(skeletor is leading by example by adding that unnecessary apostrophe…)

  • rustydrd@sh.itjust.works
    link
    fedilink
    arrow-up
    86
    ·
    1 year ago

    From many years of experience on the interwebs, I can recommend this password:

    NUL,\t.;TAB\n\x07^C

    It’s very secure and works most of the time. I use it for everything.

  • MystikIncarnate@lemmy.ca
    link
    fedilink
    English
    arrow-up
    51
    ·
    1 year ago

    My main problem with passwords is the limits that sites put on what I can set for a password.

    I could not tell you how many times I reset my password using my password manager, then immediately log out, and log in using the credentials I just saved into my password manager, and they don’t work, because the site is truncating the password to 15/20/whatever characters.

    The number of times this limitation is not clearly stated, checked for, or even acknowledged by the site is too damn high.

    I’ve made it a habit of testing a login after every password set/reset to ensure I don’t have trouble with it in the future.

      • thecrotch@sh.itjust.works
        link
        fedilink
        arrow-up
        9
        ·
        1 year ago

        I created an account on a hosted service we use at work the other day, my password had to be exactly 12 characters. No more no less.

      • MystikIncarnate@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        1 year ago

        Usually 15, 16, 20, or 25 in my experience.

        15/16 I get, no idea why 20/25 is so common.

        My password manager generates 32 character passwords composed of random alphanumeric characters by default. I usually don’t modify it unless I hit a restriction, or its a site I’m particularly concerned about getting penetrated (in which case I increase the number of characters).

        I don’t mind sharing that because bluntly: anyone reading this, good luck figuring it out. The permutations is something along the lines of (26*2+10+(special characters))^32… Which is 3.5239… * 10^60… Otherwise known as 3.5 novemdecillion.

        Ha.

        • Dasus@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          Wish we just had like 256 char passwords so I could actually use passphrases instead of passwords.

          It’d be way more secure for me compared to what I’m doing now.

          I’d do like Star Trek haikus or some such which would be actually possible to remember.

    • Raxiel@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      1 year ago

      See also: Sites that don’t allow “+” in email addresses while logging in, but do accept them at registration (including confirmation emails)

    • perfectly_boiled_pizza@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      7 months ago

      PlayStation Network has a limit of around 30 characters but they let you pick something longer. They even send you an email confirming that your password has been updated. But if you try to login with your new password it won’t work.

      I’ll probably forget this within the next time I have to change it. I will then AGAIN try with 128 characters and then 125, 120, 115… while yelling at the emails they send me.

      • MystikIncarnate@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 months ago

        Can you maybe add a note to the account in your password manager to remind yourself of the limitation? I dunno, I’m just some guy

        • perfectly_boiled_pizza@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          7 months ago

          You’re absolutely right. I’ve got a talent for procrastination though. I tried giving myself an excuse while formulating this answer, but I realised that just fixing it would be quicker. Hahaha. Thank you

  • Anticorp@lemmy.world
    link
    fedilink
    English
    arrow-up
    44
    arrow-down
    4
    ·
    1 year ago

    Funny, but csv values are quote encapsulated and special character escaped.

  • normalexit@lemmy.world
    link
    fedilink
    arrow-up
    37
    ·
    1 year ago

    The CSV cells are escaped with quotes. So just maybe throw some quotes in too. Unbalanced for style points. It won’t defeat a CSV library, but might break a script kiddie

    • JasonDJ@lemmy.zip
      link
      fedilink
      arrow-up
      15
      ·
      1 year ago

      There was a (really short-lived) shady car dealership that used to have an A-Frame sign that they must’ve paid to get printed.

      It said “Your approved”.

      My approved?

      I imagine someone must’ve mentioned it to them, because they replaced it not much later.

      The new sign said “Everyones Approved”.

    • MikeWey@programming.dev
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      My bank doesn’t allow the characters you would need for a SQL injection in passwords. Checked client side, I don’t want to try and find out if it’s also checked server side, but I hope it is.

      • hakunawazo@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        No serious software would fall for such an easy attack anymore. With prepared statements it’s impossible to break queries like that. Beside that one principle is to avoid using user inputs directly in your database.

    • teejay@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      1
      ·
      1 year ago

      Sure, but the comic isn’t talking about legit password usage systems. It’s talking about how a comma could break the csv formatting of a csv file that came from a data breach and dump.

    • tool@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      While on the topic, this isn’t how passwords work in systems.

      Passwords are stored as one way hashes. So it’s cryptoed only in one direction, it’s lossy, and can’t be recovered back to the original password.

      When you log on, your cleartext PW is hashed in ephemeral memory/storage and then the cleartext password is thrown away.

      That hash is compared to the hash in the DB. If the hash matches, then you have access. If it doesn’t, then your PW is incorrect.

      Oh my sweet Summer Child. This is definitely how it’s supposed to work, but there are plenty of services that just don’t know what the fuck they’re doing.

      Have you ever been on a site that has a stupid-low character limit for a password? There’s literally no reason to do that, all the hashes are going to end up the same size in the DB anyway regardless of the original string length. Even bcrypt’s max secret character limit is 70-something characters.

      Ever change a password and have it not work on the next login because they’re silently truncating it after a certain character limit? Ever get an email with an actual password in it?

      The only reason you would do things like this is if you’re storing/processing passwords in plaintext and not hashing it client-side first.

      I can think of 3 offenders of this off the top of my head. It’s a lot more common than you’d think.

  • Waldowal@lemmy.world
    link
    fedilink
    arrow-up
    21
    arrow-down
    3
    ·
    1 year ago

    The CSV specification (RFC-4180) is pretty clear. If a value contains commas, you wrap it in double quotes. If the value contains double quotes, you double each double quote to indicate its part of the value and not the end of the value.

    A properly formatted CSV should have no problems from Skeletor!

  • Fridgeratr@lemmy.world
    link
    fedilink
    arrow-up
    21
    arrow-down
    5
    ·
    1 year ago

    Remove apostrophes from your plural words, they show possession, not plurality. Until next time.