🌐
Reddit
reddit.com › r/bitwarden › bitwarden password strength tester
r/Bitwarden on Reddit: Bitwarden Password Strength Tester
September 18, 2022 -

In light of the recent LastPass breech I looked at different strength test websites to see how long a password would hold up under a offline brute-force attack.

The password I tried was: Aband0nedFairgr0und

This is a a 19 character password with a combination of uppercase/lowercase/numbers. Granted, there is no special characters.

I went to 5 different password strength sites and they all give me wildly different results for how long it would take to crack.

https://www.security.org/how-secure-is-my-password/ 9 quadrillion years
https://delinea.com/resources/password-strength-checker 36 quadrillion years
https://password.kaspersky.com/ 4 months
https://bitwarden.com/password-strength/ 1 day

As you can see the results are all over the place!

Why is the Bitwarden result so low and if the attacker had zero knowledge of the password, is it feasible to take an average of the diufferent results and assume that password is sronger that 1 day?

PS: Dont worry, Aband0nedFairgr0und is not a password I use and was made up as a test.

Top answer
1 of 5
63
The other explanations here are true but maybe this will clarify why. Bad password checkers assume a cracking program will guess, in order: a, b, c, … aa, ab, ac, ad, … and so on forever. Good password strength checkers calculate entropy (~randomness) with the assumption of common reasonable wordlists and standard variations on those words, in addition to gibberish character strings. Password cracking tools don’t tend to guess every single random string of characters from shortest to longest, since many people are more likely to choose real words or variations of words. So, for example, “eggplan” is actually a stronger password than “eggplant” despite having fewer characters. They’re both awful, but any decent password cracking tool will guess a word a human is more likely to choose first (vs egg + plan, two unusual words to combine). “eggplan” will even take longer to crack than “eggpl@nt” because a→@ is such a common substitution for humans trying to strengthen their passwords that password cracking tools will likely try it first. Extending to longer sequences, 3-6 memorable unmodified words chosen randomly from very long lists will usually be both more memorable and harder to crack than 2-3 words with symbols inserted. Edit to add: the best way to get a sense of how this works in practice is here: https://lowe.github.io/tryzxcvbn/
2 of 5
33
Bitwarden.com uses zxcvbn to calculate the time-to-crack. You can try it online at https://lowe.github.io/tryzxcvbn/ and it'll tell how it arrived at a time of 1 day.
🌐
Reddit
reddit.com › r/bitwarden › password strength testing tool strangeness
r/Bitwarden on Reddit: Password Strength Testing Tool Strangeness
June 10, 2024 -

I was playing with Bitwarden's Password Strength Testing Tool and discovered unexpected behavior.

I have a password that I use to login to my personal laptop (thirteen characters with letters, digits and symbols). I use the same password with 2 additional digits appended as my Bitwarden Master password.

When I test the laptop password, the testing tool says "Strong" and "31 years" to crack. Seems good so far. Next, I append an additional digit and the Estimated Time to Crack increases to "centuries" which seems even better.

Then I append one more digit and the Estimated Time to Crack goes DOWN to 57 years. Huh?

Why would the Estimated Time to Crack go down when appending a digit to a password that would take "centuries" to crack? I thought appending more characters to a password would always increase the estimated time to crack.

Am I misunderstanding something?

Top answer
1 of 5
17
All password "strength" testing tools that work by analyzing a user-entered password example produce invalid results. They are for entertainment purposes only, and should never be relied on to make decisions related to cybersecurity. Bitwarden's tool is no exception. It is based on zxcvbn tool , which is somewhat better than other password testing tools, but can still produce wildly misleading results. In your case, you may have started with something like hge9e3&jg[s19, which the zxcvbn tool cannot match to its inventory of password patterns, so it conservatively estimates that 1013 guesses (a factor of 10× for each character) would be require to crack this password. It also assumes that an attacker would be limited to making 10,000 password guesses per second (which is unrealistic for your laptop password, but could be plausible for your Bitwarden master password). Thus, the cracking time is estimated to be 1 billion seconds, which is 31.7 years. If you now add a digit (e.g., 3) at the end of your password string (hge9e3&jg[s193), then the zxcvbn tool still cannot match the string to any of its password patterns, so it determines the number of required guesses to be 10× higher than before (1014 guesses). Thus, the estimated cracking time is also going to be ten times longer (317 years, a.k.a. "centuries"). If you now add one more digit (e.g., 4) at the end of the previous string (hge9e3&jg[s1934), then something interesting happens. In this case, the zxcvbn tool recognizes the pattern 1934 as a recent calendar year, a pattern commonly found in passwords. The zxcvbn algorithm therefore estimates that it would take at most 90 guesses to come up with the 1934 pattern by working backwards from 2024 (as opposed to its standard estimate of 10,000 guesses for a 4-character sequence with no recognized pattern). Therefore, the password is now parsed as a random 11-character string (hge9e3&jg[s, requiring 1011 guesses) followed by a 4-character year pattern (1934, requiring 90 guesses). The tool then applies a fudge factor of 2×, coming up with 1.8×1013 guesses for cracking this longer password. With an assumed guessing speed of 104 guesses/second, the cracking time ends up being 1.8 billion seconds, corresponding to 57 years. Do all of these assumptions seem arbitrary? They are. Can we trust the results? No.
2 of 5
3
I don’t know how the BW tool works but there are plenty of ways adding a character could potentially decrease entropy. For example: Adding a character means all or part of your password matches an entry on a known leaked password list Adding a letter means all or part of your password matches a dictionary word, eg to over-simplify you could make a case that ‘dictionar’ is a more secure password than ‘dictionary’ Adding a number means all or part of your password matches a common number combination, eg it forms a date, or worse a famous date or a date that’s traceable to your life. Again to over-simplify you could make a case that 0911200 is more secure than 09112001. But it will all depend what the tool is checking for. And these tools are notoriously unreliable. They are trying to predict what a hacker will prioritise which will never be reliable, and they can only do simple checks that can run in under a second.
🌐
Reddit
reddit.com › r/bitwarden › question about the bw password strength tester
r/Bitwarden on Reddit: Question about the BW password strength tester
March 17, 2023 -

Basically, it seems to award very short passphrases too much strength.

I've built a spreadsheet to test entropy of each password/passphrase and have believed it's best to stay above 78 bits of entropy, I suppose based upon recommendations of the Diceware web page, from perhaps 1995:

We recommend a minimum of six words for use with GPG, wireless security and file encryption programs. A seven, eight or nine word passphrase is recommended for high value uses such as whole disk encryption, BitCoin, and the like. For more information, see the Diceware FAQ.

From this I inferred six-word passphrases were the basic minimum, with longer phrases up to 10, depending upon need. Six words gives me 77 bits of entropy (based upon a 7700-word dictionary).

Now to the BW Password Strength Testing Tool (PSTT): It shows a two-word passphrase, "blissful-harmony" as good! Then it also says it would take one day to crack! Something's wrong here. FWIW, a two-word passphrase yields 25 bits of entropy. Add one more word to the phrase: "blissful-harmony-update" and the tester gives it a "Strong" rating that will take centuries to crack with 38 bits of entropy. Neither seems overpowering or even adequate.

The PSTT appears to have dissociated "strength" and "entropy," and I don't understand why.

I did read through the zxcvbn link on the PSTT page, and the following may bear upon the issue:

By disregarding the "configuration entropy" — the entropy from the number and arrangement of the pieces — zxcvbn is purposely underestimating, by giving a password's structure away for free: It assumes attackers already know the structure (for example, surname-bruteforce-keypad), and from there, it calculates how many guesses they'd need to iterate through.

There's also the encryption methods, including the Key Derivation Function that will slow down the number of guesses a hacker can make in any unit of time; that can help, as can Multi-Factor Authentication (MFA).

Still, worst case, as LastPass users discovered, MFA doesn't help the Vault owner if a hacker has it in front of him and doesn't have to go through online protection schemes.

So, is a short passphrase strength betting on a hacker not knowing the structure of password/passphrase or am I missing something?

Top answer
1 of 5
28
The problem with password strength testing tools like Bitwarden's is the fact that the don't know anything about how the password was generated. All they know is the end result. It's kind of like telling the tool "I rolled a 3" without telling it if the die is a d4, d6, d8, d10, d12, or d20. To answer your question directly, password cracking is more art than science. Experienced password crackers will leverage existing cracked password lists to chase after the low hanging fruit first. They'll apply some masks to alter passwords found in the list, such as making the first character uppercase or appending special characters, but by and large, they're doing everything they can do avoid brute forcing.
2 of 5
6
It shows a two-word passphrase, "blissful-harmony" as good! Then it also says it would take one day to crack! Something's wrong here. Yes, Bitwarden's password strength tester (zxcvbn), while better than many alternatives, often produces misleading results. In the example above, it overestimates the entropy (it estimates 30 bits of entropy, because it does not know about the EFF Word List used by Bitwarden, and one of the words is very uncommon — blissful is ranked 11,413 in the "US TV and Film" dictionary used by zxcvbn for this word). On the other hand, zxcvbn estimates time to crack using hash rates that are outdated (it has four different speed options, but Bitwarden's strength tool uses the third option, which assumes 10,000 guesses per second). Thus: (230 guesses)/(10,000 guesses/second)/(86,400 seconds/day) = 1.2 days. You can learn more about how the zxcvbn tool works using this demo page: https://lowe.github.io/tryzxcvbn/
🌐
Reddit
reddit.com › r/bitwarden › password strength testing tool - password from list listed as secure
r/Bitwarden on Reddit: Password Strength Testing Tool - password from list listed as secure
September 17, 2024 -

Hi! Tested one of my old cracked password with the bitwarden Password strength testing tool and it was shown as secure. So I tested it with one of the password that I thought look at least kind of good from a rockyou-list: "arisdwiwanto070606" (https://raw.githubusercontent.com/josuamarcelc/common-password-list/refs/heads/main/rockyou.txt/rockyou_2.txt) with the result that it was a strong password.

According to HaveIBeenPwnd the password has been seen one time before.

Is there any reason why Bitwarden does not check for any new password lists as well when telling the user about the password strength (zxcvbn seems to have a 9 years old password list, https://github.com/dropbox/zxcvbn/tree/master/data) or do I miss something?

🌐
Reddit
reddit.com › r/bitwarden › how accurate is bitwardens password strength tester?
r/Bitwarden on Reddit: How accurate is bitwardens password strength tester?
October 3, 2023 -

It will quickly jump from days to decades to centuries by just adding a few characters. I doubt it will take centuries for the government or hackers to crack these simple passwords.

How accurate is it? How do I create a strong password?

Top answer
1 of 5
15

The only way to verify the strength of a password is by analyzing the app that generated it. You cannot assess the strength of a password by looking at it in isolation. If you made up a password without using an app, you must assume it is weak.

The password strength tester might give novice users some insight into the relative value of different kinds of passwords, but it should not be used to verify a password’s strength.

How do I create a strong password?

Bitwarden has a builtin password generator, which is sufficient for anything you will need. This password generator has two basic types of passwords:

  • Fully random — you get to choose how long it is, whether it has numerals (and how many), special characters (and how many), and whether to avoid “ambiguous characters, like “oh” versus “zero”. This is the kind of password you should usually set for a website. With autofill, you don’t care if it is something really ugly like s8qqlr^*!eFe.

  • Passphrase — this is a string of real English words. Bitwarden selects from a known list with 7776 words. A passphrase is easier to read and to transcribe (type in yourself). In order for a passphrase to be strong, it must be longer than a fully random password to have the same entropy (“strength”).

Passphrases are great if you cannot use autofill. A master password is a great example. So is also a workplace administered laptop.

The greater length of a passphrase can be a problem, because some websites have length limitations or a bug with longer passwords. Linux, Windows, Microsoft, Google, and Apple all handle longer passwords correctly, but you could run into a problem with toothpick-r-us.com. As a rule, if you can use autofill, don’t bother with using a passphrase; just stick with the fully random password.

2 of 5
6

How accurate is it?

All password "strength" calculators that analyze a user-provided password are garbage, and often generate wildly misleading results.

Bitwarden's password strength tester is based on the zxcvbn tool, which is somewhat more sophisticated than many of the other password strength testers, but still produces nonsense results.

For example, the title of a popular book & movie, like "The cat in the hat" is a terrible master password, but Bitwarden's strength tester says it is "strong" and claims it would take "centuries" to crack.

Likewise, for a randomly generated password string containing 8 characters (e.g., &50y6pO*), Bitwarden's password strength tester claims that it is a "weak" password that can be cracked in only 3 hours. In reality, this is a very strong password, which would take well over a thousand years to crack.

 

How do I create a strong password?

Use a vetted passphrase generator that selects random words based on the output of a uniformly distributed, cryptographically secure pseudo-random number generator, and generate yourself a random 4-word passphrase. Done.

