Context is that I had to register for a lot of accounts recently and some of the rules really make no sense.

Not name-and-shaming, but the best one I’ve seen recently is I might have accidentally performed an XSS attack on a career portal using a 40-digit randomly generated password…

  • @[email protected]
    link
    fedilink
    73 months ago

    Facebook got caught having a flat text file being send around between employees to make accessing data easier. That text file contained tens of thousands of peoples username and password.

    Why? Facebook being facebook I guess

  • @[email protected]
    link
    fedilink
    103 months ago

    [offtopic?]

    Debbie’s password is “PlutoGoofyMickeyMinnieDaffyBugsThorLosAngles”

    She was told that the password needed seven characters and a capital.

  • @[email protected]
    link
    fedilink
    323 months ago

    The oddest I’ve ever encountered: EXACTLY 15 characters long. No more, no fewer. 15.

    Honorable mention: Various online accounts where I used my password manager to generate a long, secure password, which the website accepted without warning or error. I was then locked out because their user management system could not handle such long passwords (had to create a second account with a much shorter password to find that out) 🤣

    • @[email protected]
      link
      fedilink
      93 months ago

      A university I worked at had a similar policy to the first one.

      They wanted a single username and sign on across all IT systems but also had some really old legacy systems that didn’t support long passwords.

      So they’d force everyone to use passwords that were exactly as long as the maximum legacy password length.

      For me, the worst system is the Microsoft authenticator which locks me out my account for five minutes if my fingerprint doesn’t match the first time I try.

  • @[email protected]
    link
    fedilink
    8
    edit-2
    3 months ago

    I volunteer at a local high school and the students password is their birthday, because they are given their account at age 5, in kindergarten, and it’s something you can reasonably expect a 5 year old to remember. Also, the students are not allowed to change their password unless they get “hacked”, which is usually just another student logging into their account and deleting their assignments.

    • @[email protected]
      link
      fedilink
      23 months ago

      A school I used to work at had a folder with student passwords for various services at the front of the computer lab. If a student forgot their password for a service, they just went and looked in the folder. Maybe they’d even get their mates’ passwords for them while they were at it!

      I did try to get the policy changed, and offered to teach staff and students how to use a password manager, but apparently remembering a single password was far too complicated, and it would make it much harder if you needed to log in to someone else’s account.

  • qantravon
    link
    fedilink
    English
    83 months ago

    Most absurd was from a job I had in college. This was the password to log into an ancient dumb terminal (literally a monochrome black and green display) on a local-only network that only handled our time clock.

    Requirements:

    • 8 characters exactly
    • You supply the first 4, the system generated the last 4
    • I can’t remember if it allowed numbers, but there were definitely no special characters and I think it was also case-insensitive

    Required to change password every 30 days.

  • @[email protected]
    link
    fedilink
    15
    edit-2
    3 months ago

    By far the worst is the costa rican national bank:

    • Must be between 8 and 16 characters long
    • Must have at least 4 letters and 4 numbers
    • Can’t have consecutively repeated characters (can’t do “aa” but can do “aba”)
    • Can’t have vowels or Ñ
    • Must not be one of your last 6 passwords
    • Must be changed every 90 days
    • Also forgot that their website and app try to block password managers and copy and paste
    • @[email protected]
      link
      fedilink
      63 months ago

      I was reading along like, that’s dumb but at least I could craft something in my password man-… Oh… oh no…

  • Phoenixz
    link
    fedilink
    603 months ago

    Not so much password requirements as just a completely removed implementation:

    To access payment stubs in a data center (not us) that I worked at, the user account was our public email address and the password was a personal code, sorta like SSN, but that code could be easily looked up as it was public info.

    I showed the director of HR, who authorized this her own payment stub as evidence that this was baaaaadddd

    So she asked me to check that system for more issues

    Turns out it stored passwords in blank (wtf) and would authenticate with two queries. First query would check if the username (email) exists. Second query would check if the password exists. If both exists, you’re in! So i could login to any account with MY password…

    This is a tip of a very big iceberg there

    • @[email protected]
      link
      fedilink
      223 months ago

      This has to be the best one here. The sheer lack of understanding of how to authenticate an account by the dev.

      • @[email protected]
        link
        fedilink
        23 months ago

        Sounds like the initial part of password testing, and then they either forgot to complete it, or someone came along to fix the later parts, commented them out for testing and never got around to fixing/uncommenting. Surprising how often things that ‘work’ are set aside and no one is in charge of reviewing.

  • Phoenixz
    link
    fedilink
    23 months ago

    There is such a thing as good unhinged?

    I’m going to need an example here…

  • @[email protected]
    link
    fedilink
    English
    14
    edit-2
    3 months ago

    12 characters, upper/lower/special requirement, and no more than two occurrences of the same character together. That’s FedEx.

    Two other thoughts on the topic:

    • Websites/apps/etc should always list their password requirements on the login page to make it easier to determine what password you used for the site in question.
    • There are plenty of websites where I literally log in only by using the “forgot password” flow because their password requirements are so ridiculous.
  • @[email protected]
    link
    fedilink
    43 months ago

    I’ve encountered a few sites that restricted repeating or sequential characters. Of course told after failing the first creation attempt. Makes things like randomly generated passphrases fun to figure out. Particularly when their idea of “sequential” involves both in alpha/numerical order, but also adjacent spacing on the (assumed?) qwerty keyboard!

  • Dem Bosain
    link
    fedilink
    English
    93 months ago

    I add to make a password last fall that had the requirement “numerals or special characters”. A password with both numerals and special characters wouldn’t work.

  • @[email protected]
    link
    fedilink
    English
    103 months ago

    My favorite is a major credit card company with case-insensitive passwords. They also only allow a small handful of special characters, so the total possible character space is roughly 42 characters. Needless to say, I chose to use a password that was the maximum allowed length (which was sadly also only 32 characters).

  • AwesomeLowlander
    link
    fedilink
    22
    edit-2
    3 months ago

    Stupid bank app doesn’t allow password managers… and if you hit the enter button to login you get an error message informing you that you need to mouse click on the button.

  • @[email protected]
    link
    fedilink
    English
    143 months ago

    A company I used to work for is big enough that everyone reading this has heard of it. They had this wonderful security nightmare going on:

    When you were hired, the company would issue your user credential with a standard password that was “CompanyName1” and require you to immediately change it at first logon. Everyone knew this password because everyone got it when they were hired.

    Password policy required everyone to reset their password every 60 days. Not the worst ever but still pretty aggressive. And with the rise of all the mobile devices connecting with your corp account it was getting to be a worse and worse experience.

    Can you guess yet how these two policies are linked in my story?

    Well, some of the C-Suite executives didn’t have time for any of these security shenanigans. So they would have their executive support person log into an administrative console and reset the exec’s password every 59 days to the same value that it currently had, thereby bypassing the password re-use filter.

    That value they were continuously setting was… “CompanyName1”

    I know of at least two executives that were doing this while I worked there.

    • Cousin Mose
      link
      fedilink
      73 months ago

      When I was in middle and high school the school district would always do this at the beginning of the school year.

      One year my best friend moved away so in the following years I discovered his account still existed. If I was in the mood to hack (dumb stuff like forging email with their horrible SMTP server for example) I’d just find another computer I wasn’t just using and log in using the default password.