Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For a non-native speaker, could you please confirm or invalidate my understanding of this interesting text:

1. They attacked some login/api-token unrelated to bcrypt.

2. If I use bcrypt-validate for logins and only temporarily associate rotating, random login/api-tokens with an account, I should not be prone to such attacks.

Thank you very much for your help.



1. Yes 2. Yes

AM took the unencrypted password, lowercased it, and hashed it into an MD5 token that they then stored - conjecture is that it was used as a login token. That is what the article indicates was cracked, since MD5 is very weak, to get a lowercased password, then tried every permutation of capital letters on the bcrypted passwords, to get the actual passwords out.

To avoid similar issues, if you generate a token, don't use the unencrypted password as part of it. Random tokens are fine.


I cannot upvote yet, so: Thank you, I appreciate your help!


lol.

Store a strongly hashed copy of the password, but use weak hash on password for login token. oops




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: