• Rhynoplaz@lemmy.world
    link
    fedilink
    English
    arrow-up
    79
    arrow-down
    1
    ·
    2 months ago

    “Your selected password is already being used by SwiftyFan05. Please choose another password.”

  • m_f@midwest.social
    link
    fedilink
    English
    arrow-up
    57
    ·
    2 months ago

    Somebody isn’t sanitizing their inputs properly. Like putting a bandaid on a heart attack

    • Scrubbles@poptalk.scrubbles.tech
      link
      fedilink
      English
      arrow-up
      31
      ·
      2 months ago

      Whenever I see something like this I just laugh because you’re exactly right. Something isn’t being handled properly and their dev team just proved they don’t know how to do some basic handling. Every API library in JS and restful API I know of handle special characters. If they wanted they could base64 encode it over the wire. Then you’re exactly right, if the database “can’t handle it” more than likely it’s a home spun database connection where they’re serializing it themselves (which even then this is solvable), but even then that proves that they make poor choices.

      • doeknius_gloek@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        17
        ·
        edit-2
        2 months ago

        if the database “can’t handle it” […] that proves that they make poor choices.

        Exactly, the database should never even have to handle the password in it’s original form and hashing algorithms don’t care about special characters.

      • Snot Flickerman@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        2 months ago

        This is like when I was in my twenties working at a crappy grocery store with a MoneyGram inside of it. I live in Washington state, and at the time, if your last name was less than five characters, you would have asterisk’s in your license number. The MoneyGram system wanted people’s license numbers but was unable to recognize a license with an asterisk. It happened pretty rarely, but it always happened to people whose last names were four characters or less long. Five letters in your last name and you were gold. To make the transactions happen, I would just do the whole license number minus the asterisk.

        Anyway, Washington changed how it generates license numbers so its a moot point anyway but I don’t think MoneyGram ever spent a dime to fix this since it only affected a small number of people in one US state.

      • dual_sport_dork 🐧🗡️@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        2 months ago

        Seems to be they’re dropping the passwords in the database in plain text, but they’re deathly afraid that someone will drop a '; in there or something and the insert will break.

        Notwithstanding that storing passwords in plain text is a slapping with the 10 foot rubber chicken, but mysqli_real_escape_string() or any number of other similar solutions are indeed a thing that exists. A prepared statement would work, too.

    • groet@feddit.org
      link
      fedilink
      English
      arrow-up
      18
      ·
      2 months ago

      Might be a minimum of 16 chars. Or the parsing is broken and treats the ’ as the end of the password

      • teletext@reddthat.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        Yeah, I’d consider anything less than 20 characters broken. Much too likely that it’s contained in a rainbow table, regardless how many special characters you use. Can I remember many 20 character passwords? No, but my password manager can.

  • Buffalox@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    2 months ago

    It’s actually nice they have underscore. 😀
    Yes because if you choose 8 characters at random, with 25 small + 25 big letters and 10 numeric, it* only 60^8 = 167,961,600,000,000 combinations.
    I think the problem is more if the system allows brute force with thousands of erroneous attempts.
    Then statistically any hacker can attempt several accounts, and ultimately get lucky. But by all means, put the responsibility to the user, users are the experts right!?
    I never got the frantic excessive entropy mindset, when the problem is much simpler to not allow crackers endless attempts. You can allow 50 attempts, and chances would be very slim to guess even pretty moronic passwords.

    What’s even worse is when they REQUIRE big and small and numbers to maximize entropy, they actually make statistically FEWER attempts necessary to brute force it.
    A standard Microsoft introduced in the 90’s, and FUCKING almost everybody is using, despite it’s a 100% moronic requirement.
    Instead just warn against passwords that can be guessed by logic, or can be found in a dictionary.

    • Steve Dice@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      ·
      2 months ago

      Most websites don’t allow multiple failed logins and, even if they did, the network latency alone would make brute force attacks useless. The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes. Having different passwords for every website also protects against this so, as usual, the answer is “just use a password manager”.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        2 months ago

        just use a password manager

        I will never do that, I have a system instead. I never understood why people would want to use a password manager. To me it seems it ads an attack vector, where you could lose EVERYTHING!

        • Steve Dice@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 months ago

          I guarantee your system is less secure than the worst password manager. Humans are inherently bad at choosing passwords, or anything to do with randomness really.

      • Buffalox@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        2 months ago

        The point of having a high entropy password is to protect against hackers brute forcing a leaked database of hashes.

        Seems a bit stupid if a database of passwords or other sensitive information can be brute forced.

  • expatriado@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 months ago

    recently did one that only cared about being very long, so i typed thispasswordisfuckinglong and it took it

  • chuckleslord@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 months ago

    I mean, 63^6 is a lot of possibilities, but just make the password longer to increase its security.

    Blocking out special characters is dumb, but as others have pointed out, they’re probably not sanitizing inputs.