Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 
jbard
1377 posts

Uber Geek


  #623629 11-May-2012 17:58
Send private message

jree: Hi,

I'm one of the security guys at 2deg. We've been looking at this since Phillip got in touch.

The issue is on the fix list. couple of weeks hopefully

Generally the issue occurs on forgotten password, account reset from CS, or first time login.
In most cases the user should receive a OTP (24hr expiry) via sms.
Once logged in the new password is hashed etc in the backend.

Some of the other things mentioned were:
External audit.... We do engaged a third party #notanaccountingfirm to review the security of these servers and other elements across the 2deg infrastructure regularly.

PCI... I'll leave it to a QSA to decide what is in/out of scope however no customer CC data traverses or passes through these web servers. I'm not a web guru but the standard iframe setup is used with a backend validation system based off token.

We use equipment made be large asian vendors... I can neither confirm nor deny that both Nth american and asian vendors are involved in 2deg, nor can I confirm nor deny the level of trust we afford either :-)

Thanks
J




If you are hashing it on the backend how can you get it back to clear text in the js?
Unless you are using an algorithm that can be decrypted but that basically makes your hashing useless?



jree
13 posts

Geek


  #623631 11-May-2012 18:04
Send private message

jbard: 


If you are hashing it on the backend how can you get it back to clear text in the js?
Unless you are using an algorithm that can be decrypted but that basically makes your hashing useless?


Hi,

The pwd should be an OTP sent and created by us.

Chrs J


jbard
1377 posts

Uber Geek


  #623637 11-May-2012 18:10
Send private message

jree:
jbard: 


If you are hashing it on the backend how can you get it back to clear text in the js?
Unless you are using an algorithm that can be decrypted but that basically makes your hashing useless?


Hi,

The pwd should be an OTP sent and created by us.

Chrs J



So you are saying the OTP password is left in the clear but the users password is hashed+salted?



jree
13 posts

Geek


  #623644 11-May-2012 18:22
Send private message

jbard: 

So you are saying the OTP password is left in the clear but the users password is hashed+salted?


Yes. The fact the OTP is in the clear is also bad even though it has a 24 hr expiry.
The clear OTP is the bit we are going to fix... but it will take a few weeks to get to production.

Chrs J

jbard
1377 posts

Uber Geek


  #623646 11-May-2012 18:26
Send private message

jree:
jbard: 

So you are saying the OTP password is left in the clear but the users password is hashed+salted?


Yes. The fact the OTP is in the clear is also bad even though it has a 24 hr expiry.
The clear OTP is the bit we are going to fix... but it will take a few weeks to get to production.

Chrs J


Yeah it isn't as big a deal as the normal pwd being in plain text. Good on 2 degrees for getting it fixed.

SmileyChris
4 posts

Wannabe Geek


  #623873 12-May-2012 07:10
Send private message

jree:
jbard: 

So you are saying the OTP password is left in the clear but the users password is hashed+salted?


Yes. The fact the OTP is in the clear is also bad even though it has a 24 hr expiry.
The clear OTP is the bit we are going to fix... but it will take a few weeks to get to production.

Chrs J


Thanks for the updates!

Speaking of hashing, in Django we recently increased the hashing algorithm to something more secure. Maybe something to look at as part of your process?

From the docs:

Django 1.3 uses the SHA1 algorithm, but increasing processor speeds and theoretical attacks have revealed that SHA1 isn't as secure as we’d like. Thus, Django 1.4 introduces a new password storage system: by default Django now uses the PBKDF2 algorithm (as recommended by NIST).

jnawk

176 posts

Master Geek


  #630256 25-May-2012 11:24
Send private message

jbard:
SmileyChris: The much bigger problem than the password being rendered in the js / page, is that they had the password to begin with.

Any reasonable developer should know that you salt and hash (with a strong?algorithm) your passwords.


I think that was what the OP was pointing out, not sure he explained it as simply as you though.


I've been out of touch for a while.. Sorry if this has been addressed.

They might have had the password simply in the session due to the fact I just (successfully) logged in. That would be bad too, (swap, etc), but itself, doesn't prove they don't salt & hash.

1 | 2 
Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.