(RESOLVED) Will it ever be implemented? HTTPS

(RESOLVED) Will it ever be implemented? HTTPS

Author
Discussion

bitchstewie

51,897 posts

211 months

Wednesday 25th January 2017
quotequote all
Sprint Champ said:
So given that nothing is going to happen very quickly.

Anyone of you techies suggest a really good password manager program that works on Antroid as well. Heard that Dashlane was good but some recent reviews on there suggested problems with it ?
Nothing is perfect but 1Password and LastPass are decent if you want an easy life and your data syncronised across devices.

dmsims

6,564 posts

268 months

Wednesday 25th January 2017
quotequote all
Sprint Champ said:
So given that nothing is going to happen very quickly.

Anyone of you techies suggest a really good password manager program that works on Antroid as well. Heard that Dashlane was good but some recent reviews on there suggested problems with it ?
http://keepass.info/

there is also Lastpass but they have been acquired by Logmein frown

Tonsko

6,299 posts

216 months

Wednesday 25th January 2017
quotequote all
bhstewie said:
Nothing is perfect but 1Password and LastPass are decent if you want an easy life and your data syncronised across devices.
Been using 1password for a few years now, it syncs across an encrypted cloud account (spideroak) to my other machines. Started off using keepass many years ago.

0000

13,812 posts

192 months

Wednesday 25th January 2017
quotequote all
RacingPete said:
0000 said:
What hashing algorithm is it?
SHA-2 I think, but will have to ask the team responsible.
Thanks. SHA-2 is designed for speed (and performs similarly to MD5 in that respect), not password hashing.

Sprint Champ

52 posts

153 months

Wednesday 25th January 2017
quotequote all
Tonsko said:
Been using 1password for a few years now, it syncs across an encrypted cloud account (spideroak) to my other machines. Started off using keepass many years ago.
Thanks and to others for their suggestions. You've moved from keepass to 1password, any particle reason ? PM if private.

Tonsko

6,299 posts

216 months

Wednesday 25th January 2017
quotequote all
Sprint Champ said:
Thanks and to others for their suggestions. You've moved from keepass to 1password, any particle reason ? PM if private.
No, it's fine. Keepass (at the time) didn't have any way of synchronising across platforms, so I needed to keep a USB key with me at all times to update stuff and copy it around. I got bored of it after a few years. 1password does it itself (providing you choose a secure cloud platform that you're happy with. I wasn't happy with dropbox, but I am with spideroak).


Sprint Champ

52 posts

153 months

Wednesday 25th January 2017
quotequote all
Tonsko said:
No, it's fine. Keepass (at the time) didn't have any way of synchronising across platforms, so I needed to keep a USB key with me at all times to update stuff and copy it around. I got bored of it after a few years. 1password does it itself (providing you choose a secure cloud platform that you're happy with. I wasn't happy with dropbox, but I am with spideroak).
Thanks for that, Cheers

Vaud

50,781 posts

156 months

Wednesday 25th January 2017
quotequote all

MagicalTrevor

6,476 posts

230 months

Wednesday 25th January 2017
quotequote all
Hope somebody has a copy of this thread so when it's on the news we can say 'we told you so'?

_Exocet_

78 posts

99 months

Wednesday 25th January 2017
quotequote all
GreigM said:
This is what I don't really understand - pretty much all we need is for the login to be https. The rest of the site (inc advertising ste) could be left as-is.
Just the login page is not enough.

Using the same methods you'd use to obtain the password, you could obtain the user session ID which will be transmitted with every request after user authentication. Having the user session ID means you can spoof that logged in user without knowing the password, for the duration that session ID is valid.

Once you're spoofing the user of choice, you could change the e-mail address associated with that user account to an e-mail address you own, then hit the 'I forgot my password' button and the password is reset. You now have total control over the account.

I haven't checked, but I strongly suspect that PistonHeads is also vulnerable to other forms of attack such as XSS and CSRF which are equally as important to protect against. Unfortunately, you have to fix quite a bit to make old sites secure, that's why it's not a quick and simple process.

JimbobVFR

2,690 posts

145 months

Wednesday 25th January 2017
quotequote all
Vaud said:
Yes very much so, however talking about full site HTTPS is, to me at least, a very different issue to having an insecure logon page. The former is desirable biut the latter is absolutely essential.

Id also like to make the point that it may be a little unfair to be blaming the developers, who's to say they're not doing exactly what they are told to?

Mattt

16,661 posts

219 months

Thursday 26th January 2017
quotequote all
_Exocet_ said:
Just the login page is not enough.

Using the same methods you'd use to obtain the password, you could obtain the user session ID which will be transmitted with every request after user authentication. Having the user session ID means you can spoof that logged in user without knowing the password, for the duration that session ID is valid.

Once you're spoofing the user of choice, you could change the e-mail address associated with that user account to an e-mail address you own, then hit the 'I forgot my password' button and the password is reset. You now have total control over the account.

I haven't checked, but I strongly suspect that PistonHeads is also vulnerable to other forms of attack such as XSS and CSRF which are equally as important to protect against. Unfortunately, you have to fix quite a bit to make old sites secure, that's why it's not a quick and simple process.
Yes but I don't really give a st about my PH account.

There will be a load of people here using the same email and password for all their logins - that's the critical issue.

Funk

26,339 posts

210 months

Thursday 26th January 2017
quotequote all
_Exocet_ said:
Once you're spoofing the user of choice, you could change the e-mail address associated with that user account to an e-mail address you own, then hit the 'I forgot my password' button and the password is reset. You now have total control over the account.
This doesn't negate your other points but you cannot change your own email address on PH. For some reason, you have to email (from the account you want to change) and request it be done for you. It's like PH is in the dark ages when it comes to the forum.

Edited by Funk on Thursday 26th January 00:57

TheExcession

11,669 posts

251 months

Thursday 26th January 2017
quotequote all
Whilst we are all commenting on this cluster fk.

I'd like to know how our passwords are stored in the PH User DB.

Plain-text or perhaps an MD5 hash?

How many people here are using a password that is totally insecure during transport and furthermore are they using the same password for other sites?

How long before PH gets their entire User DB hacked/stolen? A bit like Yahoo....




thebraketester

14,290 posts

139 months

Thursday 26th January 2017
quotequote all
All passwords sent from this forum are insecure in the fact they are not encrypted.

JimbobVFR

2,690 posts

145 months

Thursday 26th January 2017
quotequote all
TheExcession said:
Whilst we are all commenting on this cluster fk.

I'd like to know how our passwords are stored in the PH User DB.

Plain-text or perhaps an MD5 hash?

How many people here are using a password that is totally insecure during transport and furthermore are they using the same password for other sites?

How long before PH gets their entire User DB hacked/stolen? A bit like Yahoo....
SHA-2 was mentioned earlier I believe, might even have been this thread TBH

dmsims

6,564 posts

268 months

Thursday 26th January 2017
quotequote all
dmsims said:
RacingPete said:
Passwords are stored using a random salt and a hash using cryptography standards, and are not reversible.
and what use is that when you are transmitting them in plain text ?

PoleDriver

28,659 posts

195 months

Thursday 26th January 2017
quotequote all
Isn't the safest thing fo everybody to not log in to PH until the problem is resolved?
I know it would interrupt the advertising income but surely security is more important than income?

bitchstewie

51,897 posts

211 months

Thursday 26th January 2017
quotequote all
Google have now launched Chrome 56 so anyone logging in will now get Chrome giving them a "Not Secure" message FWIW.

Tonsko

6,299 posts

216 months

Thursday 26th January 2017
quotequote all
Doing some on-site wifi testing today as it goes. Not at HM tho, obvs smile