In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)

Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.

  • tarsisurdi@lemmy.eco.br
    link
    fedilink
    English
    arrow-up
    122
    ·
    edit-2
    19 hours ago

    I once registered an account with a random ~25 characters long password (Keepass PM) for buying tickets on https://uhuu.com.br/

    The website allowed me to create the account just fine, but once I verified my e-mail, I couldn’t log into it due to there being a character limit ONLY IN THE LOGIN PASSWORD FIELD. Atrocious.

    EDIT: btw, the character limit was 12

    • FiniteLooper@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      12 hours ago

      I’ve had this exact same thing happen.

      I’ve also had it happen where you have the two fields to verify the password is the same. One had a maxlength set in it, and the other didn’t. I was for sure entering the same password and I was so confused until I opened up the dev tools and inspected the inputs.

      • AA5B@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 hours ago

        I’ve seen this behavior too, I forget where. For me it was a bit easier since the fields displayed a different number of stars. I did spend too long trying to figure out how my password manager could be failing that way

      • scintilla@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        5
        ·
        12 hours ago

        I understand a cap of like 64 characters or something to keep storage space down for a company with millions of users. other than that it doesn’t make a ton of sense.

        • mic_check_one_two@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          3 hours ago

          The cap should actually be due to the hashing algorithm. Every password should be the exact same length once it is salted and hashed, so the actual length of the password doesn’t make a difference in regards to database size. The hash will be a set length, so the storage requirements will be the same regardless. Hashing algorithms have a maximum input length. IIRC the most popular ones return a result of 64-255 characters, and cap at 128 characters for input; Even an input of just “a” would return a 64 character hash. But the salt is also counted in that limit. So if they’re using a 32 character salt, then the functional cap would be 96 characters.

          Low character caps are a huge red flag, because it means they’re likely not hashing your password at all. They’re just storing them in plaintext and capping the length to save storage space, which is the first mortal sin of password storage.

        • Redjard@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          25
          ·
          11 hours ago

          That is a huge red flag if ever given as a reason, you never store the password.
          You store a hash which is the same length regardless of the password.

          • scintilla@lemm.ee
            link
            fedilink
            English
            arrow-up
            8
            ·
            11 hours ago

            Youre right lol. I forgot that hash lengths are different from the actually password length.