websecurity@lists.webappsec.org

The Web Security Mailing List

View all threads

Max size of a password

G
Gautam
Fri, May 20, 2011 3:23 PM

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7 characters
and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256 if
at all you want to make any  limits. I know people use automated tools for
pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform offline
attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will my
above point make any difference if the original pwd is 7 characters or 14 or
larger.
-  I also wanted to know any pointers on documents that industry
refers for password best practices. Working with industry baseline is easy
for me.

Appreciate your help

Thanks,
Gautam.

Hi, I was recently reviewing a internal document and noticed that the the requirement for password mentioned that it should be minimum 7 characters and maximum 14 characters. While i was ok with the minimum, I was not ok with maximum 14 since I believe that we should not put a restriction on the maximum and user can stretch it as per their comfort. I suggested that you can have it as 256 if at all you want to make any limits. I know people use automated tools for pwd generation and management these days and larger (complex) passwords would always add more work factor in case anyone got it to perform offline attack. I want to know from you experts, - Since whatever goes will be hashed to SHA-256 (Salted) will my above point make any difference if the original pwd is 7 characters or 14 or larger. - I also wanted to know any pointers on documents that industry refers for password best practices. Working with industry baseline is easy for me. Appreciate your help Thanks, Gautam.
AJ
Arian J. Evans
Fri, May 20, 2011 7:13 PM

I would not specify max password unless you find you have a need to.

The only two possible reasons I can come up with that might be
legitimate reasons for Max(value) definition are:

  • legacy system compatibility
  • early studies showed users are more likely to write down passwords
    over a certain length and keep them on monitor/under keyboard

Regarding legacy system compatibility: once people started gluing
together modern OS/2 and Banyan Vines systems, err wait, Windows with
mainframes and web apps and all that, they would write some darn
kludgy code to provide SSO-like features. So it would be possible to
set a max size password on the more modern system (or unified web UI)
larger than the legacy systems would support. If error handling were
suboptimal, you'd wind up a with a truncated password on certain
systems and you wouldn't know what it was truncated too
so.....basically the user just couldn't log it to certain systems or
use parts of the unified app. So you'd set the max at the max of the
most limited legacy system. Ah, the memories of glue code developers.

Finally - using Occam's Razor you could just assume it is an artifact
of the disease known as Policy Wonk Myopia. This is a common
psychological condition that affects those who spend too high of a
percentage of their time writing information security and governance
policies. You can spot these folks pretty easily, they usually wind up
speaking in a monotone like Charles Cresson Wood.


Arian Evans
Perpetuating Pragmatic Practicable Policies

On Fri, May 20, 2011 at 8:23 AM, Gautam itsecanalyst@gmail.com wrote:

Hi,

I was recently reviewing a internal document and noticed that the the requirement for password mentioned that it should be minimum 7 characters and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I believe that we should not put a restriction on the maximum and user can stretch it as per their comfort. I suggested that you can have it as 256 if at all you want to make any  limits. I know people use automated tools for pwd generation and management these days and larger (complex) passwords would always add more work factor in case anyone got it to perform offline attack.

I want to know from you experts,
         -  Since whatever goes will be hashed to SHA-256 (Salted) will my above point make any difference if the original pwd is 7 characters or 14 or larger.
         -  I also wanted to know any pointers on documents that industry refers for password best practices. Working with industry baseline is easy for me.

Appreciate your help

Thanks,
Gautam.


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.org
http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org

I would not specify max password unless you find you have a need to. The only two possible reasons I can come up with that might be legitimate reasons for Max(value) definition are: + legacy system compatibility + early studies showed users are more likely to write down passwords over a certain length and keep them on monitor/under keyboard Regarding legacy system compatibility: once people started gluing together modern OS/2 and Banyan Vines systems, err wait, Windows with mainframes and web apps and all that, they would write some darn kludgy code to provide SSO-like features. So it would be possible to set a max size password on the more modern system (or unified web UI) larger than the legacy systems would support. If error handling were suboptimal, you'd wind up a with a truncated password on certain systems and you wouldn't know what it was truncated too so.....basically the user just couldn't log it to certain systems or use parts of the unified app. So you'd set the max at the max of the most limited legacy system. Ah, the memories of glue code developers. Finally - using Occam's Razor you could just assume it is an artifact of the disease known as Policy Wonk Myopia. This is a common psychological condition that affects those who spend too high of a percentage of their time writing information security and governance policies. You can spot these folks pretty easily, they usually wind up speaking in a monotone like Charles Cresson Wood. --- Arian Evans Perpetuating Pragmatic Practicable Policies On Fri, May 20, 2011 at 8:23 AM, Gautam <itsecanalyst@gmail.com> wrote: > > Hi, > > I was recently reviewing a internal document and noticed that the the requirement for password mentioned that it should be minimum 7 characters and maximum 14 characters. > > While i was ok with the minimum, I was not ok with maximum 14 since I believe that we should not put a restriction on the maximum and user can stretch it as per their comfort. I suggested that you can have it as 256 if at all you want to make any  limits. I know people use automated tools for pwd generation and management these days and larger (complex) passwords would always add more work factor in case anyone got it to perform offline attack. > > I want to know from you experts, >          -  Since whatever goes will be hashed to SHA-256 (Salted) will my above point make any difference if the original pwd is 7 characters or 14 or larger. >          -  I also wanted to know any pointers on documents that industry refers for password best practices. Working with industry baseline is easy for me. > > Appreciate your help > > Thanks, > Gautam. > > > > > > _______________________________________________ > The Web Security Mailing List > > WebSecurity RSS Feed > http://www.webappsec.org/rss/websecurity.rss > > Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > > WASC on Twitter > http://twitter.com/wascupdates > > websecurity@lists.webappsec.org > http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org >
PM
Paul McMillan
Fri, May 20, 2011 7:14 PM

Those requirements tend (in my experience) to have survived via
copy-pasta from ancient systems which did store the password in
plaintext, and thus had real length limits based in the database. Each
new iteration of the system has someone who looks at the requirement
and says "hmmm... I guess there's probably a good security reason for
it to be that way, I'm not going to stick my neck out and change it".
At this point, these things should allow long characters, with a
practical length limit dictated by other limitations (maybe your
server doesn't accept POST requests over 4k, or maybe you just don't
want to hash something that large).

-Paul

On Fri, May 20, 2011 at 8:23 AM, Gautam itsecanalyst@gmail.com wrote:

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7 characters
and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256 if
at all you want to make any  limits. I know people use automated tools for
pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform offline
attack.

I want to know from you experts,
         -  Since whatever goes will be hashed to SHA-256 (Salted) will my
above point make any difference if the original pwd is 7 characters or 14 or
larger.
         -  I also wanted to know any pointers on documents that industry
refers for password best practices. Working with industry baseline is easy
for me.

Appreciate your help

Thanks,
Gautam.


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.org
http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org

Those requirements tend (in my experience) to have survived via copy-pasta from ancient systems which did store the password in plaintext, and thus had real length limits based in the database. Each new iteration of the system has someone who looks at the requirement and says "hmmm... I guess there's probably a good security reason for it to be that way, I'm not going to stick my neck out and change it". At this point, these things should allow long characters, with a practical length limit dictated by other limitations (maybe your server doesn't accept POST requests over 4k, or maybe you just don't want to hash something that large). -Paul On Fri, May 20, 2011 at 8:23 AM, Gautam <itsecanalyst@gmail.com> wrote: > Hi, > > I was recently reviewing a internal document and noticed that the the > requirement for password mentioned that it should be minimum 7 characters > and maximum 14 characters. > > While i was ok with the minimum, I was not ok with maximum 14 since I > believe that we should not put a restriction on the maximum and user can > stretch it as per their comfort. I suggested that you can have it as 256 if > at all you want to make any  limits. I know people use automated tools for > pwd generation and management these days and larger (complex) passwords > would always add more work factor in case anyone got it to perform offline > attack. > > I want to know from you experts, >          -  Since whatever goes will be hashed to SHA-256 (Salted) will my > above point make any difference if the original pwd is 7 characters or 14 or > larger. >          -  I also wanted to know any pointers on documents that industry > refers for password best practices. Working with industry baseline is easy > for me. > > Appreciate your help > > Thanks, > Gautam. > > > > > > _______________________________________________ > The Web Security Mailing List > > WebSecurity RSS Feed > http://www.webappsec.org/rss/websecurity.rss > > Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > > WASC on Twitter > http://twitter.com/wascupdates > > websecurity@lists.webappsec.org > http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org > >
G
Gautam
Fri, May 20, 2011 10:37 PM

Thank You for the information. I agree to your comments.

On Fri, May 20, 2011 at 11:14 AM, Paul McMillan paul@mcmillan.ws wrote:

Those requirements tend (in my experience) to have survived via
copy-pasta from ancient systems which did store the password in
plaintext, and thus had real length limits based in the database. Each
new iteration of the system has someone who looks at the requirement
and says "hmmm... I guess there's probably a good security reason for
it to be that way, I'm not going to stick my neck out and change it".
At this point, these things should allow long characters, with a
practical length limit dictated by other limitations (maybe your
server doesn't accept POST requests over 4k, or maybe you just don't
want to hash something that large).

-Paul

On Fri, May 20, 2011 at 8:23 AM, Gautam itsecanalyst@gmail.com wrote:

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7 characters
and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256

if

at all you want to make any  limits. I know people use automated tools

for

pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform

offline

attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will

my

above point make any difference if the original pwd is 7 characters or 14

or

larger.
-  I also wanted to know any pointers on documents that industry
refers for password best practices. Working with industry baseline is

easy

for me.

Appreciate your help

Thanks,
Gautam.


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.org

--

Regards,

Gautam

Thank You for the information. I agree to your comments. On Fri, May 20, 2011 at 11:14 AM, Paul McMillan <paul@mcmillan.ws> wrote: > Those requirements tend (in my experience) to have survived via > copy-pasta from ancient systems which did store the password in > plaintext, and thus had real length limits based in the database. Each > new iteration of the system has someone who looks at the requirement > and says "hmmm... I guess there's probably a good security reason for > it to be that way, I'm not going to stick my neck out and change it". > At this point, these things should allow long characters, with a > practical length limit dictated by other limitations (maybe your > server doesn't accept POST requests over 4k, or maybe you just don't > want to hash something that large). > > -Paul > > On Fri, May 20, 2011 at 8:23 AM, Gautam <itsecanalyst@gmail.com> wrote: > > Hi, > > > > I was recently reviewing a internal document and noticed that the the > > requirement for password mentioned that it should be minimum 7 characters > > and maximum 14 characters. > > > > While i was ok with the minimum, I was not ok with maximum 14 since I > > believe that we should not put a restriction on the maximum and user can > > stretch it as per their comfort. I suggested that you can have it as 256 > if > > at all you want to make any limits. I know people use automated tools > for > > pwd generation and management these days and larger (complex) passwords > > would always add more work factor in case anyone got it to perform > offline > > attack. > > > > I want to know from you experts, > > - Since whatever goes will be hashed to SHA-256 (Salted) will > my > > above point make any difference if the original pwd is 7 characters or 14 > or > > larger. > > - I also wanted to know any pointers on documents that industry > > refers for password best practices. Working with industry baseline is > easy > > for me. > > > > Appreciate your help > > > > Thanks, > > Gautam. > > > > > > > > > > > > _______________________________________________ > > The Web Security Mailing List > > > > WebSecurity RSS Feed > > http://www.webappsec.org/rss/websecurity.rss > > > > Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > > > > WASC on Twitter > > http://twitter.com/wascupdates > > > > websecurity@lists.webappsec.org > > > http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org > > > > > > _______________________________________________ > The Web Security Mailing List > > WebSecurity RSS Feed > http://www.webappsec.org/rss/websecurity.rss > > Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > > WASC on Twitter > http://twitter.com/wascupdates > > websecurity@lists.webappsec.org > http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org > -- Regards, Gautam
H
harry@woodward-clarke.com
Fri, May 20, 2011 10:58 PM

G'day,

As implied by a couple of other posts, there were systems with 14
character limit to passwords. Typically early WindowsNT (3 and 4) systems.
With the kernel re-write for V5 (win2k and greater) this limitation was
removed - well, increased to 127 chars, and may possibly be even larger in
the V6 kernel (2k8/vista and greater).

I recall hitting this 'limit' integrating OpenVMS systems and WinNT
systems. VMS allowed long, really long passwords, but we had to restrict
them to 14 characters for interoperability with NT. This did not sit well
with the paranoid among us :)

Ah... memories...

So, the long-and-short is, if you _still_have some of the legacy systems
(either physical, virtual or emulated - e.g. Samba 2 as PDC) then this
restriction will have to stay, but if you're in the 21st Century, this
restriction can be dropped - or rather, bumped up to "127 characters".

hth,

.h

On Fri, 20 May 2011 08:23:21 -0700, Gautam itsecanalyst@gmail.com wrote:

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7

characters

and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256

if

at all you want to make any  limits. I know people use automated tools

for

pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform

offline

attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will

my

above point make any difference if the original pwd is 7 characters or

14

or
larger.
-  I also wanted to know any pointers on documents that

industry

refers for password best practices. Working with industry baseline is

easy

for me.

Appreciate your help

Thanks,
Gautam.

G'day, As implied by a couple of other posts, there were systems with 14 character limit to passwords. Typically early WindowsNT (3 and 4) systems. With the kernel re-write for V5 (win2k and greater) this limitation was removed - well, increased to 127 chars, and may possibly be even larger in the V6 kernel (2k8/vista and greater). I recall hitting this 'limit' integrating OpenVMS systems and WinNT systems. VMS allowed long, _really_ long passwords, but we had to restrict them to 14 characters for interoperability with NT. This did not sit well with the paranoid among us :) Ah... memories... So, the long-and-short is, if you _still_have some of the legacy systems (either physical, virtual or emulated - e.g. Samba 2 as PDC) then this restriction will have to stay, but if you're in the 21st Century, this restriction can be dropped - or rather, bumped up to "127 characters". hth, .h On Fri, 20 May 2011 08:23:21 -0700, Gautam <itsecanalyst@gmail.com> wrote: > Hi, > > I was recently reviewing a internal document and noticed that the the > requirement for password mentioned that it should be minimum 7 characters > and maximum 14 characters. > > While i was ok with the minimum, I was not ok with maximum 14 since I > believe that we should not put a restriction on the maximum and user can > stretch it as per their comfort. I suggested that you can have it as 256 if > at all you want to make any limits. I know people use automated tools for > pwd generation and management these days and larger (complex) passwords > would always add more work factor in case anyone got it to perform offline > attack. > > I want to know from you experts, > - Since whatever goes will be hashed to SHA-256 (Salted) will my > above point make any difference if the original pwd is 7 characters or 14 > or > larger. > - I also wanted to know any pointers on documents that industry > refers for password best practices. Working with industry baseline is easy > for me. > > Appreciate your help > > Thanks, > Gautam.
G
Gautam
Sat, May 21, 2011 1:16 AM

This is a web application so I think 128 should be the limit if at all there
is a need.

Thanks for the reply and pointers.

On Fri, May 20, 2011 at 3:58 PM, harry@woodward-clarke.com wrote:

G'day,

As implied by a couple of other posts, there were systems with 14
character limit to passwords. Typically early WindowsNT (3 and 4) systems.
With the kernel re-write for V5 (win2k and greater) this limitation was
removed - well, increased to 127 chars, and may possibly be even larger in
the V6 kernel (2k8/vista and greater).

I recall hitting this 'limit' integrating OpenVMS systems and WinNT
systems. VMS allowed long, really long passwords, but we had to restrict
them to 14 characters for interoperability with NT. This did not sit well
with the paranoid among us :)

Ah... memories...

So, the long-and-short is, if you _still_have some of the legacy systems
(either physical, virtual or emulated - e.g. Samba 2 as PDC) then this
restriction will have to stay, but if you're in the 21st Century, this
restriction can be dropped - or rather, bumped up to "127 characters".

hth,

.h

On Fri, 20 May 2011 08:23:21 -0700, Gautam itsecanalyst@gmail.com wrote:

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7

characters

and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256

if

at all you want to make any  limits. I know people use automated tools

for

pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform

offline

attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will

my

above point make any difference if the original pwd is 7 characters or

14

or
larger.
-  I also wanted to know any pointers on documents that

industry

refers for password best practices. Working with industry baseline is

easy

for me.

