[-] exal@lemmy.ca 5 points 1 year ago

(one-time)

You make it sound like an irrelevant detail, but that's kind of the key part. If implemented properly, it's only valid once and for a short period of time, which greatly reduces risk.

[-] exal@lemmy.ca 3 points 1 year ago

Especially if they have a maximum password length.

Not really, there are good reasons to limit password length. Like not wanting to waste compute time hashing huge passwords sent by a malicious actor. Or using bcrypt for your hashes, which has a 72 byte input limit and was considered the best option not that long ago. The limit just has to be reasonable; 72 lowercase letters is more entropy then the bcrypt hash you get out of it, for example.

[-] exal@lemmy.ca 1 points 1 year ago

You gotta tap the status bar at the very top of the screen, where the time and battery indicator are displayed.

[-] exal@lemmy.ca 0 points 1 year ago
[-] exal@lemmy.ca 0 points 1 year ago

I mean there needs to be a limit, because hashing a password is, by design, resource intensive. Also, Lemmy uses bcrypt for password hashing which supports up to 72 bytes, so the limit can't be any higher than that. It should probably be indicated somewhere though, I agree. I was also caught off guard by it but realistically 60 characters is more than enough... it's more entropy than the hash you get out of it, if it's random.

[-] exal@lemmy.ca 0 points 1 year ago* (last edited 1 year ago)

The web UI trims passwords to 60 characters. I assume Mlem doesn’t and the API doesn’t either or just flat out rejects the request if the password is too long.

exal

joined 1 year ago