🌐
Reddit
reddit.com › r/bitwarden › password strength generator
r/Bitwarden on Reddit: Password Strength Generator
October 27, 2022 -

Hi, I have a question about the Bitwarden Password Generator/Strength tester at https://bitwarden.com/password-generator/
By default, it offers a 14 character random Alpha-numeric password and tells me that this is safe for "Centuries". Is this still the case? Other sources talk about generating longer passwords??
In fact if I use this to generate a 9 character password it gives it a "good" rating...

Top answer
1 of 2
4
14-character random character strings are still plenty secure and will remain so for the foreseeable future (assuming that it at least contains some letters, i.e., not an all-numeric code). If other sources are telling you otherwise, well, now you know which sources not to trust for security advice. No password strength testers can provide accurate results, but Bitwarden's is better than many, because it attempts to produce conservative estimates (so that you are not lulled into a false sense of security). It does have some issues, which I had discussed in another thread yesterday (e.g., explaining why a 9-character password would be classified only as "good"). For your convenience, here is the text of my comment from that thread: The reason for this estimate is that the zxcvbn tool used by Bitwarden's password strength tester uses a very conservative estinate for the number of guesses required to use brute force for guessing passwords that do no match other patterns (dictionary words, repetitions, l33t-substitutions, etc.). For any part of the password that the zxcvbn cannot match to a known pattern, it uses a brute-force cardinality of 10 , i.e., it estimates that the number of guesses required to crack a password or password segment of length N is equal to 10N (equivalent to the number of guesses required to exhaust all possibilities if your password consisted only of numbers). Therefore, for a password like the one in your example, it estimates the time to crack using a calculated password entropy of only 33 bits (when the actual entropy is over 60 bits). On the other hand, the hash rate (number of guesses per second) used by zxcvbn (and therefore also by Bitwarden's strength testing tool) is outdated, and is currently equivalent to what would be achieved by 2/3 of a single RTX 4090 GPU, if the hashing algorithm is PBKDF2-HMAC-SHA256 and the number of KDF iterations is set to 600,000. Of these two effects, the underestimation of the number of required brute-force guesses far outweighs the underestimation of the hash rates in a multi-core attack. P.S. With the new Argon2 KDF option, the estimated cracking times are even less applicable to our master passwords.
2 of 2
3
Relative strength is always a subjective judgment call. The cost of hardware keeps dropping, and the speed of that hardware keeps rising. A unique unbreached password is "good" if an attacker is not likely to brute force guess it using less time or money than the password protects. For instance, if an attacker will probably need to spend $2000 to steal the $1000 in your bank account, the password is good. If you are 40 years old and it will take 75 years to guess that bank account passwords it is a "good" password. Note the use of the word "probably". A teenager living in his mother's basement might guess your passwords kn an evening. Also, an attacker might spend $10K stealing that $1K because their goal is to harm you, not to profit from the theft. Tvis is why I started by saying this is a subjective measure. You must decide on your own whether you have adequately mitigated risk for your own situation. it offers a 14 character random Alpha-numeric password and tells me that this is safe for For most of us, a 14 character random password is good enough. Some choose 16 or 18 characters. Note also that bigger is not always better. Longer passwords create different risks. Many websites have programming bugs when you try to use a longer password. There is also a small chance that, one day, you might have to transcribe (hand enter) that password instead of letting your password manager autofill it. Don't go overboard with ridiculously long passwords.
🌐
Bitwarden
bitwarden.com › password-strength
Password Tester | Test Your Password Strength | Bitwarden
A password strength tester instantly provides this information and empowers you to choose the strongest possible password to keep your account information safe. Strong and unique passwords can be automatically generated for free using the Bitwarden ...
Find elsewhere
🌐
Reddit
reddit.com › r/bitwarden › can we get password health checker?
Can we get Password Health checker? : r/Bitwarden
February 1, 2025 - You can use Bitwarden's Password Tester. Of course, some on here will tell you that strength testers are kind of junk since they don't account for how brute force attacks go about cracking passwords.
🌐
Reddit
reddit.com › r › Bitwarden › comments › 18rc0gl › the_most_effective_strategy_for_achieving
Reddit - The heart of the internet
May 28, 2023 - Go to Bitwarden · r/Bitwarden • · dwaxe · bitwarden.com Open · New to Reddit? Create your account and connect with a world of communities. Continue with Email · Continue With Phone Number · By continuing, you agree to our User Agreement and acknowledge that you understand the Privacy Policy.
🌐
Reddit
reddit.com › r › Bitwarden › comments › zzvi0r
r/Bitwarden - Bitwarden Password Strength Tester
February 12, 2020 -

In light of the recent LastPass breech I looked at different strength test websites to see how long a password would hold up under a offline brute-force attack.

