming that every character must be 8 bits in length.

          There is always some son-of-a-bitch who doesn’t get the word.

          • John F. Kennedy
    • turtleEnglish
      arrow-up
      3
      arrow-down
      0
      ·
      19 days ago
      link
      fedilink

      It’s crazy that they didn’t include all the “should” items in that list. If you read the entire section, there’s a critical element that’s missing in the list, which is that new passwords should be checked against blocklists. Otherwise, if you combine 1, 5, and 6, you end up with people using “password” as their password, and keeping that forever. Really, really poor organization on their part. I’m already fighting this at work.

    • NotMyOldRedditNameEnglish
      arrow-up
      1
      arrow-down
      0
      ·
      20 days ago
      edit-2
      20 days ago
      link
      fedilink

      I think it’s pretty idiotic to

      Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords.

      They might mean well, but the reason we require a special character and number is to ensure the amount of possible characters are increased.

      If a website doesn’t enforce it, people are just going to do a password like password

      password is a totally valid password under this rule. Any 8 letter word is valid. hopsital for example.

      These passwords can be cracked in seconds under 10 minutes, and have their hashes checked for in leaks in no time if the salt is also exposed in the hack.

      Edit: Below

      Numbers from a calculator with 8 characters using sha2 (ignoring that crackers will try obvious fill ins like 0 for o and words before random characters, this is just for example)

      hospital 5m 23s

      Hospital 10m 47s

      Hospita! 39m 12s

      Moving beyond 8

      Hospita!r - 19h 49m

      Hospita!ro 3w 4d

      Hospita!roo 2y 1m

      Hospita!room 66 years

      The suggestion of multiple random words makes not needing the characters but you have to enforce a longer limit then, not 8.

      At least with 11 characters with upper case and special characters if it was all random you get about 2 years after a breach to do something instead of mere weeks. If it was 11 characters all lower case nothing special you’d only get 2 months and we are rarely notified that fast.

      • LvxferreEnglish
        arrow-up
        3
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        They might mean well, but the reason we require a special character and number is to ensure the amount of possible characters are increased.

        The problem with this sort of requirement is that most people will solve it the laziest way. In this case, “ah, I can’t use «hospital»? Mkay, «Hospital1» it is! Yay it’s accepted!. And then there’s zero additional entropy - because the first char still has 26 states, and the additional char has one state.

        Someone could of course “solve” this by inserting even further rules, like “you must have at least one number and one capital letter inside the password”, but then you get users annotating the password in a .txt file because it’s too hard to remember where they capitalised it or did their 1337.

        Instead just skip all those silly rules. If offline attacks are such a concern, increase the min pass length. Using both lengths provided by the guidelines:

        • 8 chars, mixing:minuscules, capitals, digits, and any 20 special chars of your choice, for a total of 82 states per char. 82⁸ = 2*10¹⁵ states per password.
        • 15 chars, using only minuscules, for a total of 26 states per char. Number of states: 26¹⁵ = 1.7*10²¹ states per password.
        • NotMyOldRedditNameEnglish
          arrow-up
          1
          arrow-down
          0
          ·
          20 days ago
          edit-2
          20 days ago
          link
          fedilink

          But they mess that up with their 8 char rule

          Verifiers and CSPs SHALL require passwords to be a minimum of eight characters in length and SHOULD require passwords to be a minimum of 15 characters in length.

          I’d they’d just said shall require 15 but not require special chars then that’s okay, but they didn’t.

          Then you end up with the typical shitty manager who sees this, and says they recommend 8 and no special chars, and that’s what it becomes.

          • LvxferreEnglish
            arrow-up
            1
            arrow-down
            0
            ·
            19 days ago
            link
            fedilink

            I don’t think that the entity should be blamed for the shitty manager. Specially given that the document has a full section (appendix A.2) talking about pass length.

            • NotMyOldRedditNameEnglish
              arrow-up
              2
              arrow-down
              0
              ·
              19 days ago
              edit-2
              19 days ago
              link
              fedilink

              The entity knows people will follow what they say for minimums. There’s already someone in the comment section saying they’re now fighting what these lax rules allow.

