Bug 1265331 - Password complexity is worthless and shouldn't be required
Summary: Password complexity is worthless and shouldn't be required
Keywords:
Status: CLOSED DUPLICATE of bug 1265066
Alias: None
Product: Bugzilla
Classification: Community
Component: User Accounts
Version: 4.4
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: PnT DevOps Devs
QA Contact: tools-bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-09-22 16:50 UTC by Joe Julian
Modified: 2015-09-25 04:06 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-09-25 04:06:28 UTC
Embargoed:


Attachments (Terms of Use)

Description Joe Julian 2015-09-22 16:50:18 UTC
Description of problem:
This morning when I logged in I had to change my password because it didn't meet complexity requirements. This is silly. Everyone knows that complexity < entropy[1]. In fact, when enforced complexity rules are in place, the difficulty in cracking passwords actually decreases[2].

This is a well enough known fact that ever xkcd has made a comic about it[3].

Version-Release number of selected component (if applicable):
4.4.9039-5


Steps to Reproduce:
1. Choose a very secure password of sufficient length to provide entropy that is effectively unhackable.


Actual results:
Password is rejected for not meeting complexity requirements.


Expected results:
Password is accepted.


Additional info:
[1] https://834e27ae-a-62cb3a1a-s-sites.googlegroups.com/site/reusablesec/Home/presentations-and-papers/CCS_Password_Metric_Measurement.pdf
[2] https://www.cs.utexas.edu/~tansey/passwords.pdf
[3] https://xkcd.com/936/

Comment 1 Jason McDonald 2015-09-25 04:06:28 UTC
Hi Joe,

The change in complexity requirements was made because a disturbingly high number of Bugzilla users with access to confidential data were found to have extremely weak passwords (e.g. six character dictionary words).  We decided to address that problem by increasing the lowest common denominator, on the theory that some complexity is better than none at all.  That has unfortunately inconvenienced some users who were already doing the right thing, and I apologise for that.

Your points above about complexity vs entropy are, of course, completely valid.  We are planning to restore the ability to use long passphrases via Bug 1265066.  You are welcome to provide feedback there if you have any further concerns.

*** This bug has been marked as a duplicate of bug 1265066 ***


Note You need to log in before you can comment on or make changes to this bug.