Author Topic: Increased database password encryption  (Read 35899 times)

Offline Rebs

  • Member
  • Posts: 522
  • ...A Binary Choice.!?
Re: Increased database password encryption
« Reply #160 on: October 19, 2009, 04:06:22 PM »
 ??? What do you mean?
« Last Edit: October 20, 2009, 01:03:14 AM by Malus »
...That Which Once Was...Cannot Be.!?

Offline BlackVice

  • Member
  • Posts: 37
Re: Increased database password encryption
« Reply #161 on: October 19, 2009, 06:23:12 PM »
Remember, using a weak password is not much worse than using the exact same strong password everywhere. ^^

QFT

and that's just what I do - use a dumbass password across all sites at which I can afford to "share" my account on, i.e. for mostly read-only content.

id like to point out tho, your account on BakaBT isnt a "read-only content" sort of account. If anyone did anything to your account, which resulted in you getting not only the account banned, but also the IP banned...

while others may know ways to get past that...well, not everyone.

Offline Excel

  • Member
  • Posts: 1
Re: Increased database password encryption
« Reply #162 on: October 20, 2009, 12:42:02 PM »
Ok, one question,
how is a better encryption going to change anything?

The passwords are shit, and when dictionairy attacking all of those passwords will most likely be in the top 100 of the dictionairy.
(Except for dragon, shadow, gundam, pokemon and naruto).

But in the end, since a dictionairy attack does not rely on reading anything from the database at all,
it doesn't even matter whether the passwords are encrypted with an extremely strong algorithm or not at all...

Offline blubart

  • Member
  • Posts: 2349
Re: Increased database password encryption
« Reply #163 on: October 20, 2009, 04:27:45 PM »
in case someone gets somehow his hands on the db it won't be a matter of seconds to convert the md5 hashes of 3k users back to usable passwords?

Offline luuk

  • Member
  • Posts: 1
Re: Increased database password encryption
« Reply #164 on: October 23, 2009, 10:13:32 PM »
1>how is a better encryption going to change anything?

2>But in the end, since a dictionairy attack does not rely on reading anything from the database at all,
1>Incase bakaBT has a leak in their code and you can perform injections to the database its not so easy to obtain the password(s).

2>Yes it does, it compares his "dictionary file" passwords (and users) to the databases.
But a well programmed system prevents these attacks by a limit on login attempts.
« Last Edit: October 23, 2009, 10:15:26 PM by luuk »

Offline Falaina

  • Member
  • Posts: 3
  • Cambridge, MA
Re: Increased database password encryption
« Reply #165 on: October 26, 2009, 11:22:22 AM »
I'm going to assume that passwords are stored using hashes and this list was determined via a test dictionary attack (please please let this be true).

With that aside, why are passwords unsalted? Additionally why would you provide a would-be attacker with a list of valid passwords for ~2000 user accounts?

Offline Chiyachan

  • Staff
  • Member
  • Posts: 2980
  • Awards Award for multiple donations to Kiva charity. Award for donating to Kiva charity.
Re: Increased database password encryption
« Reply #166 on: October 26, 2009, 11:43:13 AM »
Well, actually, the passwords ain't hashed or anything.
They're all readable. If we wanted, we could download the entire list of usernames, passwords and email addresses.
When joining staff though we have to promise not to download it for personal gain, (such as selling it to advertising companies.)
Quote from: Enzedder
I agree that its a lounge but its not a supergay lounge.
'Onest, I'm a super cute gal. Befriend me? ;D

Offline Natheria

  • Member
  • Posts: 742
  • Gnome in Disguise ¬_¬
    • Mikaeru's Blog
Re: Increased database password encryption
« Reply #167 on: October 26, 2009, 12:49:02 PM »
With that aside, why are passwords unsalted? Additionally why would you provide a would-be attacker with a list of valid passwords for ~2000 user accounts?

Because most of those passwords would be used by any would-be attacker without a second thought anyway, simply because there are so many people who actually do use lazy ass passwords like this (12345? qwerty? seriously? You do that kind of thing with an Xbox Live account, not here).  :'( Then these same people wonder why they keep getting viruses and then have to resort to using a mac.  :D

And if anyone in that list is still using the same password and not feeling bad about it, they deserve to get their account ratio leeched. Hence why they did this in such a public display, to get people to change their passwords.

Offline kurandoinu

  • Member
  • Posts: 9690
  • I am not a robot, I am a unicorn
Re: Increased database password encryption
« Reply #168 on: October 26, 2009, 01:46:07 PM »
Then these same people wonder why they keep getting viruses and then have to resort to using a mac. 

