in reply to Re^2: Password strength calculation
in thread Password strength calculation
I think you're worrying about the wrong kind of attacks
I'm not worrying about anything. There is no such thing as "the wrong kind of attack". People being people, will reuse the same passwords for different sites.
So, you hack a few "low risk" sites, grab a few thousand userid/password combos and then try them on your real target.
Technically rejecting anything under 6 characters or so also does nothing else but reduce the number of possibilities but that's just the possibilities that will usually be tried first anyway
If I know your site doesn't accept passwords of less that 6 characters, that is somewhere between 782,757,789,696 and 308,915,776 permutations , depending upon what other silly restrictions you have in-place, that I don't have to try. Why make my life easy?
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: Password strength calculation
by mbethke (Hermit) on Jan 20, 2012 at 21:49 UTC | |
by BrowserUk (Patriarch) on Jan 20, 2012 at 22:26 UTC | |
by mbethke (Hermit) on Jan 21, 2012 at 01:54 UTC | |
by BrowserUk (Patriarch) on Jan 21, 2012 at 02:39 UTC | |
by mbethke (Hermit) on Jan 21, 2012 at 05:23 UTC | |
| |
by stonecolddevin (Parson) on Jan 25, 2012 at 17:42 UTC | |
|