|
UTF-8: Unexpected Technical Fault-8
|
|
|
|
|
There is no icon large enough to represent my feelings about this one. A professional hosting company should not be making that mistake.
|
|
|
|
|
But perhaps one of their clueless drones in support?
I'm invincible, I can't be vinced
|
|
|
|
|
Stats would say that only 500 addresses and passwords are "in the open", with the hackers claiming that they stole 16Gb worth of data.
News said that 225000 people (out of 2 million) have changed their password "already".
..damn, we're fast acting people 'ere, with all our modern technologies
Bastard Programmer from Hell
|
|
|
|
|
It is getting worser. After changing your password they'll send you the username and new password by snail mail. And the password is readable without opening the envelope.
|
|
|
|
|
This isn't actually as much of an epic fail as it appears, since users will presumably change their password immediately upon receiving the letter, so interceptors can only use the password for maybe a day. Considering they've already been hacked in plain text, that's not so bad.
It is stupid and symptomatic of a complete failure of security policy, definitely, and pretty shameful. But, imo, not as bad as storing the passwords in plain text in the first place.
|
|
|
|
|
This is a after a password change, not a password reset.
They send you a letter every time you change your password, not only the first time.
And one of the passwords is also used for account management, so this is really bad in my opinion.
|
|
|
|
|
Oh, okay, then I retract my comment, heh. I assumed this was something they'd sent as a one off in response to the hacking. That is spectacularly stupid, so much so that I hadn't even considered it as a possibility for what you meant.
|
|
|
|
|
The place I used to work at would send out the protected product and the unlock code in separate mailings for security sake.
Management decided to do a major update that required sending out new product and unlock codes. They came to us saying they had already designed the custom mailing package that would include both in one. We tried in vain to convince them that the only time product and unlock codes came within 5 feet of each other in normal production would be only if the person carrying the product happened to be walking past the person carrying the unlock letters. There was no mechanism in place to tie them together and it had purposely been designed that way for security reasons.
But the new packing material had already been ordered and was on the way so we had to come up with something. Heaven forbid management making a mistake of not seeing how and why things were the way before they went off and committed to doing something that violated all the security mechanisms that had been put in place to protect the product.
|
|
|
|
|
The fact that the password can be retrieved even 1 millisecond after it is set indicates a complete lack of knowledge on secure data storage. Snail mail, e-mail, it's outrageous that the password can be sent at all.
I am NOT AT ALL concerned about UTF8 being used, but I am concerned about HOW it is used. The fact that "secure" measures were implemented immediately after the hack was found indicates there aren't secure measures available, period.
Say “password” is your password. (I know, it's really bad that it is an allowed password.)
You type password on your SSL site, the public key encrypts it and sends what looks like garbage on the net across to the service, the private key the service knows decrypts it back to password. It then sends “280938dkl;sideruos,xa]s[04938udkj.fhwsyJFLGJDK09sjdklkeru.xx” as the (bogus example of an) encryption key to the database. “password” is never stored anywhere.
The service and the database are on a private internet connection, so the key is never exposed. UTF8 is used to define the key. You don't need to even store the encryption key, but if you don't, when the customer forgets his password, all his data is lost forever.
So, on his account table, you store the encryption key as an encrypted field using a “secure” company password
It takes time to set up that kind of secure process if it isn't in place. The fact they “fixed” it so quickly means they don't plan on really fixing it, ever.
|
|
|
|
|
That's the bestest!
|
|
|
|
|
they should switch to base64. The extra factor of 8 makes it unbreakable for the foreseeable future.
|
|
|
|
|
Base64 is actually 6 bits encoding nothing to do with 64 bits.
|
|
|
|
|
I think he knows that...Check out the title of this forum?
Ideological Purity is no substitute for being able to stick your thumb down a pipe to stop the water
|
|
|
|
|
Let's say I mentioned that for the people who don't know.
|
|
|
|
|
Ideological Purity is no substitute for being able to stick your thumb down a pipe to stop the water
|
|
|
|
|
What the ****
They Saved password in plain test????????????
|
|
|
|
|
I don't understand why everyone can't just stick with ROT13 - it's tried and tested AND has the advantage of being fully based on a prime number.
Cheers
|
|
|
|
|
Eddy Vluggen wrote:
The largest Dutch ISP has not yet learnt how to securely store a password.
Calm down; its just you ISP. Nothing has gone from your account, right?
Eddy Vluggen wrote: I'll even be moving my money from the bank tomorrow unless they can prove that they're not saving my password in plain-text format.
In case they were, it will not only you whose account can be hacked. Take it easy.
Regards,
Jwalant Natvarlal Soneji
|
|
|
|
|
Jwalant Natvarlal Soneji wrote: Calm down; its just you ISP.
It's my primary email, and I was under the assumption that my data was stored securely.
Jwalant Natvarlal Soneji wrote: In case they were, it will not only you whose account can be hacked. Take it easy.
2 million accounts, and this is not something you can simply shrug of. The information on secure passwords is freely available on the internet, and I'm paying a generous amount for the service. This kind of amateuristic crap shouldn't happen.
Bastard Programmer from Hell
|
|
|
|
|
I'm unable to see your link, because dropbox is not blocked here, but maybe what they meant was that UTF8 is the encoding used to store the encrypted charaters, which leaves 1114111 different characters possible if the UTF-8 specification is strictly followed.
"To alcohol! The cause of, and solution to, all of life's problems" - Homer Simpson
|
|
|
|
|
It was saved in plain text, otherwise they didn't need to send a mail to 2 million people telling them to change their password.
Bastard Programmer from Hell
|
|
|
|
|
That's not the only reason to send a mail to everyone to change their password. This typically happens in any case of a breach, because encrypted or not the password is compromised.
"To alcohol! The cause of, and solution to, all of life's problems" - Homer Simpson
|
|
|
|
|
Not if it's merely a hash, with the salt in a different location.
There shouldn't have been a breach, and when there was, the passwords should not have been in plain text format.
Bastard Programmer from Hell
|
|
|
|
|
I agree, if it's just a hash and the salt is somewhere else.
And breaches happen, even hotmail has been breached already, it happens, nothing is breach proof.
Now, if you're saying that it really was in plain text format, well you know better than me about the news.
|
|
|
|