TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

World's Largest Wi-Fi Network Keeps Passwords in Plain Text

124 点作者 legierski超过 13 年前

10 条评论

petenixey超过 13 年前
Most people are arguing that a password shouldn't ever be recoverable and that "even root level access should not grant you passwords".<p>This feels like shaky logic though. Hashing is a good defence against DB harvesting but it doesn't stop a root level admin from listening to inbound unencrypted logins. Prolonged root access is therefore still a viable attack vector. The question is only how quickly you can harvest those passwords.<p>Other people are arguing that with sufficient decoupling and safeguards between the encryption key and the database there is an acceptable risk associated with storing a password.<p>Since services like Yodlee clearly do store passwords this is something that companies do address. Could someone who really knows this area well please describe how this is done in a way to minimise risk and how the risk compares to a traditional 1-way hashing?
评论 #3419737 未加载
评论 #3419694 未加载
评论 #3419681 未加载
评论 #3422313 未加载
ch0wn超过 13 年前
I can't believe that this is still common practice in some large-scale businesses. In my imagination of a perfect world I would never get in touch with a user's plain text password at all.
评论 #3419330 未加载
JTxt超过 13 年前
Yes. It's way too common and sickening.<p>I first reported a similar issue to Rackspace Cloud 2/2/2010:<p><a href="http://feedback.rackspacecloud.com/forums/71021-product-feedback/suggestions/1154383-do-not-send-root-password-by-email-" rel="nofollow">http://feedback.rackspacecloud.com/forums/71021-product-feed...</a><p>They still email new vps ROOT passwords with IP addresses. (At least they said they would fix it about 2 months ago.)<p>Perhaps there's not enough people that are bothered by this? There is this site: <a href="http://plaintextoffenders.com/" rel="nofollow">http://plaintextoffenders.com/</a>
Nicolas___超过 13 年前
Being able to provide you with your password in plain text doesn't mean it's stored in plain text. There are very efficient and secure encryption algorithms that are reversible, out there.<p>Of course, sending passwords in an unencrypted email is bad practice, but that's another story.
评论 #3419487 未加载
评论 #3419303 未加载
评论 #3419323 未加载
评论 #3420235 未加载
johnnygoods超过 13 年前
Had a similar experience with Dreamhost about 2 years ago. I sent them an email pointing out the insecurity of sending passwords in an unencrypted email, but they seemed to feel that their customers "appreciated" the ease of password recovery over security.
评论 #3419622 未加载
评论 #3421182 未加载
评论 #3419695 未加载
kayoone超过 13 年前
They can still have some kind of encryption algorithm in place to encrypt/decrypt passwords in their database. That said, sending the passwords out in plain-text via Email isnt particularly secure either.
评论 #3419276 未加载
pr0filer_超过 13 年前
While sending passwords in plain text via e-mail is something that should be frowned upon, the e-mail itself is not evidence that they store your password in plain text.
评论 #3419288 未加载
评论 #3419282 未加载
alvarosm超过 13 年前
Password issues aside, Fon is a scam by a con artist. Just stop using it...
评论 #3419574 未加载
va_coder超过 13 年前
How about playing the devils advocate. How many people here own homes without a security system or don't use that system every day? It can be a pain turning the system off and on every time you leave the house.<p>If you were in the physical security business and knew of all the violence that occurs in society you would think it's crazy to not own a security system and not use it every day.<p>Now put yourself in the shoes of a non technical person and you can see how convenience sometimes trumps security.<p>Sidenote: I love asking people in the computer security business about what kind of physical security system they use at home. Most don't use one.
评论 #3419661 未加载
评论 #3419672 未加载
muyuu超过 13 年前
Unwarranted paranoia.<p>The worst thing that can happen here is that somebody connects to your wifi. If someone can read your email and is in the vicinity to connect to your wifi, the least of your problems is that he or she does connect to your wifi.<p>Also, as pointed out by others, this doesn't mean it's stored in plain text. Any time you set a password it travels in plain text (typically - and hopefully - via a secure connection) and it arrives to their server in plain text. You are never sure they are immediately storing it properly encrypted in a DB. They can also be doing things like sending it in emails or storing it elsewhere. If you cannot trust your password to whoever is storing it you are basically f<i></i>*ed. BTW, what do you think they might do whenever you enter the wrong password in the wrong site? (for instance, your email password).
评论 #3419347 未加载
评论 #3419353 未加载
评论 #3419393 未加载