mirror of
https://github.com/mjl-/mox.git
synced 2025-06-28 01:08:15 +03:00
when warning about weak passwords, mention that passwords reused at other services in particular
based on issue #286
This commit is contained in:
parent
46c1693ee9
commit
09975a3100
9
main.go
9
main.go
@ -1771,10 +1771,11 @@ func xreadpassword() string {
|
||||
Type new password. Password WILL echo.
|
||||
|
||||
WARNING: Bots will try to bruteforce your password. Connections with failed
|
||||
authentication attempts will be rate limited but attackers WILL find weak
|
||||
passwords. If your account is compromised, spammers are likely to abuse your
|
||||
system, spamming your address and the wider internet in your name. So please
|
||||
pick a random, unguessable password, preferably at least 12 characters.
|
||||
authentication attempts will be rate limited but attackers WILL find passwords
|
||||
reused at other services and weak passwords. If your account is compromised,
|
||||
spammers are likely to abuse your system, spamming your address and the wider
|
||||
internet in your name. So please pick a random, unguessable password, preferably
|
||||
at least 12 characters.
|
||||
|
||||
`)
|
||||
fmt.Printf("password: ")
|
||||
|
@ -1483,7 +1483,7 @@ const index = async () => {
|
||||
password2.type = 'text';
|
||||
password1.value = s;
|
||||
password2.value = s;
|
||||
}), dom.div(dom._class('text'), box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'))), async function submit(e) {
|
||||
}), dom.div(dom._class('text'), box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find passwords reused at other services and weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'))), async function submit(e) {
|
||||
e.stopPropagation();
|
||||
e.preventDefault();
|
||||
if (!password1.value || password1.value !== password2.value) {
|
||||
|
@ -868,7 +868,7 @@ const index = async () => {
|
||||
password2.value = s
|
||||
}),
|
||||
dom.div(dom._class('text'),
|
||||
box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'),
|
||||
box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find passwords reused at other services and weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'),
|
||||
),
|
||||
),
|
||||
async function submit(e: SubmitEvent) {
|
||||
|
@ -2256,7 +2256,7 @@ const account = async (name) => {
|
||||
}
|
||||
password.type = 'text';
|
||||
password.value = s;
|
||||
}), dom.div(dom._class('text'), box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'))), async function submit(e) {
|
||||
}), dom.div(dom._class('text'), box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find passwords reused at other services and weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'))), async function submit(e) {
|
||||
e.stopPropagation();
|
||||
e.preventDefault();
|
||||
await check(fieldsetPassword, client.SetPassword(name, password.value));
|
||||
|
@ -1075,7 +1075,7 @@ const account = async (name: string) => {
|
||||
password.value = s
|
||||
}),
|
||||
dom.div(dom._class('text'),
|
||||
box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'),
|
||||
box(yellow, 'Important: Bots will try to bruteforce your password. Connections with failed authentication attempts will be rate limited but attackers WILL find passwords reused at other services and weak passwords. If your account is compromised, spammers are likely to abuse your system, spamming your address and the wider internet in your name. So please pick a random, unguessable password, preferrably at least 12 characters.'),
|
||||
),
|
||||
),
|
||||
async function submit(e: SubmitEvent) {
|
||||
|
Loading…
x
Reference in New Issue
Block a user