Appreciate your help

Thanks,
Gautam.

This is a web application so I think 128 should be the limit if at all there is a need. Thanks for the reply and pointers. On Fri, May 20, 2011 at 3:58 PM, <harry@woodward-clarke.com> wrote: > G'day, > > As implied by a couple of other posts, there were systems with 14 > character limit to passwords. Typically early WindowsNT (3 and 4) systems. > With the kernel re-write for V5 (win2k and greater) this limitation was > removed - well, increased to 127 chars, and may possibly be even larger in > the V6 kernel (2k8/vista and greater). > > I recall hitting this 'limit' integrating OpenVMS systems and WinNT > systems. VMS allowed long, _really_ long passwords, but we had to restrict > them to 14 characters for interoperability with NT. This did not sit well > with the paranoid among us :) > > Ah... memories... > > So, the long-and-short is, if you _still_have some of the legacy systems > (either physical, virtual or emulated - e.g. Samba 2 as PDC) then this > restriction will have to stay, but if you're in the 21st Century, this > restriction can be dropped - or rather, bumped up to "127 characters". > > hth, > > .h > > On Fri, 20 May 2011 08:23:21 -0700, Gautam <itsecanalyst@gmail.com> wrote: > > Hi, > > > > I was recently reviewing a internal document and noticed that the the > > requirement for password mentioned that it should be minimum 7 > characters > > and maximum 14 characters. > > > > While i was ok with the minimum, I was not ok with maximum 14 since I > > believe that we should not put a restriction on the maximum and user can > > stretch it as per their comfort. I suggested that you can have it as 256 > if > > at all you want to make any limits. I know people use automated tools > for > > pwd generation and management these days and larger (complex) passwords > > would always add more work factor in case anyone got it to perform > offline > > attack. > > > > I want to know from you experts, > > - Since whatever goes will be hashed to SHA-256 (Salted) will > my > > above point make any difference if the original pwd is 7 characters or > 14 > > or > > larger. > > - I also wanted to know any pointers on documents that > industry > > refers for password best practices. Working with industry baseline is > easy > > for me. > > > > Appreciate your help > > > > Thanks, > > Gautam. >
RP
Rohit Pitke
Sat, May 21, 2011 10:36 AM

As others have pointed out, setting max size is content dependent as if you have
set a threshold for max-length, then you need to impose that. Also, certain
legacy system might trouble you in this regard.

So it is much context-specific. Along with length, one needs to design "quality"
of password too. That is , what characters are allowed, special characters,
compulsion of alpha-numeric etc. That would come with some stipulated minimum
length, say 7-8 and above criteria to make it "strong". In any case, strong
password expiration policy, lockout enabling and secure policy to deliver
"forget password" request needs to be analyzed also.

Best,
Rohit


From: Gautam itsecanalyst@gmail.com
To: harry@woodward-clarke.com
Cc: websecurity@webappsec.org
Sent: Sat, May 21, 2011 6:46:02 AM
Subject: Re: [WEB SECURITY] Max size of a password

This is a web application so I think 128 should be the limit if at all there is
a need.

Thanks for the reply and pointers.

On Fri, May 20, 2011 at 3:58 PM, harry@woodward-clarke.com wrote:

G'day,

As implied by a couple of other posts, there were systems with 14
character limit to passwords. Typically early WindowsNT (3 and 4) systems.
With the kernel re-write for V5 (win2k and greater) this limitation was
removed - well, increased to 127 chars, and may possibly be even larger in
the V6 kernel (2k8/vista and greater).

I recall hitting this 'limit' integrating OpenVMS systems and WinNT
systems. VMS allowed long, really long passwords, but we had to restrict
them to 14 characters for interoperability with NT. This did not sit well
with the paranoid among us :)

Ah... memories...

So, the long-and-short is, if you _still_have some of the legacy systems
(either physical, virtual or emulated - e.g. Samba 2 as PDC) then this
restriction will have to stay, but if you're in the 21st Century, this
restriction can be dropped - or rather, bumped up to "127 characters".

hth,

.h

On Fri, 20 May 2011 08:23:21 -0700, Gautam itsecanalyst@gmail.com wrote:

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7

characters

and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256

if

at all you want to make any  limits. I know people use automated tools

for

pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform

offline

attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will

my

above point make any difference if the original pwd is 7 characters or

14

or
larger.
-  I also wanted to know any pointers on documents that

industry

refers for password best practices. Working with industry baseline is

easy

for me.

