TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Can you trust 37signals with your password?

189 点作者 l0stman大约 16 年前

20 条评论

mpk大约 16 年前
Oh boy, that's an embarrassing newbie mistake to make.
评论 #589898 未加载
评论 #589903 未加载
评论 #589936 未加载
评论 #589976 未加载
评论 #589944 未加载
datums大约 16 年前
I would take it a step further. Why email plain text passwords? It usually stays in your inbox. This increase the chance of someone being able to get your password. It now exists on your laptop/desktop and on a email server, depending on your settings. There should be a reset password, but not a recover password. Send a link to a secure page which asks for something the user knows/has username ?
评论 #589913 未加载
评论 #589935 未加载
评论 #589896 未加载
bcl大约 16 年前
This kind of beginner mistake makes you wonder how 'hacker safe' their system really is. You can bet that they will be improving their security soon -- making bold claims about security is one way to guarantee lots of free pen testing.
评论 #590016 未加载
crad大约 16 年前
One thing worth pointing out is he's saying that they're storing plain text in the database, which may not be the case. They may be storing the password in the database with two way encryption. I'm not arguing the merits of that, only pointing out he's claiming fact on something he has no specific details on.
评论 #589916 未加载
评论 #589940 未加载
jackowayed大约 16 年前
That doesn't necessarily mean that it's in plaintext. It could just be a 2-way encryption algorithm. That's what I did for my Twitter app pre-OAuth. That way, the passes are encrypted, but I could still decode them to send them to Twitter.<p>Now, the way I did it, at least, the key for decrypting it was in my code, so if someone hacked, there's a good chance that they would look through the code and figure out what the algorithm was and what the code was.<p>Still, if they just took the db and got out, and I fixed the hole before they realized it and came back, they would have a very hard time getting the passes.<p>37signals might be doing something like that, which is better than nothing. Now, they have no reason not to use a 1-way encryption algorithm, so it's still less secure than it should be.
评论 #590238 未加载
ten7大约 16 年前
You said "37signals stores passwords in plain text in their database"<p>You have no way of knowing how they store their data! And saying something like this is ludicrous and insulting, IMHo. Sure, they emailed you your password. That doesn't mean the password was stored in "plain text"... it just means it was stored. Yes, a one way hash would be better, but they stored the password. That doesn't mean the password was not encrypted when it was stored. It also does not mean the encryption key and the storage database are not on different servers -- which would be harder to crack, since it would mean two servers would have to be compromised. There is the possibility that they used two way encryption. That exists, you know...<p>Just sayin'...
评论 #590623 未加载
shalmanese大约 16 年前
People are missing the point. The main reason for this is not to defend against "hackers" so much as malicious employees within the company. If you hash and salt the passwords, it's simply not possible for anyone within the organization to access them. Even if you trust all your employees, it can help in avoiding liability.
ErrantX大约 16 年前
The main securityy issue is not so much that the data is in plain text if extracted - it is the fact that it can be instanlty used.<p>If you can only pull hashed, salted passwords from a site there is a LONG delay before you can make use of it, if at all. But with a plain text password a cracker can pull paswords, access accounts instanlty, harvest the data and potenetially ruin your site in minutes. There is no time delay in which potentially you can catch the intrusion.<p>The defence by delay is one of the STRONGEST defence mechanisms you can have. Every day that data is unusable to a cracker the less value it has for him/her and the more chance the intrusion will be noticed.
madair大约 16 年前
LOL, a favorite like 37signals does something so egregiously wrong, is reported, and there's plenty of security 'experts' to say no big deal. This is a HUGE deal, and thanks to the OP for pointing it out. And you call yourselves experts. Note to self, be sure to avoid writings by Thomas Ptacek, if these are his standards.
FraaJad大约 16 年前
reddit made this mistake early on and they learnt their lesson. They no longer store passwords in plain text.<p>The popularity of a service does not guarantee that it's developers are covering all the bases.<p>I'm glad Django stores all the passwords as a sha1 hash.
评论 #589926 未加载
davidw大约 16 年前
The comments are impressive... pretty much all of them are people rushing to the defense of 37 Signals.
评论 #590251 未加载
simonw大约 16 年前
Anyone know if 37signals still allow people to XSS their own Basecamp accounts? <a href="http://forum.37signals.com/basecamp/forums/5/topics/3155" rel="nofollow">http://forum.37signals.com/basecamp/forums/5/topics/3155</a>
评论 #589992 未加载
评论 #590021 未加载
dfranke大约 16 年前
Anyone who asserts in blanket terms that his application is secure is providing evidence to the contrary. Anyone who actually groks security won't make any such claim without loading it with carefully-chosen qualifiers.
rythie大约 16 年前
Whilst doing hashed passwords is a no-brainer and it solves process problems like employees emailing passwords to people (who maybe impersonators) I don't think it solves all the problems with password security.<p>Unless you have a strong password policy, john the ripper can often find several passwords (out of 100+) in literally a few <i>seconds</i> by doing dictionary attack, variants and common terms. I would say that someone's hashed password should be well protected as a unencrypted one would be even inside an organization.
评论 #590093 未加载
duncanj大约 16 年前
A long time ago I learned a technique where you use a random salt to add several bytes to a password. The salt is not stored, but rather the authenticating server does a brute-force search for it, using the user's password as a stem.<p>For some reason, it just doesn't seem useful to me to store the salt with the user's record, if you're worried about someone with a rainbow crack running through your password file.<p>Edit: that last paragraph was stupid.
评论 #589927 未加载
评论 #589912 未加载
Batsu大约 16 年前
While it's important that the passwords aren't stored in plain text, it should be noted that it is also the last line of defense, not the first. There are plenty of other things to stop you on the way there (not having access to the email, not being able to crack into their data center, the normal stuff).<p>Just because passwords are in plain text it doesn't mean that suddenly everyone is in trouble.
评论 #589924 未加载
pg大约 16 年前
I would have expected Rails libs to store hashes by default. Don't they?
评论 #590131 未加载
psranga大约 16 年前
Protect yourself against lax companies like this with the PwdHash Firefox extension. <a href="http://www.pwdhash.com/" rel="nofollow">http://www.pwdhash.com/</a>
geuis大约 16 年前
Military.com is another company that stores their passwords in plain text.
slavingia大约 16 年前
obviouky. qhy da fuck not.