- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Reply to: Bad advice on password strategy
Collapse
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
- You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
- You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
- If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Logging in...
Previously on "Bad advice on password strategy"
Collapse
-
but it won't be the vast majority - that's one recommendation and other places have their own. And apart from anything else now a hacker has to try all the obvious passwords, plus MD5/SHA/etc variants. If they have hacked a DB then it won't matter but if they're trying to login to your account, it could still make a realistic difference.
Leave a comment:
-
Yes - if they follow your tips of dropping the first 3 chars, or use a salt as proposed above...Originally posted by d000hg View Posthashing an easily guessable password is way stronger than the plain-text version. For a start, most people don't do this so it is not the first thing a cracker will try... secondly what if you drop the first 3 chars and use the next 8 as your password - you quickly have so many possibilities that a cracker has a problem since there are many different hash functions and you could do lots of things.
For casual users, I actually think this is good advice.
But the article as written, could mean the majority of users just doing the standard SHA1 hash and taking the first 8 chars on their easily remembered password. Which would be too easy for hackers to solve.
Leave a comment:
-
hashing an easily guessable password is way stronger than the plain-text version. For a start, most people don't do this so it is not the first thing a cracker will try... secondly what if you drop the first 3 chars and use the next 8 as your password - you quickly have so many possibilities that a cracker has a problem since there are many different hash functions and you could do lots of things.
For casual users, I actually think this is good advice.
Leave a comment:
-
The reason I was querying the password advice in the article, was because it advised using a plain password ie emily and then creating a SHA1 hash (or the first 8 characters) from the hash.Originally posted by Sysman View PostThe idea the article suggests is that you pick an easy to remember word such as "Emiiy", encrypt it yourself, then use the encrypted result as your password.
That password itself will be encrypted again when put into a database.
The real problem I have is with this bit:
That's eight characters. Since it's a hexadecimal representation all characters are in the range 0-9, a-f. Since eight hexadecimal characters represents 4 bytes, constructing a rainbow table is easy; it's not even using the full alphabet, mixed case characters or punctuation.
The other flaw in the above quote is that the hacker needs to guess "Emily". The hacker isn't interested in "Emily", but the hash of it.
Moreover, with non-reversible hashing schemes, more than one password can have the same hash. The hacker doesn't need to know the exact password, another password which results in the same hash value will suit the hacker's purpose equally well.
Let's say there were only 3 common passwords (obviously there are probably a couple of thousand).
password
qwerty
emily
All the hacker needs to do is find the SHA1 first 8 characters for each password, and then use those to log in. Obviously knowing the ID is also needed, but in many cases is obvious from context. A couple of thousand common passwords is barely more difficult to produce.
As Sockpuppet pointed out, the article would be on safer grounds if it advised the user to add an additional value to the common password before producing the SHA1 hash.
Of course the password validation/storage process should also use a salt. The essential thing is to make the salt unique for each record, and one that cannot be guessed easily from the resulting stored value ie it's in the code validation but not easily guessed from the dataLast edited by MrMark; 1 August 2011, 18:59.
Leave a comment:
-
The idea the article suggests is that you pick an easy to remember word such as "Emiiy", encrypt it yourself, then use the encrypted result as your password.Originally posted by Bunk View PostNot really what the OP was talking about though, I know.
That password itself will be encrypted again when put into a database.
The real problem I have is with this bit:
That's eight characters. Since it's a hexadecimal representation all characters are in the range 0-9, a-f. Since eight hexadecimal characters represents 4 bytes, constructing a rainbow table is easy; it's not even using the full alphabet, mixed case characters or punctuation.In the data field type "Emily" and submit. You will get a message digest of 40 characters. Highlight the first eight characters with your cursor; in this case "b6421c86". This is your password - a hexadecimal output resistant to dictionary attacks and impossible to reverse engineer back to "Emily".
The other flaw in the above quote is that the hacker needs to guess "Emily". The hacker isn't interested in "Emily", but the hash of it.
Moreover, with non-reversible hashing schemes, more than one password can have the same hash. The hacker doesn't need to know the exact password, another password which results in the same hash value will suit the hacker's purpose equally well.
Leave a comment:
-
The password + salt method is more for how you actually store passwords than how you choose one. The idea being that you add the salt to the password, hash it and store the hash and salt in the DB. When a user logs in, the password they type gets salted and hashed and compared to the stored hash. The actual password should never be stored as plain text.
Not really what the OP was talking about though, I know.
Leave a comment:
-
They already do that in cases where they've managed to lift a copy of the username/password database.Originally posted by MrMark View PostSurely if users started following this advice, all the hackers would need to do is create a list of common passwords (including the most popular "password") and create their SHA1 key list from that, with which to gain access to various sites. Or have I missed something?
Leave a comment:
-
Nope, it's what's known in the trade as a Rainbow Table.Originally posted by MrMark View PostI thought this was very bad advice on computerweekly's site.
Security Zone: Conquering password paranoia - 7/29/2011 - Computer Weekly
Surely if users started following this advice, all the hackers would need to do is create a list of common passwords (including the most popular "password") and create their SHA1 key list from that, with which to gain access to various sites. Or have I missed something?
It's not quite as bad as it seems though. The actual password is made up of the first 8 chars of the hash string of the meta password so the would be hacker would need to know that and select only those chars to try as the password. They would in effect need to know the meta password "Emily" and the number of charecters to select from the hash to be able to deduce the actual password from the hash string.
It works but it's still a faff to go to the site every time and remind yourself what the password was.
It's easier and arguably more secure, to use a password+salt as Sockpuppet said.
So your password would be Emily and your salt could be related to the site or system you use it on. EmilyCUK for this site, EmilyFacebook for Facebook etc.
Still not as secure as a properly chosen password for each site but quicker and easier to use than the hash sample method.Last edited by DaveB; 1 August 2011, 13:42.
Leave a comment:
-
Exactly right which is why you should use a salt.
So you might use "emily" and a salt of "wibble" which would be less likely to be guessed. Its also a good idea for admins to store passwords in the database with salts. Sometime unique to each user that is generated from other factors such as the login name which means that the computation time even if someone was to get the database would make the information next to useless.
Leave a comment:
-
Bad advice on password strategy
I thought this was very bad advice on computerweekly's site.
Security Zone: Conquering password paranoia - 7/29/2011 - Computer Weekly
Surely if users started following this advice, all the hackers would need to do is create a list of common passwords (including the most popular "password") and create their SHA1 key list from that, with which to gain access to various sites. Or have I missed something?Think of a blue sky password. A password such that in a perfect world you could remember and use without fear of compromise. Of course, in a perfect world you wouldn't need a password, but stay with me here. Let's say it is your daughter's name "Emily". Now Google the term "SHA1 hash generator" and select the top link. At the time of this article, it is the gtools.org generator. In the data field type "Emily" and submit. You will get a message digest of 40 characters. Highlight the first eight characters with your cursor; in this case "b6421c86". This is your password - a hexadecimal output resistant to dictionary attacks and impossible to reverse engineer back to "Emily". Keep in mind that the SHA1 protocol is case sensitive, so the input "Emily" will give you a different result than "emily".Tags: None
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers

Leave a comment: