SafeNET
  • Overview
  • Basic
    • Setup
    • Address whitelist
  • FAQ
    • Known issues
    • Is GeyserMC supported?
    • Passphrases
    • I have trouble connecting to the server.
    • What's the difference between SafeNET and BungeeGuard?
Powered by GitBook
On this page
  • Security concerns
  • Data payload
  1. FAQ

Passphrases

Answer to this frequently asked question.

PreviousIs GeyserMC supported?NextI have trouble connecting to the server.

Last updated 12 months ago

The recommended value is 1000. Continue reading if you are concerned about the security or connection performance.

Security concerns

Each character of the newly generated passphrase is randomly picked from 90 different characters. That means, passphrase of length 1 has 90 posibilities in total, passphrase of length 2 has 90290^2902 possibilities...

Generally, passphrase of length nnn has 90n90^n90n different possibilities. That means, passphrase of length 1000 has approximately around 1.71.71.7 multiplied by 2000th power of 101010 of possibilities.

According to , such password would take more than 1900 times the to bruteforce. Taking this into account, it is more probable that some plugin with backdoors will steal the passphrase, than the passphrase getting bruteforced randomly.

Passphrase guidelines:

  • Passphrases shorter than 50 characters are considered weak. If using such passphrase, the plugin will display a warning each time the server starts.

  • Never share it with anyone else.

  • Regenerate it once in a while, just in case.

  • Use the built-in generator only - avoid any internet communication.

Data payload

Each character is 1B of data (assuming ASCII character set), so passphrase of length 1000 is equal to 1kB of data transfered between the proxy and backend servers.

this article
age of the universe