What the... This discussion has become a bit out of hand! My goal was to have consistency at LuCI and CLI. I see how enforcing passwords of a particular kind, as well as enforcing passwords at all, is not an engineering decision. I have no problem with this patch being rejected.
So, since we decided to not enforce anything regarding passwords for the root user on CLI, I think we should also not enforce anything regarding passwords for the root user on LuCI. Still, I am concerned about consistency foremost. This PR needs to be rejected to stay consistent, then! --> https://github.com/openwrt/luci/pull/878 Cheers, Dan PS: Ah, I see that patchwork rejected the patch already. All good! > On 17 Feb 2017, at 13:51, David Lang <da...@lang.hm> wrote: > > On Fri, 17 Feb 2017, Alberto Bursi wrote: > >> On 02/17/2017 12:52 PM, David Lang wrote: >>> On Fri, 17 Feb 2017, Alberto Bursi wrote: >>> >>> And having no password is a much bigger change than having a short >>> password when you are testing things. It makes a lot of sense to be >>> excercising the password routine when doing tests, and very little >>> difference if you are excercising it with a short password or a long one. >>> >> >> What? if I'm testing things that are completely unrelated to login >> (system configurations for tutorials or stuff for device support) then >> how I log in is irrelevant. > > if you are testing specific features, than any other features are irrelevant, > but if you are doing more general testing, then one of the things that needs > to be in the tests is the authentication. > > and if you are setting up test scripts, it's best to make them scripts that > users can test with as well, and they are almost always going to have > authentication enabled. > >>> Why are you saying that short passwords are bad? Is it just because you >>> have been told that they are? >>> >>> Remember, a short password is only a problem if attackers have the >>> ability to make brute force attacks on the system. If attackers can't >>> get at the interface, or if there are other strategies in place to >>> defeat brute force attacks, a short password can be acceptable. >>> >> >> True. Are there such systems in place for ssh access? > > They are available. > > To start with, SSH access is not enabled on the WAN side. > > If password brute forcing from the inside is considered a threat, then > turning on rate limiting/temporary lockouts/alerts/etc is a far better thing > to do than to try to force 'better' passwords. > > people who don't want good passwords are going to find a way to not have good > passwords. > > password1! is not a much better password to use than password, even though > the password strength tests will claim that it is. If you force people to > have 'longer' or 'more complex' passwords, they are far more likely to add > some easy to guess nonsense on the end of their previous 'bad' password than > to come up with a 'good' password. > > David Lang > > _______________________________________________ > Lede-dev mailing list > Lede-dev@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/lede-dev _______________________________________________ Lede-dev mailing list Lede-dev@lists.infradead.org http://lists.infradead.org/mailman/listinfo/lede-dev