Requirement for "at least two of the sets of uppercase ... punctuation ... numbers" is silly

Bug #1220294 reported by Matthew Paul Thomas
16
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Canonical SSO provider
Fix Released
Undecided
Ricardo Kirkner

Bug Description

1. Try to change your password to "ambivalent green arguments".

What happens: Ubuntu One complains that "Password must have characters from at least two of the sets of uppercase characters, punctuation and numbers."

What should happen: The requirement does not exist. It is overcomplicated and unhelpful, leading you to have a password you write down somewhere rather than a passphrase you remember.

Revision history for this message
Ricardo Kirkner (ricardokirkner) wrote :

The requirement is quite real. It's only a requirement for Canonical employees at this time.

Changed in canonical-identity-provider:
status: New → Won't Fix
Revision history for this message
Matthew Paul Thomas (mpt) wrote :

That's begging the question. I didn't say it wasn't real, I said that it was overcomplicated and unhelpful.

Changed in canonical-identity-provider:
status: Won't Fix → In Progress
Changed in canonical-identity-provider:
assignee: nobody → Ricardo Kirkner (ricardokirkner)
Changed in canonical-identity-provider:
status: In Progress → Fix Committed
Revision history for this message
Matthew Paul Thomas (mpt) wrote :

I should have been in a Hangout right now, but I'm not, because SSO reset my passphrase again.

Instead of requiring two of lower-case letters, upper-case letters, or numerals, apparently it now requires all three of them. That makes it slightly easier to explain, but even harder to comply with, so overall silliness remains unchanged.

The original steps to reproduce still apply: the strength indicator admits that "ambivalent green arguments" is a "Fair" password -- an epic understatement -- but then refuses to accept it! (Obviously that's just an example, not the particular words I'm using.) <http://www.baekdal.com/insights/password-security-usability>

That SSO has reset my passphrase at all is also slightly alarming. Have you reset the passphrase for hundreds of Canonical employees twice in two weeks, or just those whose passphrases didn't meet the criteria? If the former, that's a lot of employee time you're taking up. And if the latter, how do you know whose existing passphrases didn't meet the criteria?

Revision history for this message
Natalia Bidart (nataliabidart) wrote :

Hi mpt,

A few answers:

> Instead of requiring two of lower-case letters, upper-case letters, or numerals, apparently it now requires all three of them

Yes, we do require all three of them now, but only for Canonical employees. This is a requirement to comply with PCI standards.

> the strength indicator admits that "ambivalent green arguments"

The visual strength indicator is intended to validate password policy for regular users, not Canonical employees, so that's why is green for password that are valid for the regular policy, but not for the Canonical policy

> Have you reset the passphrase for hundreds of Canonical employees

No, we have not reset any passphrase "in advanced".

> How do you know whose existing passphrases didn't meet the criteria?

When you're entering your email and password we have the password in plain text, so is straightforward to check that a specific policy is valid for a given password. If it's not, we force a password reset.

I hope my answers give you a clearer picture of the status of password constraints.

Revision history for this message
Matthew Paul Thomas (mpt) wrote :

<https://tech.dropbox.com/2012/04/zxcvbn-realistic-password-strength-estimation/> gives a more detailed overview of why your current requirements are silly. It also provides code for, and a demo of, a better password strength tester.

Changed in canonical-identity-provider:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.