Appreciate your help

Thanks,
Gautam.

As others have pointed out, setting max size is content dependent as if you have set a threshold for max-length, then you need to impose that. Also, certain legacy system might trouble you in this regard. So it is much context-specific. Along with length, one needs to design "quality" of password too. That is , what characters are allowed, special characters, compulsion of alpha-numeric etc. That would come with some stipulated minimum length, say 7-8 and above criteria to make it "strong". In any case, strong password expiration policy, lockout enabling and secure policy to deliver "forget password" request needs to be analyzed also. Best, Rohit ________________________________ From: Gautam <itsecanalyst@gmail.com> To: harry@woodward-clarke.com Cc: websecurity@webappsec.org Sent: Sat, May 21, 2011 6:46:02 AM Subject: Re: [WEB SECURITY] Max size of a password This is a web application so I think 128 should be the limit if at all there is a need. Thanks for the reply and pointers. On Fri, May 20, 2011 at 3:58 PM, <harry@woodward-clarke.com> wrote: G'day, > >As implied by a couple of other posts, there were systems with 14 >character limit to passwords. Typically early WindowsNT (3 and 4) systems. >With the kernel re-write for V5 (win2k and greater) this limitation was >removed - well, increased to 127 chars, and may possibly be even larger in >the V6 kernel (2k8/vista and greater). > >I recall hitting this 'limit' integrating OpenVMS systems and WinNT >systems. VMS allowed long, _really_ long passwords, but we had to restrict >them to 14 characters for interoperability with NT. This did not sit well >with the paranoid among us :) > >Ah... memories... > >So, the long-and-short is, if you _still_have some of the legacy systems >(either physical, virtual or emulated - e.g. Samba 2 as PDC) then this >restriction will have to stay, but if you're in the 21st Century, this >restriction can be dropped - or rather, bumped up to "127 characters". > >hth, > >.h > > >On Fri, 20 May 2011 08:23:21 -0700, Gautam <itsecanalyst@gmail.com> wrote: >> Hi, >> >> I was recently reviewing a internal document and noticed that the the >> requirement for password mentioned that it should be minimum 7 >characters >> and maximum 14 characters. >> >> While i was ok with the minimum, I was not ok with maximum 14 since I >> believe that we should not put a restriction on the maximum and user can >> stretch it as per their comfort. I suggested that you can have it as 256 >if >> at all you want to make any limits. I know people use automated tools >for >> pwd generation and management these days and larger (complex) passwords >> would always add more work factor in case anyone got it to perform >offline >> attack. >> >> I want to know from you experts, >> - Since whatever goes will be hashed to SHA-256 (Salted) will >my >> above point make any difference if the original pwd is 7 characters or >14 >> or >> larger. >> - I also wanted to know any pointers on documents that >industry >> refers for password best practices. Working with industry baseline is >easy >> for me. >> >> Appreciate your help >> >> Thanks, >> Gautam. >
PL
Pavol Luptak
Sat, May 21, 2011 1:39 PM

Hello,

On Fri, May 20, 2011 at 08:23:21AM -0700, Gautam wrote:

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7 characters
and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can

Believe or not, but few months ago I had some problems with accessing to my
Internet banking (one new Slovak bank). It took me a lot of calls/emails to
their support center and after many weeks they finally found out where is the
problem - I set too long password (about 14-15 characters) and they simply do
not support such long passwords :-)

WTF? Is this possible in Internet banking environment? :)

Pavol


[Pavol Luptak, Nethemba s.r.o.] [http://www.nethemba.com] [tel: +421905400542]

Hello, On Fri, May 20, 2011 at 08:23:21AM -0700, Gautam wrote: > > I was recently reviewing a internal document and noticed that the the > requirement for password mentioned that it should be minimum 7 characters > and maximum 14 characters. > > While i was ok with the minimum, I was not ok with maximum 14 since I > believe that we should not put a restriction on the maximum and user can Believe or not, but few months ago I had some problems with accessing to my Internet banking (one new Slovak bank). It took me a lot of calls/emails to their support center and after many weeks they finally found out where is the problem - I set too long password (about 14-15 characters) and they simply do not support such long passwords :-) WTF? Is this possible in Internet banking environment? :) Pavol -- ______________________________________________________________________________ [Pavol Luptak, Nethemba s.r.o.] [http://www.nethemba.com] [tel: +421905400542]
M
MustLive
Sat, May 21, 2011 8:52 PM

Hello Gautam!

