TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

OVH Security Incident

123 点作者 bjonathan将近 12 年前

8 条评论

jacquesm将近 12 年前
OVH has come a long way. They used to be cheap and bad at service and totally incommunicado about any issues. Then a few years back something changed and they started to work on their image. Their still cheap, but their service is good and getting better and they seem to have nailed the communications angle. Good for them. Between OVH, Hetzner and Leaseweb the EU hosting space is doing fine.
评论 #6086532 未加载
评论 #6084755 未加载
评论 #6084415 未加载
computer将近 12 年前
The level of transparency in this report is great. Especially compared to things like the Linode incidents.
评论 #6084140 未加载
评论 #6084284 未加载
peterkelly将近 12 年前
This is how you do a security incident disclosure.<p>I hope Apple is taking notes.
评论 #6084730 未加载
mrb将近 12 年前
<i>&quot;The encryption password is &quot;Salted&quot; and based on SHA-512, to avoid brute-force attacks. It takes a lot of technical means to find the word password clearly&quot;</i><p>&quot;clearly?&quot; OVH is wrong. Based on this information alone, it is not sufficient to say how costly it is to recover the password. SHA-512 needs to be <i>iterated</i> to make it costly to brute force.<p>For example, a raw SHA-512 hash, even salted, is not iterated and is easy to brute force. But multiple passes, as in crypt-SHA-512, are iterated and very costly to brute force.
评论 #6085686 未加载
评论 #6085619 未加载
评论 #6085320 未加载
ihsw将近 12 年前
Hacked again?<p><a href="https://bitcointalk.org/index.php?topic=186902.msg1936161#msg1936161" rel="nofollow">https:&#x2F;&#x2F;bitcointalk.org&#x2F;index.php?topic=186902.msg1936161#ms...</a>
评论 #6085038 未加载
Robin_Message将近 12 年前
If I was a customers, I&#x27;d be asking if &quot;based on SHA-512&quot; means some kind of iterated algorithm, or if have they lost my password?
评论 #6084281 未加载
评论 #6085610 未加载
评论 #6085675 未加载
评论 #6084162 未加载
评论 #6084141 未加载
nnwa将近 12 年前
&quot;After internal investigations, it appeared that a hacker was able to obtain access to an email account of one of our system administrators.&quot;<p>That translates to password reuse, or an insecure password.
评论 #6084613 未加载
donohoe将近 12 年前
<p><pre><code> An email will be sent today with the new password </code></pre> Password in plain-text? I understand the convenience factor but doesn&#x27;t sound very secure...
评论 #6085203 未加载