NIST proposes barring some of the most nonsensical password rules

https://lemmy.world/post/20190319

NIST proposes barring some of the most nonsensical password rules - Lemmy.World

Here is the text of the NIST sp800-63b [https://pages.nist.gov/800-63-4/sp800-63b.html] Digital Identity Guidelines.

Reworded rules for clarity:

  • Min required length must be 8 chars (obligatory), but it should be 15 chars (recommended).
  • Max length should allow at least 64 chars.
  • You should accept all ASCII plus space.
  • You should accept Unicode; if doing so, you must count each code as one char.
  • Don’t demand composition rules (e.g. “u’re password requires a comma! lol lmao haha” tier idiocy)
  • Don’t bug users to change passwords periodically. Only do it if there’s evidence of compromise.
  • Don’t store password hints that others can guess.
  • Don’t prompt the user to use knowledge-based authentication.
  • Don’t truncate passwords for verification.
  • I was expecting idiotic rules screaming “bureaucratic muppets don’t know what they’re legislating on”, but instead what I’m seeing is surprisingly sane and sensible.

    What kind of barbarian puts a space in their password?
    Very common for pass phrases, and not dissuaded. Pass phrases are good for people to remember without using poor storage practices (post it notes, txt file, etc) and are strong enough to keep secure against brute force attacks or just guessing based off knowledge of the user.
    On one hand, that’s true. On the other hand, a person should only need exactly one passphrase, which is the one used to unlock their password manager. Every other password should be randomly-generated and would only contain space characters by chance.
    That’s great in theory, but you’ll have passwords for logging into OSes too which password managers do not help with and you better have it memorized or you’re going to have a bad time.