Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3
BDFL - Memuneh
59070 posts

Uber Geek
+1 received by user: 10346

Administrator
Trusted
Geekzone
Subscriber

  Reply # 288880 11-Jan-2010 09:47
Send private message

Comradehunt: Damn it, it did that thing where I write a reply and click post reply, and instead it goes back to the forum homepage. Wish I knew why it did that. Keep wasting time writing replies and they get deleted. I try to copy text to clipboard before submitting but sometimes, like this time, I forget.


I can't see to reproduce this problem. Have another discussion going on.

Comradehunt: So changing from VF to Telecom broadband or vice versa, means that (any) website visited will have no clue who you are, there will be no other form of ID that gives the game away you are in fact the same person?

In this scenario do the cookies obtained during previous ISP still work, or will they be replaced with new ones and passwords, etc need to be entered again?


Cookies are stored on your PC and mostly not related to which ISP you use.




16 posts

Geek


  Reply # 288881 11-Jan-2010 09:48
Send private message

True about the wrongs, but what do you expect - technology companies that follow good computing practice - what do you expect :-)

 
 
 
 


BDFL - Memuneh
59070 posts

Uber Geek
+1 received by user: 10346

Administrator
Trusted
Geekzone
Subscriber

  Reply # 288882 11-Jan-2010 09:48
Send private message

magu:
freitasm:
friedCrumpet: Password in the cookie? I hope geekzone is well tested for XSS vulnerabilities!


Do you worry about Trade Me? They store passwords in plain text too...



Oh OK, then. Since they're doing it as well, it must be fine, right? ;D


No, it's not that it's ok. It's that I don't see people crying for things that are obviously a lot more sensitive than a login to Geekzone.




Professional yak shaver
1599 posts

Uber Geek
+1 received by user: 8

Trusted
BitSignal
Subscriber

  Reply # 288884 11-Jan-2010 09:50
Send private message

freitasm:
magu:
freitasm:
friedCrumpet: Password in the cookie? I hope geekzone is well tested for XSS vulnerabilities!


Do you worry about Trade Me? They store passwords in plain text too...



Oh OK, then. Since they're doing it as well, it must be fine, right? ;D


No, it's not that it's ok. It's that I don't see people crying for things that are obviously a lot more sensitive than a login to Geekzone.



That's because on stuff that is a lot more sensitive I'm a lot more cautious of using 'auto-login'.


I've changed my password to something really stupid now, just in case.




"Roads? Where we're going, we don't need roads." - Doc Emmet Brown

BDFL - Memuneh
59070 posts

Uber Geek
+1 received by user: 10346

Administrator
Trusted
Geekzone
Subscriber

  Reply # 288885 11-Jan-2010 09:52
Send private message

magu:
freitasm:
magu:
freitasm:
friedCrumpet: Password in the cookie? I hope geekzone is well tested for XSS vulnerabilities!


Do you worry about Trade Me? They store passwords in plain text too...



Oh OK, then. Since they're doing it as well, it must be fine, right? ;D


No, it's not that it's ok. It's that I don't see people crying for things that are obviously a lot more sensitive than a login to Geekzone.


That's because on stuff that is a lot more sensitive I'm a lot more cautious of using 'auto-login'.

I've changed my password to something really stupid now, just in case.


And you probably noticed how the field doesn't reflect your actual password anymore? Also have you tried to retrieve the password? We now send a reset link instead of your password.

These changes were implemented just before the holidays.




268 posts

Ultimate Geek


  Reply # 288886 11-Jan-2010 09:53
Send private message

freitasm:
magu:

Use a hash at a minimum.


And how good would that be? Someone can steal the hash and still use it. The password is hashed and encrypted in our database, so the only way to be stolen is in your own PC or in transit during login.

Sensible password policy: use a different one for each website.



A stolen hash only gets you into one site (provided it's salted).  Yes it is completely sensible to use different passwords for different sites but you can't really trust your users to do that can you?


Professional yak shaver
1599 posts

Uber Geek
+1 received by user: 8

Trusted
BitSignal
Subscriber

  Reply # 288887 11-Jan-2010 09:54
Send private message

That's very nice and dandy. But I'm still a bit shocked to see my (believed secure) password in plain-text inside the cookie.

Better safe than sorry.




"Roads? Where we're going, we don't need roads." - Doc Emmet Brown

BDFL - Memuneh
59070 posts

Uber Geek
+1 received by user: 10346

Administrator
Trusted
Geekzone
Subscriber

  Reply # 288888 11-Jan-2010 09:55
Send private message

friedCrumpet:
freitasm:
magu:

Use a hash at a minimum.


And how good would that be? Someone can steal the hash and still use it. The password is hashed and encrypted in our database, so the only way to be stolen is in your own PC or in transit during login.

Sensible password policy: use a different one for each website.



A stolen hash only gets you into one site (provided it's salted).  Yes it is completely sensible to use different passwords for different sites but you can't really trust your users to do that can you?



It's still access to the site... It won't solve the whole problem actually. That's my point.








1209 posts

Uber Geek
+1 received by user: 56


  Reply # 288889 11-Jan-2010 09:55
Send private message

So where do said cookies live? I think I've almost found them, I have revealed the hidden folders but just can't find them. So far I'm in users/me/appdata/local/microsoft... am I on right track?

