• Zectivi@lemmy.world
      link
      fedilink
      English
      arrow-up
      92
      ·
      edit-2
      1 year ago

      Same, just gotta watch out for sites that don’t support it and don’t tell you that they don’t. I got into a password reset loop with a site once, until I realized it was truncating my 20 character password to their supported max of 16. They never said the max was 16, and never game an error that 20 wasn’t allowed. Just simply an asshole design. I probably could check bitwarden for whatever password I changed the most and see if it’s still an issue with the site.

    • narshok@lemmy.worldB
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      Is there a legitimate reason to use 20 characters over 16? Genuinely asking. Bitwarden considers them both “strong”, taking centuries to crack.

      • Siors@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        1
        ·
        1 year ago

        Well the more characters you have the higher the entropy of the password and the harder it would be to crack. So when you don’t have to remember the password yourself there’s no reason not to use a very long password if the service you’re using allows it.

        • Coreidan@lemmy.world
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          1
          ·
          1 year ago

          Except no one cracks passwords. Vast majority of hacks is through social networking and trojans. The days of password cracking are long over especially considering most services lock you out after several failed attempts.

          The main argument for using a password manager is so you can have a different password for every service. This way if they manage to obtain one password they can’t access everything.

          It also makes rotating passwords a lot easier so that way you’re not using the same password forever. If your password gets out hopefully it’s changed before they use it.

          • lemmyvore@feddit.nl
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            Offline password cracking is still very much a thing. They steal the entire password database then crack it offline at their leisure, not live against the regular login.

            Several measures are required to defend against this:

            • Hash seeds defend against rainbow tables.
            • Password length & complexity as well as using computationally-intensive hash algorithms defend against the brute-force cracking.
            • Password managers help with length and complexity, sad well as promote not reusing passwords.
      • Bazoogle@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        1 year ago

        There’s realistically no reason not to generate the max password. The different in possibilities between a password with 16 characters and one with 20 (using a-zA-Z0-9!@#$%^&*()?-+." which isn’t even all the options) is 1.2E30 v s 4.13E37. That’s seven orders of magnitude from 4 characters. The difference between $1 and $10,000,000. But to be fair, 1.2E30 possible combinations is kind of a lot already, but why not add a few more characters just for the hell of it?

        • StudioLE@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          1 year ago

          If you always use the maximum then the length of your password becomes predictable which reduces the number of permutations.

          It’s probably better to use a password of around 60-100% of the maximum

          • Bazoogle@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            I mean, that’s true. And that’s usually the case since I typically use a slider. But if you password is 100 characters, numbers, and symbols, I don’t think telling them the exact length is going to help much.

              • Coreidan@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                4
                ·
                1 year ago

                Nope. Most services lock you out after 3 failed password attempts for 10-15 minutes. Password cracking would take centuries at that rate.

                It worked in the 90s when you could pound the severs for hours/days before even being noticed. Now you’ll just get auto IP banned.