![]() |
|
![]() |
| Ran into the same thing with Santander Bank in Poland. I have been online since the 90s never seen that password scheme ever anyplace else. It´s like who comes up with this insane shit. |
![]() |
| Yup.
Here in USA, Citizen's bank, iirc a subsidiary of Royal Bank Of Scotland, has had a bug for years that prevents me from changing my password. The only way to do it is via a series of tech support calls, despite the fact that they've had an open ticket for years. The source of the problem? Can't do it on an account where the email address (not the username) has a less-than-3-character-long name, as in "[email protected]". I own a small company and setup initials for easy-to-use email addresses, and found zero problems anywhere else in the world. But these clowns seem to need "abc@..." to function correctly. I've found bankers tend to not be the brightest bulbs in the box, and this is but one example. |
![]() |
| Well, 16 isn't so bad. Here, in France, BNP accounts must have exactly six digit passwords. They're also incompatible with password managers: you have to click the number on a visual number pad. |
![]() |
| Maybe it's a French law or something.
I've had business and personal accounts with SG, La Banque Postale, BoursoBank and CIC and they all worked with those 6-character "visual number pad" logins. |
![]() |
| To be honest, I'm neither a web dev/designer nor do I have bad sight, so I admit I don't really know how accessibility works. I expect this to be compatible with screen readers somehow, they even say they take this seriously. But from a quick glance at the Accessibility tab in Firefox, I see many complaints about "interactive elements must be labeled".
Obviously, if the computer reads aloud the password as you type it, it's an absolute win for security, and I'm sure some PMs somewhere are quite content with a job well done. For the curious, here's the login page: https://mabanque.bnpparibas/fr/connexion |
![]() |
| I'd bet that some sites had their DB leaked/hacked, and just marked all the current passwords invalid to force a reset. Hopefully, it wast just the hashes that were leaked... |
![]() |
| I had this with Duolingo. Their login fails if the browser can’t connect to recaptcha.net. But it just shows a generic “incorrect username/password” message. |
![]() |
| So far https://studentaid.gov/ is the worst I've come across (I don't want to enter fake info^ and I can't duplicate my account to double check the requirements). From memory it was something like:
1) No words! 2) Can't reuse last 24 passwords 3) Excludes some special characters 4) 5 Security questions 5-10) Several other password requirements Are the security questions case sensitive? Who knows. ^ "I understand that I’ll be required to certify that the information I provide to create an account is true and correct and that I’m the individual I claim to be. If I’m not the person I claim to be, I understand that I’m not authorized to proceed and that I should exit this form now. If I provide false or misleading information, I understand that I might be subject to a fine, prison time, or both." |
![]() |
| > If I provide false or misleading information, I understand that I might be subject to a fine, prison time, or both
Enter your password wrong and you're off to jail? |
![]() |
| Hmm I just made an account two days ago and it told me no words allowed in the own. The email link they sent me to sign up no longer works, so maybe they changed something? |
![]() |
| There are the NIST guidelines on "memorized secrets" (passwords): https://pages.nist.gov/800-63-3/sp800-63b.html#5-authenticat...
> Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). It has much to say on all kinds of other password nonsense: > Verifiers SHOULD permit subscriber-chosen memorized secrets at least 64 characters in length. All printing ASCII [RFC 20] characters as well as the space character SHOULD be acceptable in memorized secrets. Unicode [ISO/ISC 10646] characters SHOULD be accepted as well. > Truncation of the secret SHALL NOT be performed. > Verifiers SHOULD permit claimants to use “paste” functionality when entering a memorized secret. > In order to assist the claimant in successfully entering a memorized secret, the verifier SHOULD offer an option to display the secret — rather than a series of dots or asterisks — until it is entered. |
![]() |
| The bits, I'm assuming a list of about 2k-4k words. The XKCD example is 2k, so 11 bits per word.
The guesses per second, I looked up some hashcat benchmarks to get a rough range. |
![]() |
| Yeah, DevOps is extremely bad with credential caching and refreshes. Sometimes after you elevate privileges, you'll see the privileged UI options and then they'll disappear on next page load. |
![]() |
| > So many data breaches, information disclosures, they are in the news almost daily.
#YesterdayILearned the highly-appropriate phrase "breach fatigue." |
![]() |
| I generate five random words and store them in the comment field of my password manager. It ensures they are at least pronounceable when asked over the phone. |
![]() |
| > Hasn't been best practice for a decade.