Professional yak shaver
1599 posts

Uber Geek
+1 received by user: 8

Trusted
BitSignal
Subscriber

  Reply # 288890 11-Jan-2010 09:56
Send private message

Depends on each browser, but I believe you're close to it for IE.




"Roads? Where we're going, we don't need roads." - Doc Emmet Brown

268 posts

Ultimate Geek


  Reply # 288897 11-Jan-2010 10:14
Send private message

freitasm:
friedCrumpet:

A stolen hash only gets you into one site (provided it's salted).  Yes it is completely sensible to use different passwords for different sites but you can't really trust your users to do that can you?



It's still access to the site... It won't solve the whole problem actually. That's my point.



True, but it goes someway to protecting your users from being hacked on other sites.  No security solution is perfect but hashing the password is a simple measure that doesn't impact on the user's convenience.



1209 posts

Uber Geek
+1 received by user: 56


  Reply # 288898 11-Jan-2010 10:16
Send private message

Found them. I can't (don't know how) to access them directly as the folder does not appear even though I have revealed hidden folders. I can find it via internet options. Found my GZ password in them, but the 3 TM cookies I had did not seem to contain my password.

513 posts

Ultimate Geek
+1 received by user: 1

Trusted
Kiwi Dev Studios

  Reply # 288931 11-Jan-2010 12:11
Send private message

Comradehunt: Found them. I can't (don't know how) to access them directly as the folder does not appear even though I have revealed hidden folders. I can find it via internet options. Found my GZ password in them, but the 3 TM cookies I had did not seem to contain my password.


Agreed - a thorough look through my FF cookies reveals no Trade Me "password" cookie.. just a session ID, trademe member #, and few other odd things (screenSize??) - I'm not sure how many other sites do store password in plain text in cookies though..




--
Stephen
twitter/ NZCoderGuy / KiwiDevStudios

Kiwi Dev Studios


8020 posts

Uber Geek
+1 received by user: 386

Trusted
Subscriber

  Reply # 288935 11-Jan-2010 12:47
Send private message

If you tick remember me in trademe it stores an extra cookie with a far future expiry called: dbs_id that contains a guid.  So no they don't store plain text passwords in a cookie maybe they did in the past but it's a bad old practice that should be eliminated.

The #1 reason storing the password in a cookie in clear text is really bad is because a dictionary style attack can be used to hijack someone's session, they don't even need to steal your cookie.

Dodgy old code/practices like that should really be cleaned up whenever possible

Recommend reading this:
http://jaspan.com/improved_persistent_login_cookie_best_practice

BDFL - Memuneh
59070 posts

Uber Geek
+1 received by user: 10346

Administrator
Trusted
Geekzone
Subscriber

Reply # 288946 11-Jan-2010 13:14
Send private message

Ragnor: Recommend reading this:
http://jaspan.com/improved_persistent_login_cookie_best_practice


From the article:


Miller correctly describes the many advantages of this approach. One disadvantage, however, is that if an attacker successfully steals a victim's login cookie and uses it before the victim next accesses the site, the cookie will work and the site will issue a new valid login cookie to the attacker (this disadvantage is far from unique to Miller's design). The attacker will be able to continue accessing the site as the victim until the remembered login session expires. When the victim next accesses the site his remembered login will not work (because each token can only be used one time) but he's much more likely to think that "something broke" and just log in again than to realize that his credentials were stolen. Displaying a "last login time" may help the user notice the problem but, frequently, it will go undetected.


I was very tempted to go with a token design about two years ago. The very reason why I didn't go is because a) it only works with one browser - set a browser to remember the login means all others are gone and b) an attacker could still impersonate you if you have not logged in since the last token was issued.

I see the author proposes some workarounds for these two situations, but I am still working on what the best approach would be.

As I said the first step was to hash/encrypt the password in our database, and this was done last month.





1 | 2 | 3
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Air New Zealand experiments with blockchain technology
Posted 23-Nov-2017 15:39


Symantec selects Amazon Web Services to deliver cloud security
Posted 23-Nov-2017 10:40


New Zealand Ministry of Education chooses Unisys for cloud-based education resourcing management system
Posted 22-Nov-2017 22:00


Business analytics software powers profits for NZ wine producers
Posted 22-Nov-2017 21:52


Pyrios strikes up alliance with Microsoft integrator UC Logiq
Posted 22-Nov-2017 21:51


The New Zealand IT services ecosystem - it's all digital down here
Posted 22-Nov-2017 21:49


Volvo to supply tens of thousands of autonomous drive compatible cars to Uber
Posted 22-Nov-2017 21:46


From small to medium and beyond: Navigating the ERP battlefield
Posted 21-Nov-2017 21:12


Business owners: ERP software selection starts (and finishes) with you
Posted 21-Nov-2017 21:11


Why I'm not an early adopter
Posted 21-Nov-2017 10:39


Netatmo launches smart home products in New Zealand
Posted 20-Nov-2017 20:06


Huawei Mate 10: Punchy, long battery life, artificial intelligence
Posted 20-Nov-2017 16:30


Propel launch Disney Star Wars Laser Battle Drones
Posted 19-Nov-2017 21:26


UFB killer app: Speed
Posted 17-Nov-2017 17:01


The case for RSS — MacSparky
Posted 13-Nov-2017 14:35



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.