this post was submitted on 26 Sep 2024
546 points (99.3% liked)

Technology

58970 readers
5357 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Here is the text of the NIST sp800-63b Digital Identity Guidelines.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 24 points 1 month ago (2 children)

Microsoft used to do that. I made a password in the late 90's for a we service and I found out that it truncated my password when they made it after it warned my my password was too long when I tried to log in. It truncated at 16 characters.

[–] [email protected] 7 points 1 month ago (1 children)

The weirdest one I found was a site that would only check to see if what you entered started with the correct password. So if your password was hunter2 and you tried hunter246, it would let you in.

Which means not only were they storing the password, but they had to go out of their way to use the wrong kind of string comparison.

[–] [email protected] 1 points 1 month ago (1 children)

USAA does this. I renentl learned that, when I updated my password a few years back to my personal standard number of characters, everything was good until someone mentioned this fuck-up in a thread. USAA only checks the first... 16? characters. I assume it just discards anything beyond that. Other users say that it warns and doesn't let you enter more than that during password creation, but it/my pw mgr sure didn't care, as I have a password several fold that limit. I took out a couple characters from my 'set' password, and it still logged in just fine. 16, just fine. 15, error.

Fucking wild.

[–] [email protected] 4 points 1 month ago

I used to work there. I reported this bug every quarter until a VP told me to stop…

[–] [email protected] 1 points 1 month ago

The LM password hash (predecessor to NTLM) was calculated in two blocks of 7 characters from that truncated 14 characters. Which meant the rainbow table for that is much smaller than necessary and if your password is not 14 characters, then technically part of the hash is much easier to brute force, because the other missing characters are just padded with null.