-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increase entropy required for a "good" rating to 75. #8523
Increase entropy required for a "good" rating to 75. #8523
Conversation
I agree, conflating score and entropy is not good behind the scenes. We should give points for the rating scale (-2, -1, 0, 1, 2) something like that. Then proceed with the rest of the scoring process at that scale level. I didn't realize we also reduce score for expiring passwords, that should be a separate presentation to the user. A date does not make a password bad. |
Also, right now password reuse decreases score (which starts initialized to the entropy) linearly (by "15" for each reuse). I see the motivation behind doing this: the probability of a password leak increases linearly with the number of sites it's used for. Also, better password are less likely to be cracked, hence the initialization. Still, i think that this is pretty arbitrary. I think we have the following options:
What about expired passwords? Should we mark them as bad in the health check? |
It is hard to make a metric for such varied reasons for "bad". An expired password is not inherently bad, it's a potentially good password with metadata saying it needs to be changed. The purpose of the score is to show on the reports view. I think it would be far better to show the general entropy rating and icons for each metadata attribute: reuse, expiring/expired, etc. |
Codecov ReportBase: 64.41% // Head: 64.43% // Increases project coverage by
Additional details and impacted files@@ Coverage Diff @@
## develop #8523 +/- ##
===========================================
+ Coverage 64.41% 64.43% +0.02%
===========================================
Files 339 339
Lines 43953 43953
===========================================
+ Hits 28309 28319 +10
+ Misses 15644 15634 -10
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
Let's clean up the scoring process in another PR for 2.8.0 |
Raise the bits of entropy required to classify as a "good" password to 75. Fixes #8519.
I'd propose to properly separate m_score and m_entropy logic: currently, m_score is initialized with the entropy and "points" are then deducted based on password reuse and expiry date. I think it would be more straightforward to set the score independent of entropy, implement different quality thresholds for both values and return the minimum quality class reached.