Um, I'm sorry... but what? : /

Offline Rebs

  • Member
  • Posts: 522
  • ...A Binary Choice.!?
Re: Increased database password encryption
« Reply #169 on: October 26, 2009, 03:56:25 PM »
^ Let's not start the "PC v.s. Mac" discussion here people, please.

PC FTW, Hell Yeah! 8)
...That Which Once Was...Cannot Be.!?

Offline SomeoneElse

  • Member
  • Posts: 258
  • Neko-Mimi Suki!
Re: Increased database password encryption
« Reply #170 on: October 26, 2009, 10:23:33 PM »
I just don't get why someone would pay for linux... not only do they pay for linux... they pay for incremental updates to linux... WTF?

Offline Mirgond

  • Member
  • Posts: 934
    • Play Asia Affiliate Site
Re: Increased database password encryption
« Reply #171 on: October 26, 2009, 11:27:12 PM »
OS X is not Linux, it's a Unix :/ There is quite a difference...

Offline Xiong Chiamiov

  • Member
  • Posts: 3012
  • I'm gonna tolerate and love the SHIT out of you!
    • changedmy.name
Re: Increased database password encryption
« Reply #172 on: October 27, 2009, 12:00:37 AM »
OS X is not Linux, it's a Unix :/ There is quite a difference...
Indeed, there is; OS X is actually a bastardized version of BSD, and you go tell a BSDer that he's using Linux and see what happens.

I'm going to assume that passwords are stored using hashes and this list was determined via a test dictionary attack (please please let this be true).
Yes, the passwords were hashed.

Quote
With that aside, why are passwords unsalted?
They aren't, any longer.

Quote
Additionally why would you provide a would-be attacker with a list of valid passwords for ~2000 user accounts?
They don't need our list to figure those out.  Did you *read* the list?
Projects of interest: nagi | sheska | bdg
Posts made between 2009-05-09 and 2011-08-26 were in the capacity of staff.  Please read accordingly.

Offline Rebs

  • Member
  • Posts: 522
  • ...A Binary Choice.!?
Re: Increased database password encryption
« Reply #173 on: October 27, 2009, 06:59:03 AM »
Quote
Additionally why would you provide a would-be attacker with a list of valid passwords for ~2000 user accounts?
They don't need our list to figure those out.  Did you *read* the list?

 :D I can't believe that guy said that. He/she must have had a mormentary mental lapse :P
...That Which Once Was...Cannot Be.!?

Offline Klocknov

  • Member
  • Posts: 1176
  • 次に魅力を消えます。彼らの左側ですか?
    • Klocknov's Blog!
Re: Increased database password encryption
« Reply #174 on: October 27, 2009, 07:10:30 AM »
Quote
Additionally why would you provide a would-be attacker with a list of valid passwords for ~2000 user accounts?
They don't need our list to figure those out.  Did you *read* the list?

 :D I can't believe that guy said that. He/she must have had a mormentary mental lapse :P
Maybe his password was on the list, that could also be a reason.
When Cookies become alcoholics the world has issues, oh wait that has already happened!
When I was growing up I wanted to become a queen, now that I did, I have to avoid brats chasing me with bats.
When the charm wears off, what do you have then?

Offline Rebs

  • Member
  • Posts: 522
  • ...A Binary Choice.!?
Re: Increased database password encryption
« Reply #175 on: October 27, 2009, 07:26:55 AM »
I also assumed that to be the case :)
...That Which Once Was...Cannot Be.!?

Offline maldarthe1st

  • Member
  • Posts: 24
  • Don't trust it if it bleeds for ~7 days and lives.
Re: Increased database password encryption
« Reply #176 on: October 29, 2009, 12:59:05 AM »
Wow, never thought that people really used such crappy PassWords.

Offline furuoshiki

  • Member
  • Posts: 641
  • Watashi ga...Watanabe-san desu.
Re: Increased database password encryption
« Reply #177 on: November 04, 2009, 08:29:48 PM »
Is there a way to use non-standard characters in passwords?

Such as: Bëírût?

It may be possible but I have never tried it.
わたしが。。。わたなべさんです。

Offline Rebs

  • Member
  • Posts: 522
  • ...A Binary Choice.!?
Re: Increased database password encryption
« Reply #178 on: November 04, 2009, 08:39:41 PM »
Is there a way to use non-standard characters in passwords?

Such as: Bëírût?

It may be possible but I have never tried it.

You raise an intriguing question...
...That Which Once Was...Cannot Be.!?