We’ve all been there.

  • Eochaid@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    2 years ago

    Sorry, that password is already in use

    BIG red flag. Abort. Abort.

    Also I love when they only support certain special characters. So the psuedo random noise created by my password generator won’t work until I curate out the unsupported characters.

  • Madbrad200@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    10 months ago

    My absolute favourite is when your password is too long but they don’t tell you that, I guess because they weren’t expecting it. It only causes a hitch when you later try to login and it doesn’t let you …

    • Revan343@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      You think that’s bad, a decade ago I had to use a government-run website that required passwords be exactly 8 characters

  • average650@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 years ago

    The worst part is that if they know that password is already in use… then they aren’t storing their passwords appropriately.

    • teft@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      You could store the passwords as hashes and just compare the hashed value.

  • zeppo@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 years ago

    “Sorry, that password is already in use” ruins it for me. That’s not a realistic message to receive.

    Maybe “Your password cannot be one you’ve used previously”.

    • Buddahriffic@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      It follows the vein of some of the password rules and feedback reducing security itself. Like why disallow any characters or set a maximum password length in double digits? If you’re storing a hash of the password, the hash function can handle arbitrary length strings filled with arbitrary characters. They run on files, so even null characters need to work. If you do one hash on the client’s side and another one on the server, then all the extra computational power needed for a ridiculously long password will be done by the client’s computer.

      And I bet at least one site has used the error message “that password is already in use by <account>” before someone else in the dev team said, “hang on, what?”.