The latest NIST (United States National Institute for Standards and Technology) guidelines on password policies recommend a minimum of 8 characters. Perhaps more interesting is what they recommend against. They recommend against allowing password hints, requiring the password to contain certain characters (like numeric digits or upper-case characters), using knowledge-based authentication (e.g., what is your mother's maiden name?), using SMS (Short Message Service) for two-factor authentication, or expiring passwords after some amount of time. They also provide recommendations on how password data should be stored.
[Ed. Note: Contrary to common practice, I would advocate reading the entire linked article so we can have an informed discussion on the many recommendations in the proposal. What has been your experience with password policies? Do the recommendations rectify problems you have seen? Is it reasonable to expect average users to follow the recommendations? What have they left out?]
(Score: 5, Touché) by MichaelDavidCrawford on Friday August 19 2016, @09:55PM
If I need to join a site that requires a strong password, I enter some random gibberish that I'll never ever remember, then request a password reset every last time I log in.
That cannot possibly be secure.
Yes I Have No Bananas. [gofundme.com]
(Score: 3, Funny) by Scruffy Beard 2 on Saturday August 20 2016, @05:44AM
Been there, done that.
Often, the reset password is not truly random. So if you reset your password, but don't change it, you may suddenly be using a common password.
(Score: 2) by vux984 on Tuesday August 23 2016, @10:30PM
I deal with a client site like that. Most irritating part is that its a site I only need to use once every 3-4 months, but they make users reset their passwords every 30 days, and they auto deactivate the account after 60 days requiring me to jump through some more hoops to reactivate.
So I have to phone them, have them reactivate the account, and then reset the password, pretty much every time I need to log in.