Hey,
how does the “This password is part of an exposed data breach” functionality work?
I read about an API Call from the client extension to https://haveibeenpwned.com, however, when i check the flagged password against the website, it comes back clean.
Indeed as mentionned by @garrett we are using the API https://api.pwnedpasswords.com/, is it the same you are using to check on your side when it comes back clean?
I am using Chrome, but i am not using the integrated Google Password Manager (which has this functionality afaik). I deactivated all extensions in chrome except passbolt and can still see the warning.
@abcyb is the password length short? Passbolt may assume it’s part of a breach if it’s short, even though it is not listed as breached by pwnedpasswords.
@remy
It looks like this could be the case, i just tested with some random passwords. We usually do 25+ Characters so i never enocuntered this issue before
ghdlakd → “Data Breach” Very weak (entropy: 32.9 bits)
ghdlakd1 → “safe” Very weak (entropy: 41.4 bits)
same for whatever randomize character i use instead of the “1”.
So, everything above 8 characters seems to be “okay”, everything below is a “data breach”.
I really appreaciate this feature, but it should just say “your password is sh$t” instead of telling me that it is part of a data breach, cause that is a bit of another level of “sh$t”
Well, our customer has to change their passwords anyway, so not much loss. But it does lead to false assumptions.
If I remember correctly it was designed like this to avoid hammering the pwnd API. We could change the message, like “your password is part of dictionary” instead.