mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
[Feature]: Allow weak Password again #508
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#508
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rezzorix on GitHub (Oct 31, 2021).
🏷️ Feature Request Type
Other
🔖 Feature description
Since v1.10.0 no weak passwords are allowed anymore.
Please offer at least an option to allow the use of weak passwords.
✔️ Solution
Having password complexity in general is fine - but hey, please offer at least an option to use weak passwords.
❓ Alternatives
📝 Additional Context
I am sure a lot people run UK in a strict local environment only, therefore a simple and easy PW is preferred.
⚠️ Please verify that this feature request has NOT been suggested before.
@louislam commented on GitHub (Nov 1, 2021):
Currently I used this library to check the password.
https://check-password-strength.netlify.app/
If it is
too weak, Uptime Kuma will reject it.I found that the library isn't perfect, because some passwords like
lskdfjlkshlgklhakjfhklsjfjksljlsafsdris stilltoo weak.We could discuss a better solution.
@rezzorix commented on GitHub (Nov 1, 2021):
Well, requirement for a "strong password" is now alphanumeric & min. 6 characters... thats not strong anyway.
Thats not strong at all 😉
Maybe I should be more specific; with weak I mean simple.
On my local monitors I use username=password; really simple stuff.
Means for example username 123, PW 123...
On all monitors that are somehow accessible by others or face the outside world I have strong username/pw + 2FA anyway...
If could switch off the requirement for login on some machines would even be easier.
@chakflying commented on GitHub (Nov 1, 2021):
I'm a fan of password strength based on entropy. This library, while doesn't seem very popular, seem to be pretty comprehensive in combining different tests.
In terms of allowing weak passwords, I thought using a password manager is already the norm these days? There really shouldn't be any excuse for a weak password just because it's easier to type.
@rezzorix commented on GitHub (Nov 1, 2021):
Believe me, I am using a PW manager.
But when you have dynamically changing IPs and not use any domain names in a local network, you dont wanna fill up your PW manager with useless entries.
Thats why: allow weak or no PWs please.
All this "strong PW" talk is fine - I am not against it, but use-by-use case please - dont enforce it where it might not be required. At least offer the option to choose the password policy.
@EzxD commented on GitHub (Nov 1, 2021):
maybe consider something like that:
https://stackoverflow.com/questions/5142103/regex-to-validate-password-strength
@louislam commented on GitHub (Nov 1, 2021):
I would suggest something like
abc123. 123 is clearly too short in my opinion.FYI: I got CWE-521 report recently, that is why I added this.
https://cwe.mitre.org/data/definitions/521.html
You could disable auth in the settings page btw.
@rezzorix commented on GitHub (Nov 1, 2021):
Oh man... just saw this option now; I thought it had a different purpose...
Forget my request - I just disable auth.
For stronger passwords I however would still suggest to let the complexity be set by the admin.
@andreasbrett commented on GitHub (Nov 1, 2021):
Exactly. If it really needs to be easy to type just use a passphrase rather than a password.
I'm not a fan of entropy-based password strength determination. It's proven that some weak passwords have high entropy. One great alternative library is zxcvbn that will - just like tai - provide quite a few details on the domain of password weakness ("phrase contained in US movie database", l33t variations, top100 password etc) but is not based on entropy but rather has been developed differently.
Some more details:
It's easy to use and gives a lot of metrics to determine what you want to have. For UK I could think of simply using the "unthrottled online attack" metric (maybe a slider in the settings to set "how many days should cracking this password take at minimum". Or even simpler - setting minimum score (though this scales only from 0 to 4).
So a password
abc123would be cracked within 1.4 seconds:While passphrase
JohnnyCactusRainbowwould take 133559128 seconds = 4 years to crack:The above mentioned
lskdfjlkshlgklhakjfhklsjfjksljlsafsdrwould take centuries to crack (and just because it's all lowercase doesn't mean it's weak - it is very long and random and therefore quite secure):@louislam commented on GitHub (Nov 1, 2021):
No problem, I close this issue since I believe that weak password would not be accepted again.
UP/DOWNevents #575UP/DOWN/CERT-EXPIRY/...) triggers alerts #784upanddowncases #2901DOWNandUP#3115DOWNandUP#3115UPnotifications #3321UPnotifications #3321