The password I tried was: Aband0nedFairgr0und

This is a a 19 character password with a combination of uppercase/lowercase/numbers. Granted, there is no special characters.

I went to 5 different password strength sites and they all give me wildly different results for how long it would take to crack.

As you can see the results are all over the place!

Why is the Bitwarden result so low and if the attacker had zero knowledge of the password, is it feasible to take an average of the diufferent results and assume that password is sronger that 1 day?

PS: Dont worry, Aband0nedFairgr0und is not a password I use and was made up as a test.

Top answer
1 of 5
62

The other explanations here are true but maybe this will clarify why.

Bad password checkers assume a cracking program will guess, in order: a, b, c, … aa, ab, ac, ad, … and so on forever. Good password strength checkers calculate entropy (~randomness) with the assumption of common reasonable wordlists and standard variations on those words, in addition to gibberish character strings.

Password cracking tools don’t tend to guess every single random string of characters from shortest to longest, since many people are more likely to choose real words or variations of words.

So, for example, “eggplan” is actually a stronger password than “eggplant” despite having fewer characters. They’re both awful, but any decent password cracking tool will guess a word a human is more likely to choose first (vs egg + plan, two unusual words to combine). “eggplan” will even take longer to crack than “eggpl@nt” because a→@ is such a common substitution for humans trying to strengthen their passwords that password cracking tools will likely try it first.

Extending to longer sequences, 3-6 memorable unmodified words chosen randomly from very long lists will usually be both more memorable and harder to crack than 2-3 words with symbols inserted.

Edit to add: the best way to get a sense of how this works in practice is here: https://lowe.github.io/tryzxcvbn/

2 of 5
33

Bitwarden.com uses zxcvbn to calculate the time-to-crack. You can try it online at https://lowe.github.io/tryzxcvbn/ and it'll tell how it arrived at a time of 1 day.

🌐
Reddit
reddit.com › r/bitwarden › how to use the bitwarden passphrase generator
r/Bitwarden on Reddit: How to use the Bitwarden Passphrase Generator
May 7, 2024 - It's an option in the Bitwarden's passphrase generator, it increases the passphrase entropy by a negligible amount (5–6 bits), and its purpose is to allow compliance with password rules that require a number in the password.
🌐
Bitwarden
community.bitwarden.com › ask the community › password manager
Testing my master password - Questions - Password Manager - Bitwarden Community Forums
March 30, 2024 - I am mildly curious as to whether my master password is secure, so I did some reading on the Data Breach report. I say “mildly concerned” because my master PW is well over 16 characters, in addition to having some other …
🌐
Reddit
reddit.com › r/bitwarden › another password strength question
r/Bitwarden on Reddit: Another Password Strength Question
August 9, 2020 -

I really appreciate all the advice on this sub regarding password strength, but I'm having a very hard time getting my head around it all. I've been looking at the zxcvn testing page, which is apparently what the Bitwarden password tester is based on. I've been playing around with a range of example passwords, similar to what I have used in the past. When I put in a 20 character pass phrase, using only upper and lower case letters, their estimation for fastest possible time to crack is "10B / second: 41 years (offline attack, fast hash, many cores)". However, if I add only 1 more character, that changes to "centuries". From then on, no matter how many more random characters I add, it still simply says "centuries". This seems to imply that there is no extra benefit to having a 50 character password over and above a 21 character password. I'm sure this is not the case, and that I've misunderstood something, but can someone explain what I'm missing?

🌐
Bitwarden
bitwarden.com › password-security-checker
Password Security Checker: Everything You Need to Know | Bitwarden
Ready to test the strength of your passwords? Try the free and secure · Bitwarden Strength Tester.
🌐
Bitwarden
bitwarden.com › blog › how strong is my password?
How strong is my password? | Bitwarden
This tool gauges how long it might take to crack your password by testing it against known criteria such as length, randomness, and complexity. Using the password strength tester will give you a quick answer to the question “how strong is ...
🌐
Bitwarden
bitwarden.com › blog › how to test the strength of your passwords in 2022
How to Test the Strength of Your Passwords in 2022 | Bitwarden
Use these best practices and free online tools to help you generate strong passwords and test the strength of existing passwords for your online accounts.