We have a number of network services and web-apps authenticating users differently, some with different password requirements for very bad technical reasons. For example, one system refused $
signs until someone "fixed" the string handling in some Perl scripts. Another system appears to parse @
signs in passwords. Another system issues users passwords to them, and the developer was proud to show me that it was a reversible transformation of the username.
I understand that password hashes are preferred; but I wonder how much must necessarily be sacrificed in the transition to browser based software. For my own edification, and to make a case for change, are there authoritative references on the subject of password handling and management that I can show those in my department and those responsible for other services?