My recommendations concerning minimum and maximum password's length are the
next:

  • minimum - 8 characters,
  • maximum - no limits (but you can add limits depending on hardware
    restrictions).

I haven't heard about industry's password best practices, but from 2005 in
my own security manual I was recommending above-mentioned 8 characters
minimum length (and with time it's needed to revise this limit).

in case anyone got it to perform offline attack.

Not only offline, but online attacks are possible. And in case if Brute
Force vulnerability will be in your system and nothing will be made to
prevent such attacks, then only strong passwords will be the last barrier
before attackers.

So take into account my recommended minimum length of password. Because too
short passwords can be not only easily picked up at offline attack, but
also at online attack.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

----- Original Message -----
From: Gautam
To: websecurity@webappsec.org
Cc: MustLive
Sent: Friday, May 20, 2011 6:23 PM
Subject: Max size of a password

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7 characters
and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256 if
at all you want to make any  limits. I know people use automated tools for
pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform offline
attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will my
above point make any difference if the original pwd is 7 characters or 14 or
larger.
-  I also wanted to know any pointers on documents that industry
refers for password best practices. Working with industry baseline is easy
for me.

Appreciate your help

Thanks,
Gautam.

Hello Gautam! My recommendations concerning minimum and maximum password's length are the next: - minimum - 8 characters, - maximum - no limits (but you can add limits depending on hardware restrictions). I haven't heard about industry's password best practices, but from 2005 in my own security manual I was recommending above-mentioned 8 characters minimum length (and with time it's needed to revise this limit). > in case anyone got it to perform offline attack. Not only offline, but online attacks are possible. And in case if Brute Force vulnerability will be in your system and nothing will be made to prevent such attacks, then only strong passwords will be the last barrier before attackers. So take into account my recommended minimum length of password. Because too short passwords can be not only easily picked up at offline attack, but also at online attack. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua ----- Original Message ----- From: Gautam To: websecurity@webappsec.org Cc: MustLive Sent: Friday, May 20, 2011 6:23 PM Subject: Max size of a password Hi, I was recently reviewing a internal document and noticed that the the requirement for password mentioned that it should be minimum 7 characters and maximum 14 characters. While i was ok with the minimum, I was not ok with maximum 14 since I believe that we should not put a restriction on the maximum and user can stretch it as per their comfort. I suggested that you can have it as 256 if at all you want to make any limits. I know people use automated tools for pwd generation and management these days and larger (complex) passwords would always add more work factor in case anyone got it to perform offline attack. I want to know from you experts, - Since whatever goes will be hashed to SHA-256 (Salted) will my above point make any difference if the original pwd is 7 characters or 14 or larger. - I also wanted to know any pointers on documents that industry refers for password best practices. Working with industry baseline is easy for me. Appreciate your help Thanks, Gautam.
G
Gautam
Sat, May 21, 2011 10:33 PM

Thanks everyone for writing, MustLive i have expressed my opinion on mimimum
limit and No maximum limit.

However while i wrote this post to this forum I was thinking in backend
about how this impacts hashing results and the length.

As we all know storing just pain-text passwords would be the biggest blunder
that anyone could do, so I recommend doing at least Salted-SHA versions.

Now my delima is

SHA256(AAA)  = some 256 bit hash

now

SHA256(AAABB) = is also 256 bit hash

so with this reasoning will it make sense if i say no limit or just a
reasonable limit of 14 character since the result is always going to be
128bit text be it 8 characters or 14 characters.

Let me know your views.

Thanks,
Gautam

On Sat, May 21, 2011 at 1:52 PM, MustLive mustlive@websecurity.com.uawrote:

Hello Gautam!

