this post was submitted on 19 Jul 2023
742 points (98.2% liked)

Asklemmy

43856 readers
1784 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
 

It's 2023, why are websites actively preventing pasting into fields like passwords and credit card number boxes? I use a password manager for security, it's recommended by my employer to use one, and it even avoids human error like accidentally fat-fingering keys, and best of all with the credit card number I don't have to memorize anything or know a single digit/character!

I have to use the Don't Fuck With Paste addon just to be able to paste my secrets into certain monthly billing websites; why is my electric provider and one of my banks so asinine that pasting cannot be allowed? I can only imagine downsides and zero upsides to this toxic dark-pattern behavior.

There is even a mention about this in NIST SP 800-63B, a standard for identity management that some companies must follow in the USA, which mentions forcefully rotating passwords and denying "password paste-in" as antiquated/bad advice:

Verifiers SHOULD permit claimants to use โ€œpasteโ€ functionality when entering a memorized secret. This facilitates the use of password managers, which are widely used and in many cases increase the likelihood that users will choose stronger memorized secrets

Edit: I discovered that for Firefox users there's a simpler way than exposing your secrets to someone's third-party addon. Simply open about:config, search for dom.event.clipboardevents.enabled, and change it from true to false.

Edit 2: As some have pointed out, that config value interferes with regular functionality on some sites. Probably best to leave it alone unless you know what you're doing.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] iamak@infosec.pub 75 points 1 year ago (3 children)

This is one of the dumbest shit ngl. My bank also does this. However they go one step further. They force a maximum 12 letter password and 1 character of each type (capital, small, number, symbol) is necessary. This actively reduces password security smh

[โ€“] lenathaw@lemmy.ml 20 points 1 year ago (2 children)

Mine truncated the first 8 characters, when I discovered that I sent them a request to their cyber security department and they told me.of was by design.

I closed my account over that bs

[โ€“] TheSacredOne@lemm.ee 8 points 1 year ago (1 children)

It's because they likely have an ancient backend that can't fit it in the database field...

[โ€“] fiah@discuss.tchncs.de 10 points 1 year ago

a legitimate reason to close the account and back away slowly

[โ€“] iamak@infosec.pub 1 points 1 year ago (1 children)

Wtf lmao. How to I check if mine does it๐Ÿ’€

[โ€“] nik282000@lemmy.ml 7 points 1 year ago (3 children)

Type the first 8 chars and see if you can still log in?

[โ€“] RIP_Apollo@feddit.ch 1 points 1 year ago

Good idea, although this wouldnโ€™t tell you if they truncated the password at 9 characters instead (or 10 or 11 characters etc).

So you would have to try different attempts without making too many in one sitting that gets you locked out.

If you tried your password without the last character, then I think that would tell you if ANY truncation is being used (but it wonโ€™t tell you whether it happened at the 8th, 9th, 10th etc character). But that seems like the best thing to try first just to rule it out.

[โ€“] iamak@infosec.pub 1 points 1 year ago

I checked network logs. Apparently my bank encrypts both uid and password before sending. I put 8 chars and it gave error so I'm assuming no

[โ€“] lenathaw@lemmy.ml 1 points 1 year ago

that's exactly how I figured it out. then asked for some friends and family with account in the same bank to validate

[โ€“] dekatron@lemmy.fmhy.ml 11 points 1 year ago (1 children)

My bank also does this shit. It's aggravating to use their website when every step along the way they put the burden of security on the user.

Pasting is disabled on almost every text field, even for things like account numbers (which they make you type in twice) when you want to do a transfer. The only way to log in is to manually type in your username, password, and a damn captcha everytime. The 6 digit 2FA code is the icing on the cake. If you idle for a minute or two, they log you out and force you to go through the whole thing again.

[โ€“] iamak@infosec.pub 8 points 1 year ago

Banks make the worst possible UI and justify it by saying "security" xD