• P03 Locke
    link
    fedilink
    English
    3
    edit-2
    11 hours ago

    NIST SP 800-63b already did that several years ago. People just need to follow it.

  • @linearchaos
    link
    English
    391 day ago

    The latest NIST guidelines now state that:

    Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords and
    Verifiers and CSPs SHALL NOT require users to change passwords periodically. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
    
    • @halcyoncmdr
      link
      English
      111 day ago

      Makes sense. Most compromises aren’t brute force attacks. Allow all the characters and any brute force that is attempted will have to assume they’re part of it.

      Removing required periodical changes means people are less likely to use the same password and just increment a number added to the end. A compromised password with a setup like that is still compromised, they can make an educated guess as to what the new number is based on when was compromised compared to now.

    • @[email protected]
      link
      fedilink
      English
      71 day ago

      Please don’t take those recommendations out of context.

      They also recommend MFA, but people only ever bring up the “no rotation” bit.

      • @linearchaos
        link
        English
        420 hours ago

        Emphasis was from the article, not mine.

        They also recommend not using knowledge based prompts, allowing at least 64: characters,

  • @AstridWipenaugh
    link
    English
    181 day ago

    This is the most excited I’ve been about a NIST standard in a good while