Here is the text of the NIST sp800-63b Digital Identity Guidelines.

  • NotMyOldRedditName@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    7 hours ago

    The entity knows people will follow what they say for minimums. There’s already someone in the comment section saying they’re now fighting what these lax rules allow.

    Edit: stupid product managers will jump at anything that makes it easier for their users and dropping it to 8, no special characters, and no resets is the new thing now.

    • Lvxferre@mander.xyz
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 minutes ago

      What you’re proposing is effectively the same as "they should publish inaccurate guidelines that do not actually represent their informed views on the matter, misleading everybody, to pretend that they can prevent the stupid from being stupid." It defeats the very reason why guidelines exist - to guide you towards the optimal approach in a given situation.

      And sometimes the optimal approach is not a bigger min length. Convenience and possible vectors of attack play a huge role; if

      • due to some input specificity, typing out the password is cumbersome, and
      • there’s no reasonable way to set up a password manager in that device, and
      • your blocklist of compromised passwords is fairly solid, and
      • you’re reasonably sure that offline attacks won’t work against you, then

      min 8 chars is probably better. Even if that shitty manager, too dumb to understand that he shouldn’t contradict the “SHOULD [NOT]” points without a good reason to do so, screws it up. (He’s likely also violating the “SHALL [NOT]” points, since he used the printed copy of the guidelines as toilet paper.)