I'm in the middle of rewriting some authentification and user managment stuff of a website a friend of mine runs. That site even displays a "password strength meter" in the "Change password" and "Register" dialogs.
But here's where the problem lies. The original developer, thankfully fired for incompetence regarding IT security, thought that any password that holds a "special" character is absolutely secure.
Similar assumptions were made about password storage, a quick eyeballing through the ROT13 "encrypted", flat file "database" revealed the shocking truth. No hashes but plaintext passwords. And most of them could be cracked by my baby sisters without consulting Google. You know, things like "god!" or where the password is the same as the username with a question mark added.
While i managed to fix all of that (using a database, salted password hashes, etc.), i still have a little problem about the password strength calculation.
Since i'm redoing the whole kit and kaboodle anyway, i'd like your suggestions.
BTW, i have read some articles by Bruce Schneier. That guy really goes on and on and on and on about how to make safer, much more complicated passwords and how to protect them. And then he says we should do away with password masking and display them as plain text on the screen (making them easy prey for shoulder surfing). So i'd rather hear from people who, just like me, sometimes get out of their office and have to deal with real people and encounter real life practical problems...
Note: Due to the ongoing security issues, i can't link to the site in question.
In reply to Password strength calculation by cavac
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |