-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Master key regex-based complexity rules violate NIST guidelines #109
Comments
Are you thinking additional checks or more documentation here ? Or external tool integration ? |
Maybe |
Whatever's most convenient for you, but please not to harass users with security theater. In 2020, having password complexity regexes isn't just annoying. It's unprofessional. |
The user doesn't really have to know the password as all the other files can be regenerated, but I think there needs to be a baseline of regexs. |
No, it really, really does NOT need to have this superstitious nonsense. We've known for a very long time that these password rules have zero security benefit, and actually decrease security by harassing users into choosing weak passwords. That is extremely well established, and you need to stop perpetuating it. |
I have added the Thanks ! |
Man this was interesting reading! Love the debate among exceptional minds. |
Thanks!!! |
Describe the bug
As title
To Reproduce
Read the documents, which users will have to do every time they try to set a master key.
Version
All
PostgreSQL
All
libev
All
OpenSSL
All
Access method
All
OS
All
ulimit
Not needed.
Configuration
Can you provide the configuration pgagroal ?
Debug logs
Not needed
Tip
Use actual, as opposed to theatrical, security. According to NIST guidelines, you could suggest ways (
pwgen
, e.g.) to generate high-randomness strings and then have a check that goes to cracklib and/or database of pwned password hashes. "Complexity" patterns simply harass users, and are well known to cracklib and to similar tools.The text was updated successfully, but these errors were encountered: