NIST to forbid requirement of specific passwords character composition
Overall reaction to updated NIST guidance
- Many are pleased that composition rules (“must contain upper/lower/digit/symbol”) and arbitrary rotation are now a strict “SHALL NOT”.
- Several note NIST has recommended against these since at least 2017; the change mainly upgrades “SHOULD NOT” to “SHALL NOT”.
- Some criticize NIST for years of earlier guidance that shaped today’s legacy systems, but others argue those older rules were state‑of‑the‑art at the time.
Adoption, policy, and compliance inertia
- Strong skepticism that large organizations, banks, and enterprises will change quickly.
- Corporate security, auditors, and “cyber insurance” requirements are seen as major blockers; they often enforce outdated checkbox policies.
- Some report modern employers already avoid periodic password changes and lean heavily on SSO and MFA; others still face frequent forced rotation.
Security questions and recovery mechanisms
- New guidance deprecating security questions is widely welcomed.
- Many treat security question answers as passwords stored in a manager, often with random or false-but-plausible answers.
- Concerns:
- Answers sometimes stored in plaintext and visible to support agents.
- Customer support staff can be socially engineered into accepting “I typed random junk” as correct.
- Field length limits and validation (e.g., “must be a name”, 25-char truncation) reduce entropy and reliability.
Password length, truncation, and hashing
- NIST’s minimum 64-character maximum is praised; low limits (e.g., 8–20 chars) and bans on spaces are heavily criticized.
- People report sites that:
- Truncate passwords silently on signup or login.
- Reject “too random” passwords.
- Have inconsistent limits between forms.
- Discussion of bcrypt, DES-based hashes, LM/NTLM, and DoS risks around extremely long passwords; consensus that:
- You need an upper length limit to avoid DoS.
- Silent truncation is never acceptable; passwords should be rejected instead.
Usability, password managers, and real-world behavior
- Many advocate password managers, long random passwords, and passphrases (e.g., diceware).
- Others admit using simple, reused passwords for low-value sites due to TV/console/mobile UX and login friction.
- There’s frustration with constant MFA prompts and complex flows; some see this as evidence of a need for a new authentication paradigm (e.g., passkeys, PAKE), though specifics are left unclear.