Hacker News new | past | comments | ask | show | jobs | submit | dorianm's comments login

@dang (?) this is not a dupe, it contains a lot of various interesting information not only related to Cloudbleed, especially in the second part of the video when they eliminate all the core dumps (going as far as updating micro code because of an hardware issue)


I didn't know that was public. It's available at https://formulae.brew.sh/analytics/ for anyone curious


I'm curious why those core dumps, lasting for months at least, were not investigated


Enjoy my "Inside Cloudbleed" RSA talk: https://www.rsaconference.com/videos/inside-cloudbleed I talked about that and much more there.


Thanks a lot!

Starts at 25:30 for anyone curious.

> We were recording the core dumps [...] We didn't look at this


Looking at Rails, first list, first question: "What does ruby name refer to?"

I interpreted the question as: "What does ruby's name refer to?" so I guess the precious stone... but no https://www.careerride.com/view.aspx?id=2439

Anyway, this seems exactly what a typical clueless recruiter would ask and try to pattern match the answers to


I don't see any: https://www.cvedetails.com/vulnerability-list/vendor_id-9237...

Edit: it's "To be allocated": "[$TBD][900910] High To be allocated: Multiple issues in SQLite via WebSQL. Reported by Wenxiang Qian of Tencent Blade Team on 2018-11-01" (from https://chromereleases.googleblog.com/2018/12/stable-channel...)


"Server internal error" from the API on any search request, even when retrying


Oh no! Used to be my favorite


Probably Jeff Dean and Paul Buchheit for the people who recruited them for Google.


Full list of 5000+ websites that store their passwords in plain text: https://github.com/plaintextoffenders/plaintextoffenders/blo...


That list is very out of date. One of my clients appears on there and when we took over in 2012 we encrypted all their user credentials.


Their FAQ [1, 2] suggests that using an encrypted password still warrants an entry.

[1] http://plaintextoffenders.com/faq/devs

[2] http://plaintextoffenders.com/faq/non-devs


Encrypting passwords isn't really much better, though, is it? It's still reversible as there has to be a key somewhere.


Well you took over and did a terrible job.

Hash passwords, not encrypt.

An encryption is reversible, a hash result isn't.



IME banks often have poor security. And why not? They managed to rebrand robbery as identity fraud.


It's just infuriating, because credit card companies are the ones behind, for example, PCI. Which has guidance like:

"8.4 Render all passwords unreadable during transmission and storage on all system components using strong cryptography"


This requirement is technically fulfilled by encrypting transmissions with TLS and storage with disk encryption like LUKS or Veracrypt. It does not really say anything about password hashing.


The screenshot shows that the plaintext password was sent over SMTP. So it isn't meeting that bar either.


What makes you think it's SMTP and not SMTPS?


Because you can't force the endpoints of your customers to all support that.


ironic how the linked website itself is a "plain text offender" by not using HTTPS, causing HTTP requests to be sent over plain text.


Someone should send a friendly email to each of those offenders, linking the ruling.

It's also fair to say that the next few years will be a busy time for the government agencies tasked with GDRP enforcement.

(Assuming they do it properly, which falls within the responsibility of the relevant country)


They should, though assuming a bloated org structure and process, fixing it now is probably more expensive than the €20000 fine.


Note that the actual cost to Knuddels is much higher, because you also have to include the cost of implementing proper security measures. The Data Protection Officer's statement (https://www.baden-wuerttemberg.datenschutz.de/lfdi-baden-wue..., in German) states that the total cost to Knuddels is a six figure sum.


For a larger company, should be considerably higher.

Also, the ruling mentioned a reduced fine for cooperation and quick remediation. This probably wouldn't play out so well with a bloated structure and process, as you mentioned.


But the fine would have been more if they had refused to fix it. So the calculus isn’t straightforward.


I've looked at many of those Tumblr posts; most of them show that the website sends you a welcome email with your password in plain text, which is bad practice, but doesn't prove that the password is stored in plain text in the database.


The discover card email reads "Here's your _existing_ password".


But which proves that access to the website codebase will grant you access to those passwords.


No. I've implemented precisely that and it doesn't prove what you think.

What you do is have one single function create the user, pick a random password, set it in the database (which in my case uses a perfectly sensible hash) and send the user email. The cleartext password in the mail comes from the function's local string variable, not from the database.

Whether doing this is a good idea is another question. IMO it usually isn't. But this kind of mail does not prove cleartext access.


How often do you purge your mailserver's logs (or if you use a mail API, how often do they purge their logs)? If it's "Never, I didn't think of that." then all your user's inital passwords are sitting there for the taking.

Of course, you may have a system that forces a password reset on login. That won't help the users who have never logged in. Those accounts are freely available to a hacker.

Plaintext passwords anywhere are a really bad idea.


You make it sound as if most mail servers log message contents. None of the servers I've used in the past 25 years did that (sendmail 5 on ultrix, later smail 3, then zmailer, then postfix).

The recipients' servers store the message with the password, of course, but they also store the other messages the same user has received from the same server, which in my case contain the same information as what could be accessed with the password. So the password offers very little additional value to an attacker, compared to just reading the mail.


What if the email with the plain text password is sent after a user pressed on the "I forgot my password button"? Because so far I only have encountered this type of email where the password is sent in plain text.


>> No. I've implemented precisely that and it doesn't prove what you think.

Well, the way I read the parent is that you can request a previously set password to be sent to your e-mail.


GP said … "sends you a welcome email with your password in plain text" … which seems clear enough.


Access to the code base, gives you access to the login form. And gives access to all data.


I did not imply you can change the codebase, by the way.


It's a matter of storing it in plaintext or not, which any sane developer knows not to. The codebase will always have access to your plaintext password at one point or another, whether it's on signup before they hash and store it, or when you login before comparing hashes.

If someone has access to your codebase you've got bigger problems than plaintext passwords anyway.


The codebase will always have access to your plaintext password at one point or another.

Not necessarily. The simple solution is client-side hashing. You could combine that with challenge-response to only reveal the password hash to the server once.


The client-side code that does the hashing is part of the codebase.


>> If someone has access to your codebase you've got bigger problems than plaintext passwords anyway.

You're joking, right? The context of the discussion is when your database is already leaked. Then the chance is that your e-mail database is leaked, too. You may leak code, too. It doesn't necessarily mean someone can execute arbitrary code on your server though, yet.


Presuming you mean Access to change the codebase, this would also be access to add a key logger. If someone has write access to your production codebase you’ve lost all data.


I'm surprised they don't use Discourse for the forums


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: