…or are expert opinions being overridden by Marketing?
Apologies for the (intentionally) inflammatory post title, but I am seriously concerned. Decisions are being made that have the net effect of making Bitwarden appear (to an outside observer) as if their developers don’t completely understand password security — a topic that should be their bread-and-butter.
At the start of the year, we got wind of plans to implement a poorly thought-out “password strength indicator”, although this proposed design has (thankfully) not yet seen the light of day.
But now, Desktop and Web Vault version 2024.11.0 (as well as version 2024.11.999 of the redesigned browser extension) all incorporate an arbitrary lower limit for the number of words in generated passphrases. PR 11675 raises the lower limit from 3 words to 6 words, with no rationale or explanation (other than the stated objective: “Increase entropy of generated passphrases”).
The range of allowed passphrase lengths is now 6–20 words, corresponding to an entropy range 78–258 bits. At the same time, the password length restrictions are 5–128 characters, which corresponds to an entropy range 5–785 bits. It makes absolutely no sense why the allowed entropy range for passwords should be over 4 times larger than the allowed entropy range for passphrases.
In addition, there are very legitimate scenarios under which a passphrase shorter than 6 words (or a password shorter than 5 characters) provides proper security for the application at hand. For example, the Bitwarden vault master password itself does not need to have more than 50 bits of entropy to provide sufficient protection against plausible brute-force attack scenarios (and PINs used for unlocking should have even lower entropy). Another example is PINs used for user verification on Yubikeys — as illustrated here, even a 13-bit PIN provides reasonable protection against a brute-force attack, and anything higher than 43 bits overkill.
The limits chosen are also not grounded in any published standards. For example, NIST mandates a minimum password length of 8 characters (corresponding to an entropy as low as 24 bits depending on character set), a lower limit that exceeds Bitwarden’s 5-character limit for passwords.
For the reasons above, it is difficult to not draw the conclusion that irrational decisions are being made at Bitwarden, with no input from experts on password security. I hope that I am wrong, or that Bitwarden will at least listen to constructive input from experts in the user community.
My recommendation would be to not impose any minimum length restrictions in the generators (or as a second best option, limit passwords to 4 characters minimum, and passphrases to 2 words minimum), but instead set the default lengths to 12 characters and 6 words, respectively.
Any comment from @jensen-af @djsmith85 @BrandonTreston @Micah_Edelblut ?