Welcome, Guest. Please login or register.

Login with username, password and session length

 
Advanced search

1411491 Posts in 69377 Topics- by 58433 Members - Latest Member: Bohdan_Zoshchenko

April 29, 2024, 08:02:23 AM

Need hosting? Check out Digital Ocean
(more details in this thread)
TIGSource ForumsCommunityTownhallTIG Forums uses bad password practices?
Pages: [1]
Print
Author Topic: TIG Forums uses bad password practices?  (Read 1156 times)
cliffclavin
Level 0
**



View Profile
« on: April 28, 2014, 07:50:45 AM »

As you can see I am a new member on TIG and was very very surprised and a little upset to see that upon signing up I was emailed my password in plaintext! Passwords really should be hashed and stored securely.  Typically sites are shamed out of this behavior by sites like http://plaintextoffenders.com/about/ and I would really not like to see a breach or even a shaming of TIG.  This is somewhat serious, and I hope it is taken that way.
Logged
Udderdude
Level 10
*****


View Profile WWW
« Reply #1 on: April 28, 2014, 09:16:56 AM »

Your message might get a better response here .. http://forums.tigsource.com/index.php?board=53.0
Logged
moi
Level 10
*****


DILF SANTA


View Profile WWW
« Reply #2 on: April 28, 2014, 09:21:24 AM »

send me your password, I'll encrypt it a run a security test on it
Logged

subsystems   subsystems   subsystems
Christian Knudsen
Level 10
*****



View Profile WWW
« Reply #3 on: April 28, 2014, 10:55:34 AM »

http://forums.tigsource.com/index.php?topic=37198.0
Logged

Laserbrain Studios
Currently working on Hidden Asset (TIGSource DevLog)
CutterSlade
Level 0
*



View Profile
« Reply #4 on: April 28, 2014, 12:30:10 PM »

You can't say anything about how the passwords are stored by looking at the contents of the email you received. What did you expect to see, the md5 hashed version of it? Hashed versions are used only during comparison with the one in the db on the server side.

Still, including the password in that email isn't very wise and doesn't make any sense.
« Last Edit: April 28, 2014, 12:36:59 PM by CutterSlade » Logged
Chromanoid
Level 10
*****



View Profile
« Reply #5 on: April 28, 2014, 01:05:27 PM »

Yeah, I hate this practice in forum software. PHPBB did this too at some point in time... Normally an admin can change the template for the email sent after registration.

Since emails are like postcards it would probably be a good idea. Another thing is that if somebody misspells her email address the password might be send to the wrong person. I use a new password for every site (via password manager) so it doesn't bother me that much anymore.

The default setting that the email address is public should be changed too.
« Last Edit: April 28, 2014, 01:12:36 PM by Chromanoid » Logged
Kingel
Level 2
**



View Profile WWW
« Reply #6 on: April 28, 2014, 02:42:40 PM »

You can't say anything about how the passwords are stored by looking at the contents of the email you received. What did you expect to see, the md5 hashed version of it? Hashed versions are used only during comparison with the one in the db on the server side.

You're partly right. The comparison you're talking about is being done with your password and a hash value, a one-way mapping of that password. The only way to get the password back is to brute-force the hash stored on the server (which is why hackers use rainbow tables when they steal database contents, which again is why you need salted hashes). That is, unless the server simply stores your password in plaintext, in which case it can email the password back to you when requested. This is why you would normally get a password reset email instead.
Logged

Chromanoid
Level 10
*****



View Profile
« Reply #7 on: April 28, 2014, 11:12:45 PM »

You can't say anything about how the passwords are stored by looking at the contents of the email you received. [...]
[...] That is, unless the server simply stores your password in plaintext, in which case it can email the password back to you when requested. This is why you would normally get a password reset email instead.
In case of SMF and (a former version? of) phpBB the password is sent once before storing the hashed password.
Logged
cliffclavin
Level 0
**



View Profile
« Reply #8 on: April 29, 2014, 03:29:54 AM »

True the password can still be stored as a hash.  It is still a pretty unsettling that my password at any point is being transferred in plaintext. Man in the middle attacks are common ect.  Also it being sent out by a single automated gmail means there is an outbox that is a gold mine of dev passwords, thats seriously crazy.
Logged
CutterSlade
Level 0
*



View Profile
« Reply #9 on: April 29, 2014, 06:24:04 AM »

True the password can still be stored as a hash.  It is still a pretty unsettling that my password at any point is being transferred in plaintext. Man in the middle attacks are common ect.  Also it being sent out by a single automated gmail means there is an outbox that is a gold mine of dev passwords, thats seriously crazy.
Unless they use SSL, which would be pointless in a forum such as this, the password has to be transferred in plain text at least once when you sign up. But currently they're doing this twice.
Logged
CutterSlade
Level 0
*



View Profile
« Reply #10 on: April 29, 2014, 06:33:21 AM »

That is, unless the server simply stores your password in plaintext, in which case it can email the password back to you when requested. This is why you would normally get a password reset email instead.

This forum isn't doing that, it only sends you your password right after you signed up, because it already has it in plain text at that time. There is no way to retrieve your password as plain text again because it is stored as a hashed value.

I don't know how you managed to reach the conclusion that just because it sent you your password once, it stores the passwords in plain text and can send it to you again. Have you seen a button that sends you your current password in an email? I don't think so.
Logged
Christian Knudsen
Level 10
*****



View Profile WWW
« Reply #11 on: April 29, 2014, 09:44:27 AM »

Also it being sent out by a single automated gmail means there is an outbox that is a gold mine of dev passwords, thats seriously crazy.

Just because a gmail address is set as the sender of an email generated automatically by the forum software doesn't mean that a copy ends up in that gmail account's outbox.
Logged

Laserbrain Studios
Currently working on Hidden Asset (TIGSource DevLog)
Pages: [1]
Print
Jump to:  

Theme orange-lt created by panic