Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Mizarc
@mizarc@mastodon.gamedev.place  ·  activity timestamp yesterday

Hey #cybersecurity experts, what the hell is this.

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Claudius Link
@realn2s@infosec.exchange replied  ·  activity timestamp yesterday

@mizarc
While it at first sounds frightening and strange there is a reason behind this.

Attackers who try to brute force passwords work with lists of well known or beaches passwords.

Because of is this there is the security practice to Block common and previously breached passwords

"Standards" which require or recommend this are eg the National Institute of Standards and Technology (NIST) guidelines (NIST 800-x
it the Open Worldwide Application Security Project (OWASP) Authentication cheat sheet

Some more info
https://owasp-aasvs4.readthedocs.io/en/latest/2.1.7.html

2.1.7 Password are checked against breached passwords — OWASP Annotated Application Security Verification Standard documentation

  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0-rc.3.21 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login