Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. System Admin
  4. Maximum password length

Maximum password length

Scheduled Pinned Locked Moved System Admin
question
4 Posts 2 Posters 5 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J Offline
    J Offline
    Jonathan Gilligan
    wrote on last edited by
    #1

    Does anyone know if it's possible to increase the maximum password length for user accounts on NT to more than 14 characters?

    M 1 Reply Last reply
    0
    • J Jonathan Gilligan

      Does anyone know if it's possible to increase the maximum password length for user accounts on NT to more than 14 characters?

      M Offline
      M Offline
      moliate
      wrote on last edited by
      #2

      You really want to make it hell to log in for your users, don't you? ;) Anyway, I don't think it is possible. NT acutually keeps two separate hashes: LanMan hash and NT hash. I guess the limitation is in the LM hash. LM breaks the password into two 7-byte chunks, that are separatly checked against the SAM. For that reason, the first seven characters should not be "related" to the next seven. For example, "QWERTYQWERTY" is broken into "QWERTYQ" and "WERTY__", and if a hacker finds eiter one guessing the whole password is rather easy. You could also place a non-printable chars in both halves to make it harder to guess, like '(NUM LOCK) ALT-255'. Hope this helps /moliate

      J 1 Reply Last reply
      0
      • M moliate

        You really want to make it hell to log in for your users, don't you? ;) Anyway, I don't think it is possible. NT acutually keeps two separate hashes: LanMan hash and NT hash. I guess the limitation is in the LM hash. LM breaks the password into two 7-byte chunks, that are separatly checked against the SAM. For that reason, the first seven characters should not be "related" to the next seven. For example, "QWERTYQWERTY" is broken into "QWERTYQ" and "WERTY__", and if a hacker finds eiter one guessing the whole password is rather easy. You could also place a non-printable chars in both halves to make it harder to guess, like '(NUM LOCK) ALT-255'. Hope this helps /moliate

        J Offline
        J Offline
        Jonathan Gilligan
        wrote on last edited by
        #3

        moliate wrote: You really want to make it hell to log in for your users, don't you? I said the maximum, not the minimum. The reason is that I find it much easier to choose passwords from random phonemes via a Markov chain rather than by choosing random characters. 10 random elements from a third-order Markov chain must have several dozen characters to achieve the same entropy as 10 random alphanumeric/symbol characters, but can be more easily remembered because it can be pronounced with sounds consistent with the user's native language. Those who want to use this system for choosing truly random passwords find that the time it takes to type in 30 characters is significantly less than the time it takes to look up an 8-character password in a secure password-storage device. Thanks for the explanation of the NT password mechanism. I may need to accelerate the move to all-Win2K systems just because of this security problem!

        M 1 Reply Last reply
        0
        • J Jonathan Gilligan

          moliate wrote: You really want to make it hell to log in for your users, don't you? I said the maximum, not the minimum. The reason is that I find it much easier to choose passwords from random phonemes via a Markov chain rather than by choosing random characters. 10 random elements from a third-order Markov chain must have several dozen characters to achieve the same entropy as 10 random alphanumeric/symbol characters, but can be more easily remembered because it can be pronounced with sounds consistent with the user's native language. Those who want to use this system for choosing truly random passwords find that the time it takes to type in 30 characters is significantly less than the time it takes to look up an 8-character password in a secure password-storage device. Thanks for the explanation of the NT password mechanism. I may need to accelerate the move to all-Win2K systems just because of this security problem!

          M Offline
          M Offline
          moliate
          wrote on last edited by
          #4

          Ops. Sorry about the misreading.. Anyway, I think Microsoft has provided some kind of Hotfix to turn LM authorization off if you don't need it. Check the sequrity site for that. Still don't know if there is a way to increase password length.. /moliate /moliate

          1 Reply Last reply
          0
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Don't have an account? Register

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups