TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OVH Security Incident

123 pointsby bjonathanalmost 12 years ago

8 comments

jacquesmalmost 12 years ago
OVH has come a long way. They used to be cheap and bad at service and totally incommunicado about any issues. Then a few years back something changed and they started to work on their image. Their still cheap, but their service is good and getting better and they seem to have nailed the communications angle. Good for them. Between OVH, Hetzner and Leaseweb the EU hosting space is doing fine.
评论 #6086532 未加载
评论 #6084755 未加载
评论 #6084415 未加载
computeralmost 12 years ago
The level of transparency in this report is great. Especially compared to things like the Linode incidents.
评论 #6084140 未加载
评论 #6084284 未加载
peterkellyalmost 12 years ago
This is how you do a security incident disclosure.<p>I hope Apple is taking notes.
评论 #6084730 未加载
mrbalmost 12 years ago
<i>&quot;The encryption password is &quot;Salted&quot; and based on SHA-512, to avoid brute-force attacks. It takes a lot of technical means to find the word password clearly&quot;</i><p>&quot;clearly?&quot; OVH is wrong. Based on this information alone, it is not sufficient to say how costly it is to recover the password. SHA-512 needs to be <i>iterated</i> to make it costly to brute force.<p>For example, a raw SHA-512 hash, even salted, is not iterated and is easy to brute force. But multiple passes, as in crypt-SHA-512, are iterated and very costly to brute force.
评论 #6085686 未加载
评论 #6085619 未加载
评论 #6085320 未加载
ihswalmost 12 years ago
Hacked again?<p><a href="https://bitcointalk.org/index.php?topic=186902.msg1936161#msg1936161" rel="nofollow">https:&#x2F;&#x2F;bitcointalk.org&#x2F;index.php?topic=186902.msg1936161#ms...</a>
评论 #6085038 未加载
Robin_Messagealmost 12 years ago
If I was a customers, I&#x27;d be asking if &quot;based on SHA-512&quot; means some kind of iterated algorithm, or if have they lost my password?
评论 #6084281 未加载
评论 #6085610 未加载
评论 #6085675 未加载
评论 #6084162 未加载
评论 #6084141 未加载
nnwaalmost 12 years ago
&quot;After internal investigations, it appeared that a hacker was able to obtain access to an email account of one of our system administrators.&quot;<p>That translates to password reuse, or an insecure password.
评论 #6084613 未加载
donohoealmost 12 years ago
<p><pre><code> An email will be sent today with the new password </code></pre> Password in plain-text? I understand the convenience factor but doesn&#x27;t sound very secure...
评论 #6085203 未加载