How on earth can you both not accept the password I copied from my password safe and tell me that I cannot use the same pasaword again?

  • Willem@kutsuya.dev
    link
    fedilink
    arrow-up
    3
    ·
    22 days ago

    If there has been a data leak, they might block your current password because the hash has been leaked

    • cron@feddit.orgOP
      link
      fedilink
      arrow-up
      2
      ·
      22 days ago

      Yes, that might be a plausible theory. Basically a bad yersion of you must change your password.

      • kitnaht@lemmy.world
        link
        fedilink
        arrow-up
        0
        arrow-down
        1
        ·
        22 days ago

        How would that be considered bad? Is this some meme I’m too stupid to understand or something?

        • cron@feddit.orgOP
          link
          fedilink
          arrow-up
          3
          ·
          22 days ago

          It would be better if the login flow said something like

          For security reasons, we ask you to set a new password, please use the “password forgotten” function to gain access again.

          instead of me being puzzled why my password doesn’t work.

          • kewjo@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            22 days ago

            except now anyone guessing your password knows when they guess your password right? while that site is safe most users use the same password and any site they use with the same email is now vulnerable.

  • RustyNova@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    22 days ago

    I once had to reset my password as the new one got truncated without telling me.

    Yes. It was deemed too long.

    It was for an company that got plenty of my personal data

    • cron@feddit.orgOP
      link
      fedilink
      arrow-up
      2
      ·
      22 days ago

      Why on earth would someone truncate a password? I could make at least 10 more memea about bad handling of passwords

      • kautau@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        22 days ago

        Why? Probably some wild row length limit being hit where a table storing user data was storing an asinine amount of data, just terrible DB organization in an org where someone said “who even needs a DBA.”

        How? If you can truncate user passwords, you should never handle user passwords again, unless you’re a student or hobbyist learning a valuable lesson.

        • MajorHavoc@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          22 days ago

          How? If you can truncate user passwords, you should never handle user passwords again, unless you’re a student or hobbyist learning a valuable lesson.

          Yeah. The real reason to be alarmed is worse than the obvious one.

          If a partial version of what was originally set actually works later, it implies a scary chance they’re not even hashing the password before storing it.

          • kautau@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            22 days ago

            I think it’s a nonzero chance they’re not hashing it. Pretty much every hashing function, in the interest of preventing collisions, provides vastly different responses on small amounts of input. Even if they were hashing it, it would just appear to be the same password in a situation where they somehow got a collision, but again, the column length for passwords would always be fixed since a hash function always outputs the same data length.

          • sloppy_diffuser@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            22 days ago

            Also suggests the user may be reusing the same prefix if only the changed bits are getting truncated.

            Should use different random passwords every time. Completely random or a random string of words. While it doesn’t solve the cleartext password storage issue, a data breach won’t compromise all your other accounts to same degree.

            Doesn’t hurt to also randomize usernames, emails, and even security question answers.

            edit: or my new favorite passkeys, just make sure you trust whatever tool is managing your private keys.

      • marcos@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        22 days ago

        There’s no good reason. Whoever did it, did it for a bad reason. (Oh, well, there’s no good reason until you reach several thousand characters.)

        That said, it could be worse. Some sites do not truncate your password at the creation form, and only truncate it on the login screen. (Yeah, that happened to me, in 2 different sites.)

        • dustyData@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          21 days ago

          Why is it always the one’s for whom security is of utmost importance?

          Login to meme account to share shitposting on the internet: top notch up to date security.

          Login to the bank who actually handle my money: Clown ass security practices on obsolete infrastructure.

          • marcos@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            21 days ago

            Yep, one of mine was the federal government’s bounds buying portal…

            They improved since then, but it’s always the entity that holds your money or oversees your health…

  • GrabtharsHammer@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    22 days ago

    This often happens when you entered the right password but have a typo in the user name. Everyone tries the password again, but nobody spell checks their email or username.

  • Rayquetzalcoatl@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    22 days ago

    I’ve never really understood why most systems are set up to reject a password reset if it’s the same password. Is there a security issue there that I’m not picking up on?

    It seems like they should just let you reset your password anyway if you’ve reached that screen (usually using some kind of authorisation, like using a link with a token in it that gets emailed to you or something).

    • LarsIsCool@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      22 days ago

      The security risk I see is that the cause of you resetting your password could be that it is leaked. For that case, it is good to remind the user that they shouldn’t override it with their current password. That said it would be nice to have a “I know what I am doing” option and allow it anyway

      • dustyData@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        21 days ago

        If you forgot your password and are trying to reset it with the exact same password you forgot, then you obviously don’t know what you are doing.

      • LarsIsCool@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        22 days ago

        Start using it! You dont have to insert all your passwords immediately. It can naturally grow, minimizing startup cost

        • pixelscript@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          21 days ago

          It’s kinda neat when you do, though. For the obvious reason, of course. But I find also that it has the extra feature of showing you all at once just how many accounts you really have.

          For most people who use the Internet, I expect it’s easily dozens, perhaps over a hundred. It is truly no wonder why people reuse passwords or rely on simple algorithmic tricks to remember passwords, there is literally no way the common person could develop a unique secure password on their own for all of these services and recall all of them. A secure password manager is truly the only reasonable solution.

  • villainy@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    22 days ago

    I had this happen once where input validation on login and password change were different. I was allowed to set my password to a string containing a special character not accepted by the login form. Top men.

      • dual_sport_dork 🐧🗡️@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        21 days ago

        Note that for others reading this, what normal people think of as too long probably doesn’t signify. Some asshat somewhere may have decided greater than something like 8 characters is “too long.” Without telling you. Said asshat may indeed even be on the database side, and concluded somehow that varchar(8) should be sufficient for storing passwords. Right???

        It is not only easy for flagrantly badly designed web systems to display this behavior, but also depressingly common. And more closely the page or system you’re using is related to your local government, the probability of it being hilariously incompetently designed moves ever closer to becoming 1.

        • JustAnotherKay@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          21 days ago

          Ya know what’s actually even more absurd? The password was truncated on creation. The webpage allowed me to type 36 characters into the field, then only saved the first 30 of them.

          I verified the full 36 character password before creating the account, and was immediately met with “wrong password.” Noticed the 30 character limit when looking at the password change form, and tried cutting the last 6 characters off my existing password, which unfortunately was successful.