              Edit: stupid product managers will jump at anything that makes it easier for their users and dropping it to 8, no special characters, and no resets is the new thing now.

              • LvxferreEnglish
                arrow-up
                1
                arrow-down
                0
                ·
                19 days ago
                link
                fedilink

                What you’re proposing is effectively the same as "they should publish inaccurate guidelines that do not actually represent their informed views on the matter, misleading everybody, to pretend that they can prevent the stupid from being stupid." It defeats the very reason why guidelines exist - to guide you towards the optimal approach in a given situation.

                And sometimes the optimal approach is not a bigger min length. Convenience and possible vectors of attack play a huge role; if

                • due to some input specificity, typing out the password is cumbersome, and
                • there’s no reasonable way to set up a password manager in that device, and
                • your blocklist of compromised passwords is fairly solid, and
                • you’re reasonably sure that offline attacks won’t work against you, then

                min 8 chars is probably better. Even if that shitty manager, too dumb to understand that he shouldn’t contradict the SHOULD [NOT] points without a good reason to do so, screws it up. (He’s likely also violating the SHALL [NOT] points, since he used the printed copy of the guidelines as toilet paper.)

    • tastysnacksEnglish
      arrow-up
      4
      arrow-down
      30
      ·
      20 days ago
      link
      fedilink

      What kind of barbarian puts a space in their password?

      • naticusEnglish
        arrow-up
        44
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        Very common for pass phrases, and not dissuaded. Pass phrases are good for people to remember without using poor storage practices (post it notes, txt file, etc) and are strong enough to keep secure against brute force attacks or just guessing based off knowledge of the user.

        • grueEnglish
          arrow-up
          10
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          On one hand, that’s true. On the other hand, a person should only need exactly one passphrase, which is the one used to unlock their password manager. Every other password should be randomly-generated and would only contain space characters by chance.

          • naticusEnglish
            arrow-up
            19
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            That’s great in theory, but you’ll have passwords for logging into OSes too which password managers do not help with and you better have it memorized or you’re going to have a bad time.

      • lol_idkEnglish
        arrow-up
        29
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        I’m waiting for backspace to be a valid character

        • lol_idkEnglish
          arrow-up
          3
          arrow-down
          0
          ·
          20 days ago
          link
          fedilink

          Also there’s the no space space. But that’s really only useful in hacking bad implementations of html parsers or putting in your code you post online to mess with people.

          • dual_sport_dork 🐧🗡️English
            arrow-up
            2
            arrow-down
            0
            ·
            20 days ago
            link
            fedilink

            That’s the “zero width space, Alt + 200B for Windows users. Another favorite of mine is the nonbreaking space, Alt + 0160, which a staggering majority of web sites and other systems fail to account for.

      • rebelsimileEnglish
        arrow-up
        17
        arrow-down
        1
        ·
        20 days ago
        link
        fedilink

        gosh who would want an uncommon character that obviously most average people aren’t thinking about in their passwords, that sounds like it might even be somewhat secure.

      • randombulletEnglish
        arrow-up
        7
        arrow-down
        1
        ·
        20 days ago
        link
        fedilink

        My passphrase includes several spaces. It’s another character to assist in entropy.

      • portiforniaEnglish
        arrow-up
        1
        arrow-down
        0
        ·
        20 days ago
        link
        fedilink

        I’m with you, despite seeing lemmings downvote the heck out of your comment 😢

        The reason, and specifically for whitespace at the beginning or end of a password, is that a lot of users copy-paste their passwords into the form, and for various reasons, whitespace can get pasted in, causing an invalid match. No bueno.

        Source: I’m a web developer who has seen this enough times that we had to implement a whitespace-trim validation for both setting & entering passwords.

        • orclevEnglish
          arrow-up
          8
          arrow-down
          1
          ·
          20 days ago
          link
          fedilink

          Trimming whitespace from the start and end of a password is fine but you absolutely should not remove whitespace from the middle of a password.