TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Can you trust 37signals with your password?

189 pointsby l0stmanabout 16 years ago

20 comments

mpkabout 16 years ago
Oh boy, that's an embarrassing newbie mistake to make.
评论 #589898 未加载
评论 #589903 未加载
评论 #589936 未加载
评论 #589976 未加载
评论 #589944 未加载
datumsabout 16 years ago
I would take it a step further. Why email plain text passwords? It usually stays in your inbox. This increase the chance of someone being able to get your password. It now exists on your laptop/desktop and on a email server, depending on your settings. There should be a reset password, but not a recover password. Send a link to a secure page which asks for something the user knows/has username ?
评论 #589913 未加载
评论 #589935 未加载
评论 #589896 未加载
bclabout 16 years ago
This kind of beginner mistake makes you wonder how 'hacker safe' their system really is. You can bet that they will be improving their security soon -- making bold claims about security is one way to guarantee lots of free pen testing.
评论 #590016 未加载
cradabout 16 years ago
One thing worth pointing out is he's saying that they're storing plain text in the database, which may not be the case. They may be storing the password in the database with two way encryption. I'm not arguing the merits of that, only pointing out he's claiming fact on something he has no specific details on.
评论 #589916 未加载
评论 #589940 未加载
jackowayedabout 16 years ago
That doesn't necessarily mean that it's in plaintext. It could just be a 2-way encryption algorithm. That's what I did for my Twitter app pre-OAuth. That way, the passes are encrypted, but I could still decode them to send them to Twitter.<p>Now, the way I did it, at least, the key for decrypting it was in my code, so if someone hacked, there's a good chance that they would look through the code and figure out what the algorithm was and what the code was.<p>Still, if they just took the db and got out, and I fixed the hole before they realized it and came back, they would have a very hard time getting the passes.<p>37signals might be doing something like that, which is better than nothing. Now, they have no reason not to use a 1-way encryption algorithm, so it's still less secure than it should be.
评论 #590238 未加载
ten7about 16 years ago
You said "37signals stores passwords in plain text in their database"<p>You have no way of knowing how they store their data! And saying something like this is ludicrous and insulting, IMHo. Sure, they emailed you your password. That doesn't mean the password was stored in "plain text"... it just means it was stored. Yes, a one way hash would be better, but they stored the password. That doesn't mean the password was not encrypted when it was stored. It also does not mean the encryption key and the storage database are not on different servers -- which would be harder to crack, since it would mean two servers would have to be compromised. There is the possibility that they used two way encryption. That exists, you know...<p>Just sayin'...
评论 #590623 未加载
shalmaneseabout 16 years ago
People are missing the point. The main reason for this is not to defend against "hackers" so much as malicious employees within the company. If you hash and salt the passwords, it's simply not possible for anyone within the organization to access them. Even if you trust all your employees, it can help in avoiding liability.
ErrantXabout 16 years ago
The main securityy issue is not so much that the data is in plain text if extracted - it is the fact that it can be instanlty used.<p>If you can only pull hashed, salted passwords from a site there is a LONG delay before you can make use of it, if at all. But with a plain text password a cracker can pull paswords, access accounts instanlty, harvest the data and potenetially ruin your site in minutes. There is no time delay in which potentially you can catch the intrusion.<p>The defence by delay is one of the STRONGEST defence mechanisms you can have. Every day that data is unusable to a cracker the less value it has for him/her and the more chance the intrusion will be noticed.
madairabout 16 years ago
LOL, a favorite like 37signals does something so egregiously wrong, is reported, and there's plenty of security 'experts' to say no big deal. This is a HUGE deal, and thanks to the OP for pointing it out. And you call yourselves experts. Note to self, be sure to avoid writings by Thomas Ptacek, if these are his standards.
FraaJadabout 16 years ago
reddit made this mistake early on and they learnt their lesson. They no longer store passwords in plain text.<p>The popularity of a service does not guarantee that it's developers are covering all the bases.<p>I'm glad Django stores all the passwords as a sha1 hash.
评论 #589926 未加载
davidwabout 16 years ago
The comments are impressive... pretty much all of them are people rushing to the defense of 37 Signals.
评论 #590251 未加载
simonwabout 16 years ago
Anyone know if 37signals still allow people to XSS their own Basecamp accounts? <a href="http://forum.37signals.com/basecamp/forums/5/topics/3155" rel="nofollow">http://forum.37signals.com/basecamp/forums/5/topics/3155</a>
评论 #589992 未加载
评论 #590021 未加载
dfrankeabout 16 years ago
Anyone who asserts in blanket terms that his application is secure is providing evidence to the contrary. Anyone who actually groks security won't make any such claim without loading it with carefully-chosen qualifiers.
rythieabout 16 years ago
Whilst doing hashed passwords is a no-brainer and it solves process problems like employees emailing passwords to people (who maybe impersonators) I don't think it solves all the problems with password security.<p>Unless you have a strong password policy, john the ripper can often find several passwords (out of 100+) in literally a few <i>seconds</i> by doing dictionary attack, variants and common terms. I would say that someone's hashed password should be well protected as a unencrypted one would be even inside an organization.
评论 #590093 未加载
duncanjabout 16 years ago
A long time ago I learned a technique where you use a random salt to add several bytes to a password. The salt is not stored, but rather the authenticating server does a brute-force search for it, using the user's password as a stem.<p>For some reason, it just doesn't seem useful to me to store the salt with the user's record, if you're worried about someone with a rainbow crack running through your password file.<p>Edit: that last paragraph was stupid.
评论 #589927 未加载
评论 #589912 未加载
Batsuabout 16 years ago
While it's important that the passwords aren't stored in plain text, it should be noted that it is also the last line of defense, not the first. There are plenty of other things to stop you on the way there (not having access to the email, not being able to crack into their data center, the normal stuff).<p>Just because passwords are in plain text it doesn't mean that suddenly everyone is in trouble.
评论 #589924 未加载
pgabout 16 years ago
I would have expected Rails libs to store hashes by default. Don't they?
评论 #590131 未加载
psrangaabout 16 years ago
Protect yourself against lax companies like this with the PwdHash Firefox extension. <a href="http://www.pwdhash.com/" rel="nofollow">http://www.pwdhash.com/</a>
geuisabout 16 years ago
Military.com is another company that stores their passwords in plain text.
slavingiaabout 16 years ago
obviouky. qhy da fuck not.