Funny thing at work, I was handling some legacy users - we need to make sure that on the next login, if they have a weak password, they have to change it.

So the whole day I’m typing “123” as a password, 123 123 123 123 all good. So finally I’m done and now I’m testing it, and accidentally I type 1234 instead of just 123. Doesn’t really matter, either is “weak”, so I just click “Login”.

Then goes Chrome, “1234 is known as a weak password, found in breaches, you should change it”.

So TIL 123 is still good.

  • @TootSweet@lemmy.world
    link
    fedilink
    English
    172 months ago

    Where I work, the infra folks are way overworked. Getting them to do things is impossible given their existing todo list. And when you do get them to do something (by throwing managers at them) they half-ass it.

    (I’m not blaming them. I blame the managers. It is frustrating though. Anyway.)

    And as a result, there’s one system that I use frequently that they set up, but cut corners and never hooked it up to our single sign-on solution. And so in order to get into this system, everyone has to use a shared username/password. “readonly:readonly”. And every time I log in, my browser nags me about the known weak password.

  • @spongebue@lemmy.world
    link
    fedilink
    162 months ago

    How does the system know that an already-established password is weak if not in plain text? Or are you saying you have a set of passwords, each of which have gone through the same cipher algorithm, and see if there are any matches?

    • pelya
      link
      fedilink
      112 months ago

      Password strength is usually checked inside your browser, not on the server.

      • @spongebue@lemmy.world
        link
        fedilink
        72 months ago

        When setting it, sure. But if we’re talking about next login, that would imply we’re talking about passwords established in the database/server.

        Then again, you do have that plaintext password available when it’s entered. Rather than checking what’s in the database, you could see what’s in the form that just triggered a successful login. That’s not as scary

        • @hemko@lemmy.dbzer0.com
          link
          fedilink
          English
          22 months ago

          You can have a list of hashes for known weak passwords, and compare it to hashes of the actual passwords stored.

          Or at least that’s how I think it’d work

          • @pivot_root@lemmy.world
            link
            fedilink
            42 months ago

            If the passwords were properly salted, it wouldn’t. But if they’re not salted, helloooooo rainbow tables. Or the world’s greatest crossword puzzle, like that one Adobe accidentally made. Maybe even both!

    • @bamboo@lemmy.blahaj.zone
      link
      fedilink
      English
      252 months ago

      On browser side implementations or extensions, they can see the input into the form field. As for plain text, generally sites will send the plaintext password over HTTPS when logging in, and it’s the server side which hashes/salts, and compares to the value in the DB. Sites can reject or inform users to bad passwords this way, generally when changing the password. Cloudflare does offer a product to do this for sites to add warnings to the user if the credentials were found in a breach. More information on that here: https://blog.cloudflare.com/privacy-preserving-compromised-credential-checking/

    • @Aurenkin@sh.itjust.works
      link
      fedilink
      52 months ago

      You would have the plaintext password at login time based on the users input. I’m guessing that’s why it happens at login time rather than proactively asking people to update their passwords.

  • @dev_null@lemmy.ml
    link
    fedilink
    92 months ago

    My guess would be that the password checking feature has a minimum character limit of 4 characters, to avoid false positives on things that aren’t actually passwords.