Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Increase length of app passwords

Increase length of app passwords

Scheduled Pinned Locked Moved Solved Support
app passwordssecurity
5 Posts 3 Posters 836 Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • humptydumptyH Offline
    humptydumptyH Offline
    humptydumpty
    wrote on last edited by girish
    #1

    I think it’s less than 20 characters. +50 characters would be nice. +100 would be ideal. Is there a technical reason why it’s this low?

    Dashboard > profile > app passwords > generate

    girishG 1 Reply Last reply
    0
    • subvenS Offline
      subvenS Offline
      subven
      wrote on last edited by subven
      #2

      It's 16 chars and this is best practice for SFTP. There are technical limits for some older clients (where 16 is the limit and special chars can break the setup) and 16 char random letters+numbers is pretty much impossible to break at the moment. More might be better but in this case it is still enough to rely on.

      humptydumptyH 1 Reply Last reply
      2
      • subvenS subven

        It's 16 chars and this is best practice for SFTP. There are technical limits for some older clients (where 16 is the limit and special chars can break the setup) and 16 char random letters+numbers is pretty much impossible to break at the moment. More might be better but in this case it is still enough to rely on.

        humptydumptyH Offline
        humptydumptyH Offline
        humptydumpty
        wrote on last edited by humptydumpty
        #3

        @subven Interesting to learn about SFTP limits. That limit doesn't apply to mail and other apps though. The reason I brought this up is because (iirc that is) nextcloud won't log in on iOS if 2FA TOTP plugin is installed & active for the user. I think I had to temporarily disable TOTP, log into the app on the phone, and then re-enable 2FA in NC.

        Edit: here are the apps that I have installed and can make use of the generated app passwords:

        • mail client
        • wekan (app)
        • alltube (app)
        • etherpad (app)
        • matrix (app)
        • wordpress (app & sftp)
        • surfer (app & sftp)
        • paperless (sftp only)
        1 Reply Last reply
        0
        • humptydumptyH humptydumpty

          I think it’s less than 20 characters. +50 characters would be nice. +100 would be ideal. Is there a technical reason why it’s this low?

          Dashboard > profile > app passwords > generate

          girishG Offline
          girishG Offline
          girish
          Staff
          wrote on last edited by
          #4

          @humptydumpty Internally, the password is 64 bits / 8 bytes. It's random 8 bytes , so not just the ascii space. This password is then stored hashed in the database.

          Cracking this is a lot of "work". For example, https://security.stackexchange.com/questions/43683/is-it-possible-to-brute-force-all-8-character-passwords-in-an-offline-attack has some numbers and that's only over 96 characters in each byte as opposed to our 256 characters range. Most rainbow tables also won't work because our character set is broader.

          Hope that clarifies the logic.

          humptydumptyH 1 Reply Last reply
          3
          • girishG girish

            @humptydumpty Internally, the password is 64 bits / 8 bytes. It's random 8 bytes , so not just the ascii space. This password is then stored hashed in the database.

            Cracking this is a lot of "work". For example, https://security.stackexchange.com/questions/43683/is-it-possible-to-brute-force-all-8-character-passwords-in-an-offline-attack has some numbers and that's only over 96 characters in each byte as opposed to our 256 characters range. Most rainbow tables also won't work because our character set is broader.

            Hope that clarifies the logic.

            humptydumptyH Offline
            humptydumptyH Offline
            humptydumpty
            wrote on last edited by
            #5

            @girish It sure did. I thought it was a simple matter of brute forcing 16 characters. I’m glad that’s not the case. Thanks for the clarification!

            1 Reply Last reply
            1
            • girishG girish marked this topic as a question on
            • girishG girish has marked this topic as solved on
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • Bookmarks
            • Search