Frustrating Password-Checkers
NetworkVeteran
Member Posts: 2,338 ■■■■■■■■□□
in Off-Topic
My corporate password-checker:
"Magellan1492" - Rejected! Weak password. Reason: repeated characters.
"Mike1234" - Accepted. Strong password.
::bonks head on desk::
(I then created a sticky-note with my password, because I refuse to memorize more than three.)
Whomever writes these password-checkers needs to inject some common sense. The second password was four characters longer with non-sequential digits.
"Magellan1492" - Rejected! Weak password. Reason: repeated characters.
"Mike1234" - Accepted. Strong password.
::bonks head on desk::
(I then created a sticky-note with my password, because I refuse to memorize more than three.)
Whomever writes these password-checkers needs to inject some common sense. The second password was four characters longer with non-sequential digits.
Comments
-
networker050184 Mod Posts: 11,962 ModThen they all expire at different times too! Check out keypass if you haven't. A little better than a sticky note!An expert is a man who has made all the mistakes which can be made.
-
NetworkVeteran Member Posts: 2,338 ■■■■■■■■□□networker050184 wrote: »Then they all expire at different times too! Check out keypass if you haven't. A little better than a sticky note!
-
Roguetadhg Member Posts: 2,489 ■■■■■■■■□□I change all my passwords at the same time to avoid the confusion. My work passwords (that I have control over) is different than personals. My personal passwords are just a magellan cluster-....
Sticky Note? Do you at least hide it under your keyboard? You should encrypt you sticky note passwords with:
http://www.thinkgeek.com/product/e7b3/
A Decoder ring! Whoo!
As far as 1492. It's a popular year. One that stands out from the history books. Why not use a passphrase?
Like: Dr1nkM0r3Oval7!n3 I]In the spirit of the decoder ring[/IIn order to succeed, your desire for success should be greater than your fear of failure.
TE Threads: How to study for the CCENT/CCNA, Introduction to Cisco Exams -
Roguetadhg Member Posts: 2,489 ■■■■■■■■□□Sad face!In order to succeed, your desire for success should be greater than your fear of failure.
TE Threads: How to study for the CCENT/CCNA, Introduction to Cisco Exams -
NetworkVeteran Member Posts: 2,338 ■■■■■■■■□□Lmao @ Rogue & Tackle.
I have some passphrases in my repertoire of three corporate passwords, too, which failed for repeated letters as "Correct Horse Battery Staple" would.
Let's take a couple passphrases--
IlbcmTwtcmTota
This is "weaker" according to many password-checkers because the alphabet it's chosen from only has 52 characters to choose from [a-zA-Z].
Mike1234
This is "stronger" according to many password-checkers because the alphabet it's chosen from has 62 characters to choose from [a-zA-z0-9].
However, 52^14 =~ 2^80 while 62^8 =~ 2^48.
I wish password checkers would realize this! Especially since they direct you towards passwords that are harder to remember and more likely to end up on a post-it note.
(I will grant an exception for password databases that only store 8-bit passwords.)
(And no, I wouldn't normally pick either of those as passwords!) -
DevilWAH Member Posts: 2,997 ■■■■■■■■□□I use keypass, I also use the method of first letter from a short string of text like
"the best dog i have ever had was called moses 1998" = tbdihehwcM1((8
for personal non secure passwords as easy to remember and plenty strong enough to protect a log in to a site such as this.
For work I use random generated passwords along with some thing like Keypass to store and recall them. I don't really think about the pass word checker on the applications, I generaly keep in mind how you crack passwords and insure I chose passwords that are hard to break.- If you can't explain it simply, you don't understand it well enough. Albert Einstein
- An arrow can only be shot by pulling it backward. So when life is dragging you back with difficulties. It means that its going to launch you into something great. So just focus and keep aiming.
Linkin Profile - Blog: http://Devilwah.com -
NetworkVeteran Member Posts: 2,338 ■■■■■■■■□□I use keypass
-
jibbajabba Member Posts: 4,317 ■■■■■■■■□□I should really stop using the same password everywhere *rolls eyes*My own knowledge base made public: http://open902.com
-
DevilWAH Member Posts: 2,997 ■■■■■■■■□□jibbajabba wrote: »I should really stop using the same password everywhere *rolls eyes*
I disagree, it has been shown it can be better to use one single complex password that you can remember across multiply systems, than multiply shorted passwords, that are frequently changes and end up getting jotted down or when changed the same formate is reused.
A lot of companies are starting to relax the 30 / 90 day pass word renewal process, in favour of just increasing the password length and complexity.- If you can't explain it simply, you don't understand it well enough. Albert Einstein
- An arrow can only be shot by pulling it backward. So when life is dragging you back with difficulties. It means that its going to launch you into something great. So just focus and keep aiming.
Linkin Profile - Blog: http://Devilwah.com -
Ahriakin Member Posts: 1,799 ■■■■■■■■□□For web stuff I use LastPass with a Yubikey.
On the mathematical complexity comments above that's only part of the picture. Most credential attacks will not start with absolute brute-force but with predefined tables that (depending on the skill and resources of the attacker) may have been customised for the target. A theoretically more calculationally complex password can in reality be weaker because it was easier to derive from external information about the target. But that in it itself illustrates that there will never be a perfect password checker, they are just there to enforce some very basic minimums and yup will often get it wrong.We responded to the Year 2000 issue with "Y2K" solutions...isn't this the kind of thinking that got us into trouble in the first place? -
cyberguypr Mod Posts: 6,928 ModI hear you on password length. The other day I was watching this SANS webcast where John Strand presents the case for long passwords. He sums it up with "length is the only thing that matters" and provides examples of how complexity and randomness defeat the purpose.
One of our vendors requires us to change passwords every 30 days. They have implemented every single obstacle you can imagine: complexity, history, no email/name/account/user permutations, no dictionary, and most likely a few other things I can't remember. We always end up documenting the password somewhere or resetting it every time we need to use their service. Ridiculous. -
demonfurbie Member Posts: 1,819 ■■■■■□□□□□all the password checkers need to be reworked with a simple if then else statement like
if the password is greater than 26 letters yes if not then use the rules that they already havewgu undergrad: done ... woot!!
WGU MS IT Management: done ... double woot :cheers: -
tpatt100 Member Posts: 2,991 ■■■■■■■■■□jibbajabba wrote: »I should really stop using the same password everywhere *rolls eyes*
That Apple-Amazon-Wired story made me realize this. I always knew it but dang I kept putting it off.