My recommendations concerning minimum and maximum password's length are the
next:

  • minimum - 8 characters,
  • maximum - no limits (but you can add limits depending on hardware
    restrictions).

I haven't heard about industry's password best practices, but from 2005 in
my own security manual I was recommending above-mentioned 8 characters
minimum length (and with time it's needed to revise this limit).

in case anyone got it to perform offline attack.

Not only offline, but online attacks are possible. And in case if Brute
Force vulnerability will be in your system and nothing will be made to
prevent such attacks, then only strong passwords will be the last barrier
before attackers.

So take into account my recommended minimum length of password. Because too
short passwords can be not only easily picked up at offline attack, but
also at online attack.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

----- Original Message ----- From: Gautam
To: websecurity@webappsec.org
Cc: MustLive
Sent: Friday, May 20, 2011 6:23 PM
Subject: Max size of a password

Hi,

I was recently reviewing a internal document and noticed that the the
requirement for password mentioned that it should be minimum 7 characters
and maximum 14 characters.

While i was ok with the minimum, I was not ok with maximum 14 since I
believe that we should not put a restriction on the maximum and user can
stretch it as per their comfort. I suggested that you can have it as 256 if
at all you want to make any  limits. I know people use automated tools for
pwd generation and management these days and larger (complex) passwords
would always add more work factor in case anyone got it to perform offline
attack.

I want to know from you experts,
-  Since whatever goes will be hashed to SHA-256 (Salted) will my
above point make any difference if the original pwd is 7 characters or 14
or
larger.
-  I also wanted to know any pointers on documents that industry
refers for password best practices. Working with industry baseline is easy
for me.

Appreciate your help

Thanks,
Gautam.

Thanks everyone for writing, MustLive i have expressed my opinion on mimimum limit and No maximum limit. However while i wrote this post to this forum I was thinking in backend about how this impacts hashing results and the length. As we all know storing just pain-text passwords would be the biggest blunder that anyone could do, so I recommend doing at least Salted-SHA versions. Now my delima is SHA256(*AAA*) = some 256 bit hash now SHA256(*AAABB*) = is also 256 bit hash so with this reasoning will it make sense if i say no limit or just a reasonable limit of 14 character since the result is always going to be 128bit text be it 8 characters or 14 characters. Let me know your views. Thanks, Gautam On Sat, May 21, 2011 at 1:52 PM, MustLive <mustlive@websecurity.com.ua>wrote: > Hello Gautam! > > My recommendations concerning minimum and maximum password's length are the > next: > > - minimum - 8 characters, > - maximum - no limits (but you can add limits depending on hardware > restrictions). > > I haven't heard about industry's password best practices, but from 2005 in > my own security manual I was recommending above-mentioned 8 characters > minimum length (and with time it's needed to revise this limit). > > > in case anyone got it to perform offline attack. >> > > Not only offline, but online attacks are possible. And in case if Brute > Force vulnerability will be in your system and nothing will be made to > prevent such attacks, then only strong passwords will be the last barrier > before attackers. > > So take into account my recommended minimum length of password. Because too > short passwords can be not only easily picked up at offline attack, but > also at online attack. > > Best wishes & regards, > MustLive > Administrator of Websecurity web site > http://websecurity.com.ua > > ----- Original Message ----- From: Gautam > To: websecurity@webappsec.org > Cc: MustLive > Sent: Friday, May 20, 2011 6:23 PM > Subject: Max size of a password > > > > Hi, > > I was recently reviewing a internal document and noticed that the the > requirement for password mentioned that it should be minimum 7 characters > and maximum 14 characters. > > While i was ok with the minimum, I was not ok with maximum 14 since I > believe that we should not put a restriction on the maximum and user can > stretch it as per their comfort. I suggested that you can have it as 256 if > at all you want to make any limits. I know people use automated tools for > pwd generation and management these days and larger (complex) passwords > would always add more work factor in case anyone got it to perform offline > attack. > > I want to know from you experts, > - Since whatever goes will be hashed to SHA-256 (Salted) will my > above point make any difference if the original pwd is 7 characters or 14 > or > larger. > - I also wanted to know any pointers on documents that industry > refers for password best practices. Working with industry baseline is easy > for me. > > Appreciate your help > > Thanks, > Gautam. > > >