Not only does the credit bureau max out their password length, you have a small list of available non-alphanumeric characters you can use, and no spaces. Also you cannot used a plused email address, and it had an issue with my self hosted email alias, forcing me to use my gmail address.

Both Experian and transunion had no password length limitations, nor did they require my username be my email address.

Update: I have been unable to log into my account for the last 3 days now. Every time I try I get a page saying to call customer service. After a total of 2 hours on hold I finally found the issue, you cannot connect to Equifax using a VPN. In addition there is no option for 2FA (not even email or sms) and they will hang up on you if you push the issue of their security being lax. Their reasoning for lax security and no vpn usage is “well all of our other customers are okay with this”.

  • Dizzy Devil Ducky@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    3 months ago

    The 20 character length limit is so annoying because I once had 2 distinct passwords (not in use anymore) that were both coincidentally 21 characters long. Character limiting me by a single character at the end of those old passwords was annoying because I usually ended up, for some services I needed, having to change up and use a completely new password. Back when I was a lot worse about reusing passwords than now.

  • HootinNHollerin@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    I went through that bullshit so many times trying to get the characters etc then the next step said not available try again later…

  • chiliedogg@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    I swear password restrictions are getting to the point where there’s eventually going to only be one usable password.

    • filcuk@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Yeah, it’s counterproductive to lay out a bunch of restrictions. Let people make a long-ass password that’s a memorable phrase - it’s safer anyway.

      Although I don’t know how anyone makes it without a password manager at this point.

      • sylver_dragon@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        I don’t know how anyone makes it without a password manager at this point.

        Password reuse. Password reuse everywhere.

          • nocturne@sopuli.xyzOP
            link
            fedilink
            arrow-up
            0
            ·
            3 months ago

            When I have to sign up for something on my phone I will use my pre Bitwarden default password. Then once I have a sec to sit down iPad or laptop I will change it to something more secure.

            I am currently fighting with my wife and children to start using a password manager.

  • alkaliv2@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    Just wait until you get to Transunion’s site. It is a dumpster fire of consisting of the worst sign up I’ve ever seen, “Contact our social team” and "If you haven’t logged in for awhile create a new account. I could not believe how awful it was. I had to just call and do it over the phone.

    • nocturne@sopuli.xyzOP
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Transunion was not too bad, and they did not require my full SSN, unlike Equifax. But transunion will not easily give me my credit score unlike the two Es.

  • krolden@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    Super long passwords aren’t going to do you any good when their database is compromised and sold to anyone with a few bucks.

    Its not like some one is gonna be brute forcing your account password, it would lock your account after like ten tries.

    • Hirom@beehaw.org
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Quite the contrary.

      Password hashing is standard nowadays.

      When a database is compromised, brute forcing hashes is necessary to recover passwords, and the short ones are the first ones to be recovered.

      • krolden@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        3 months ago

        So what? They’ll get your single use randomly generated password months/years/decades after you’ve already changed it?

        • The Doctor@beehaw.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 months ago

          Which begs the question, how often do people really change their passwords unless they’re forced to? This feels like the sort of thing that somebody should have studied.

  • js10@reddthat.com
    link
    fedilink
    arrow-up
    0
    ·
    3 months ago

    I have seen this on a site before and I never understood why. Whats the point of limiting the length of the password? Its not to save storage space since the plain text isnt stored and the hash should be a uniform length. So whats the advantage?

    • daddy32@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Calculating hashes is supposedly more expensive for longer strings. That could be used to simplify some kind of overload attack like DDOS.

      • ReveredOxygen@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        If they’re using md5 (which would be in line with their security practices), the block size is 512 bits. That means that everything less than 64 characters is the same cost

      • xthexder@l.sw0.com
        link
        fedilink
        arrow-up
        0
        ·
        3 months ago

        If they’re not already rate-limiting login attempts that’s another huge problem…

    • digdilem@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      since the plain text isnt stored

      I’m not sure I’d accept a bet on that assumption.

    • Vivendi@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Their backend is really, REALLY garbage. Maybe it is some of that Microsoft trash that they snake oil’d into a lot of public offices and dumbass corpo managers, but whatever is running that site, has me concerned. You don’t do fucky things with passwords unless your backend is doing something really stupid.

  • kingthrillgore@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    3 months ago

    A 20 character password of case insensitive letters and numbers is quite unbreakable (taking billions of years to brute force). Still, what a strange way to announce your database is old and you probably aren’t hashing your password with anything stronger than MD5. Or worse.

    • Toribor@corndog.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      My default is to generate a 32 character password and store it in a password manager. Doesn’t matter to me how many characters it has since I’m just going to copy and paste it anyway.

      Pretty surprising how many places enforce shorter passwords though… I had a bank that had a maximum character limit of 12. I don’t bank with them anymore. Short password limits is definitely is an indicator of bad underlying security practices.

    • 🅿🅸🆇🅴🅻@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      A hash has a fixed length, including MD5. There’s no reason to cap password (input) Iength. You can hash the whole bible and still get the same length hash. So either they don’t even hash it, they’re idiots, or they try to be unnecessarily cautious to avoid some other limit / overflow, like POST max size (which would still be counted in at least KB, not several characters). The limit on what special characters you can use is also highly suspicious - that’s not how you deal with injections / escaping your inputs.

      • drivepiler@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        3 months ago

        Hashing takes longer the longer the string is, so it technically could impact performance if many people with very long passwords log in simultaneously. 20 characters is ridiculous though, you could probably cap it at hundreds and still be completely fine.

  • UnbalancedFox@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    I had an account there with a proton email address and suddenly I couldn’t log in anymore. After 6 months of calling, someone finally told me proton emails are blocked because they are not secure. So I changes it to a tutanota email

    What a clusterf**k

    • nocturne@sopuli.xyzOP
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      I almost used my proton mail because I can create an alias, where equifax would not accept a plused gmail account.

  • StaySquared@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    LOL

    I hate stupid character limits. Not everyone uses, “passwords”… I type out a damn sentence.

  • StorageAware@lemmings.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I always get a chuckle when financial institutions have requirements like these, or lack 2FA. My Lemmy account has more security at this point.