TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Time to reset some passwords

28 pointsby nathanhover 15 years ago

9 comments

jmillikinover 15 years ago
Is it common practice to log POST parameters? I've never seen such behavior outside of development environments, but that might be because I've never run a very large web application.<p><pre><code> an unscrupulous systems administrator [...] could determine that my password is Th1s1sMyP@ssword just by looking at the logs. </code></pre> Couldn't the systems administrator simply change the log code to not filter passwords, or to email the password on each successful login attempt? That seems more reliable and productive than waiting for a user to click the wrong input box.
评论 #1141135 未加载
评论 #1141613 未加载
simonwover 15 years ago
By this logic ("an unscrupulous sysadmin could pull my password out of the logs"), surely the author should be changing all of their passwords after every attempt they make to log in to anything using the password field? I don't get it.
评论 #1141196 未加载
shrughesover 15 years ago
This is why I prefix my password with several z's. It makes typing the password feel different than typing the username, and since this change, I've always managed to catch myself quickly enough.
synnikover 15 years ago
If the sysadmin is truly unscrupulous, they might be flat out writing all successful passwords to a database.<p>Never lose sight of the fact that anything you send online can be stored by the site owner. Make your own judgments on how you react to that, but never forget.
krobertsonover 15 years ago
That could all be mute if the service doesn't even encrypt passwords, doesn't use one way hashing/encryption, but still assumes the servers are insecure.
评论 #1141263 未加载
zefhousover 15 years ago
Sounds like the problem is more that the same password is used in multiple places. If you use the same password on a bunch of websites you can be almost certain that it could be easily compromised somewhere along the line.<p>If you don't use a password manager, it is extremely difficult to not reuse passwords and it's just not going to happen for the lay person. Here's the advice that I give to friends:<p>1. At the very least, you should have a secure password for only very reputable websites that control valuable information.<p>2. Use a unique password on your email account.<p>3. Use another password to sites where security isn't that important.
javanover 15 years ago
Time to start using 1Password!
评论 #1141523 未加载
cmelbyeover 15 years ago
If the attacker has obtained access to the server, he can simply modify the code to not filter passwords from the log file anymore. I don't see how this is a surprising problem.
ErrantXover 15 years ago
It's a reasonable point.<p>Though in a way it does sound like a solution looking for a problem.
评论 #1141423 未加载