This entire thread is about places that clearly have no clue about best practices. > I haven't come across this. You sweet summer child... |
![]() |
| It’s actually worse than that. Given the opportunity to escape, I’m sure many would pay to to allowed to do so.
Entering multi factor hell just to get into Teams is something I’d happily pay to avoid. |
![]() |
| Assuming you use Microsoft Entra ("Azure Active Directory" as was), get your employer to enable the "preview" support for Security Keys. Why is it off by default? Well it's actually secure, and it would never do to provide a feature out of the box that actually works without lots of fiddling about, this is Microsoft, the consultant's friend.
These seem to be relatively current instructions: https://learn.microsoft.com/en-us/entra/identity/authenticat... Having found a friendly sysadmin to do this, ask them to specifically not "Enforce key restrictions" which is theory could let your empoloyer require employees to use a specific issued authenticator credential - are they going to buy every employee an authenticator from a named brand? No? Then this must not be switched on, easy. Once this feature is enabled for you (you may be able to get them to switch it on for the whole org, or maybe for IT or whatever department you work in) you should be able to enrol a new Security Key the same way you'd add other MFA. So why go to all this bother? Because you can buy a Security Key that works how you want, a physical piece of hardware you own and can re-use - if you buy say the Yubico Security Key 2 in USB A, that goes in your USB A port on the laptop or dock and it just stays there. Its job is to be "Something you have" and the "Something you know" will be a PIN of your choosing (it literally doesn't leave your device, so corporate can't decide it should be the Password Game on steroids) No need for a phone or other unrelated device, no opening fiddly apps, no transcribing codes, you type your PIN and touch the sensor. If a PIN is too much, some pricier options take fingerprints, so then you just touch the sensor (with the correct finger) |
![]() |
| I moved the usb-c yubikey in my laptop to my Android phone and was able to login to my m365 calendar/mail/teams there, so it does work, as long as IT supports it. |
![]() |
| Spot on! It was in fact some Azure account I made years ago, in hindsight, it did say to log into the azure portal right in the email. The random UUID instead of salutation threw me off a bit. |
![]() |
| Safari had a similar bug where it would just overwrite your passkey with no warning whatsoever -- completely locking you out of your account. It has since then be fixed but this caused me to lose access to my GitHub
https://bugs.webkit.org/show_bug.cgi?id=270553 Safari still has some bugs where it can't discern between websites hosted on different Subdomains except for hardcoded exceptions and it will override password of one subdomain with the other. Happens to me on a monthly basis. |
![]() |
| This nightmare is why I always backup MFA QR codes and use those to add them to an open source app which let's me backup the data elsewhere too.
Sorry to hear that! |
![]() |
| Switching from Android to iOS for a phone, I found that Microsoft Authenticator officially doesn't support this. You can't backup, you can't transfer. Everything is lost, please start anew. |
![]() |
| > I don't recall seeing a location prompt for Google's services
I don't recall a prompt for Apple's services, either. But you can revoke the permission, at least for some of them. |
![]() |
| When asked to set up TOTP, the first thing I do is scan the QR code with a QR code reader, and save the secret into my password manager, before adding it to my authenticator app. |
![]() |
| However, this does reduce the separation of factors, if that password manager is the same one containing your actual password.
Depending on your threat model this may be an issue. |
![]() |
| You can absolutely scan the QR code with multiple authenticator apps (or copy paste the seed value into them) and they will all produce the same codes in the same order going forward. |
![]() |
| Even for Microsoft accounts, use an alternative app for 2FA/MFA. Recently I switched to the open source Aegis, which allows encrypted backups and does not have the issue described. |
![]() |
| How has MS not fixed this. It seems like the kind of bug that shouldn’t ever happen in the first place (it’s such an obvious flaw) but now that they are aware, it should be priority #1 to fix. |
![]() |
| Yes, when you add one more device between you and your data you are now dependent on it functioning correctly.
Today it's a MS fuckup, but any such system could malfunction. |
![]() |
| I've tried enabling it two times. The first time my phone permanently broke immediately after enabling it. The second time it was stolen. Now I just rely on randomly generated passwords. |
This really rings true. Just think of all the nonsense you have to deal with in the name of "security." Mandatory password change intervals. Insane rules for constructing passwords. Completely undocumented password requirements that you just have to figure out by trial and error. Complicated error messages full of security jargon. "Secret Questions" that you can't remember the answers to. And on the other side of the coin, the security of these systems themselves is like a sieve. So many data breaches, information disclosures, they are in the news almost daily. I often wonder how they get away with it all.