Prompted by a recent conversation, a short, living list of password-length breakpoints relative to hashes, in bytes (will shorten with a CW after it stabilizes):
7 - Max length of the first and second halves of an LM password. This means that any ASCII LM password, regardless of length and composition, can be cracked in under five minutes on modern gear.
8 - Max length of a descrypt password. If ASCII, can be fully exhausted on prosumer gear in a couple of days (worst case)
8 - WPA2 minimum length
8 - Minimum length of some Ethereum passphrases
8 - Max length of AS/400 and older iSeries mainframe passwords
10 - Max length of newer iSeries mainframe passwords (if QPWDMAXLEN is configured)
14 - Max "length" of an LM password (even though it's really two 7-byte passwords)
14 - Max value for the native minimum password length policy setting in Windows (unless third party passfilt.dll or fine-grained rules are used)
15 - Length at which LM password default will be ignored, and the hash will be forced to be NTLM (except some machine-account corner cases, which may truncate to 14)
63-64 - Max length of WPA2 (depending on implementation)
72 - Max length of a bcrypt password
128 - Max length for newer IBM mainframes when configured
What am I missing? (Will merge any validated replies)
Note: chars != bytes, lots of corner cases, YMMV.
Scope note - too many website length restrictions / symptoms to list here, but https://github.com/apple/password-manager-resources is a great place for that!