Skip to content

Conversation

@viviveevee
Copy link
Contributor

@viviveevee viviveevee commented Jun 26, 2024

Description

Weak passwords can be easily cracked by attackers using brute force or dictionary attacks. This would cause the PEM files to be decrypted, making the passwords ineffective.
This PR creates a password policy that enforces a minimum length (more than 8 characters, see NIST guidelines).

Fixes FOLLOW-1579

How Has This Been Tested?

Check of new identities covered by new e2e
Manually tested that pre-existing identities keep working, even if the password is too short

Checklist:

  • The title of this PR complies with Conventional Commits.
  • I have edited the CHANGELOG accordingly.
  • I have made corresponding changes to the documentation.

@viviveevee viviveevee marked this pull request as ready for review June 26, 2024 08:39
@viviveevee viviveevee requested a review from a team as a code owner June 26, 2024 08:39
@viviveevee viviveevee enabled auto-merge (squash) June 26, 2024 08:39
@viviveevee viviveevee merged commit ef436da into master Jun 26, 2024
@viviveevee viviveevee deleted the FOLLOW-1579-password-length branch June 26, 2024 17:55
rikonor pushed a commit that referenced this pull request Feb 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants