Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar Mark Forums Read
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 04-30-2005, 12:04 PM   #1
raymor
Confirmed User
 
Join Date: Oct 2002
Posts: 3,745
How to secure your password list so that Strongbox and others can do their job

High_Times made a very good post bringing up the very big problem
of how easily crackers can download and crack your entire
password list.
http://www.gofuckyourself.com/showthread.php?t=459989

That thread is about to hit 3 pages, with few or no replies explaining
how to solve the problem. I figured I'd start a new thread covering
the solution for those who don't want to read through pages
of replies to his post.

Many people who replied to his post mentioned that Strongbox
will do a very good job of detecting and handling compromised
passwords. Strongbox will do a good job of detecting and
notifying you of a password that the user gives out, preventing
your passwords from getting cracked by dictionary or brute force
attacks, and letting you know if your entire password list ever
does get cracked.

However, if you let a cracker download and crack
your entire password list something like password sentry,
Strongbox, etc. will simply do it's job and block all of these
compromised passwords, which would leave legit users without
access. What you need to do is first secure your password list
so that a cracker can't simply download your whole membership
list and post it on a password site or wherever, THEN have
Strongbox watching for any individual passwords that get
compromised somehow.

Having your whole member list cracked is kind of like having
your hard drive totally fail in that people don't think about it
too much because it doesn't happen every day, but when it
does happen it's a BIG problem. Also like a hard drive failure,
it's fairly likely that eventually it will happen to you.

If you are using an old fashioned .htpasswd file that's only
encrypted with an algorithm called DES which is next to
worthless. If those DES encrypted passwords are based on English
words, which they normally are if you let your users choose
their own passwords, a cracker can decrypt many of those
passwords within seconds. You have to secure your passwords
better than that. High_Times made some good suggestions
on how to avoid having your list cracked, but I wanted to
go a little further.

First, how to know if this is a problem for you:
1) If you have a file called .htpasswd you have problem.
2) If you let users choose their own passwords you have a problem.
3) If your database or password file has the passwords in
it in clear text you have a problem.
4) If any of 1-3 applies to you and you run PHP scripts, you
probably have a bigger problem.

PHP scripts make the problem worse because most of them,
including most of the most popular ones, include a security hole
that will let the attacker download your password list or database.
So especially if you use PHP you'll want to be sure your password
list is not easily cracked.
I know some of you PHP script code monkeys will want to argue this point.
Be alerted that if you do I'll refute your argument by exploting a
hole in this PHP board to change your sig to "I'm a PHP newbie
who argues with experts when I don't know what I'm talking about." ;)

High_Times mentioned that DES encryption, used in most .htpasswd
files, is no longer effective. I've run a cracker program against
some customers' password lists and indeed I was able to
crack many passwords in seconds. Part of the reason it's so
weak is that it only uses the first 8 characters of the password.
With user chosen passwords the first 8 characters are often
found in a crackers dictionary because they choose passwords
based on English words.

You CAN use the much stronger MD5 algorithm for your .htpasswd file by having your processor's
add password script slightly modified and using the following
directive in your .htaccess:
AuthDigestAlgorithm MD5
However, Apache's uses a slightly non-standard MD5 implementation,
so that may well create a problem for you in the future.
Better is to put your usernames and passwords in a MySQL database.
Any processor's script can be fairly easily modified to use a
MySQL database instead of a password file. You can then
use Strongbox to read those passwords or install mod_auth_mysql.
Do NOT put clear text, unencrypted passwords inb a MySQL database.
Some of the well known user management scripts do exactly that.
Some of these scripts are made by friends of mine, so I won't
name names just yet, but if you distribute such a script fix
that now. By next year I will be naming names. If you use a
user management script ask them if they store the passwords
in clear text and ask them to adjust it so that it instead stores
a MD5_hex hash of the password.

Now that you've fixed up your encryption, you also need to have
reasonably strong passwords. Contrary to popular belief, using
punctuation marks in passwords doesn't improve security much
at all. (Count the bits.) Allowing certain punctuation marks
does, however, make you vulnerable to code injection attacks.
The best ways to make passwords strong is to make sure that
they are not plain english words or based on english words and
to make them reasonably long. That means you can't let users
choose their own passwords, or else you need a very good
password checking script to make sure they don't pick weak
ones. Does that mean you have to set CBill to create those ugly
random passwords like J8*Ul7^ag% that noone can remember?
No! Not anymore. CCBill will let you upload a large list of
user/pass pairs that it will assign to users. The ideal password
is reasonably long (8-14 characters), not based on a dictionary
word, and yet easy enough to remember. Note the phrase
"based on a dictionary word". fuckoff1 will get cracked quickly.
We've written a script that produces nearly ideal passwords.
They are somewhat pronouncable and there can be remembered,
yet they are long enough and not based on english words.
Some usernames and passwords generated by our script
in short mode:
Code:
uarainaca   niladonkn
sexweepri   spitskido
lymphricb  frucsphin
trufsecev    pantygenc

long mode:
spunloomjago chopscorpssl
luxereclrirr       mesrandcourt
qualmionochi  ovavimzotep
erynphisrhuc  seisskulldik
"spitskido", "pantygenc", or "frucsphin" won't be found in a
hacker's dictionary, yet can be pronounced and therefore
remembered.

If you'd like us to generate a list of 10,000 or so user/pass combos
for you to upload to CCBill or whatever processor you are using
just drop us an email. We'll be writing a script for using our
passwords with Paycom some time in the next couple days.

I'm sure someone will post a reply bringing up something I forgot,
but that's about it I think.
To review:
Old fashioned .htpasswd is bad, very bad.
Use MD5 or SHA1 rather than DES.
Use MySQL to store the passwords via either Strongbox or mod_auth_mysql.
Generate good passwords rather than letting users choose bad ones.
Make sure your PHP and CGI scripts are up to date on security patches.
Now your password lsit is secure and you're ready to use
Strongbox or another system to catch any passwords that may
be given out and to prevent brute force/dictionary attacks.
__________________
For historical display only. This information is not current:
support@bettercgi.com ICQ 7208627
Strongbox - The next generation in site security
Throttlebox - The next generation in bandwidth control
Clonebox - Backup and disaster recovery on steroids
raymor is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 12:11 PM   #2
Robertf
Confirmed User
 
Join Date: Feb 2004
Posts: 392
please change my sig for the hell of it
__________________
....
Robertf is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 12:43 PM   #3
newbreed
Confirmed User
 
newbreed's Avatar
 
Join Date: Nov 2003
Location: ThatOneProgram.com
Posts: 9,898
So when can you start installing this thingy on my server?
__________________

Loryn ‎(3:16 PM):
I love it, just as long as we keep the bedroom door closed from all ears then we can have throw down hard core sex that makes us money haha
fuck it we can have sex on money never did that before
newbreed is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 04:01 PM   #4
raymor
Confirmed User
 
Join Date: Oct 2002
Posts: 3,745
Quote:
Originally Posted by newbreed
So when can you start installing this thingy on my server?
Nothing for me to install, really, since you are already using
a MySQL based user management system and you
already have Strongbox.

I've emailed you the URL of the password list I generated for you.
I made it with 30,000 user/pass pairs, let me know if you need
more than that to last you for a while. You can upload that list
to CCBill.

Your user management system is totally closed source, encrypted,
so I can't modify it for you to store the passwords using strong
encryption. The only people who can make any adjustments
to it are the guys you bought it from, so you'd have to talk
to them about having it store the passwords as an MD5 hash.
Then we'll configure Strongbox to read directly from that
database and to compare based on MD5 hash.
__________________
For historical display only. This information is not current:
support@bettercgi.com ICQ 7208627
Strongbox - The next generation in site security
Throttlebox - The next generation in bandwidth control
Clonebox - Backup and disaster recovery on steroids
raymor is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 04:06 PM   #5
fris
Too lazy to set a custom title
 
fris's Avatar
 
Industry Role:
Join Date: Aug 2002
Posts: 55,372
Quote:
Originally Posted by raymor
Nothing for me to install, really, since you are already using
a MySQL based user management system and you
already have Strongbox.

I've emailed you the URL of the password list I generated for you.
I made it with 30,000 user/pass pairs, let me know if you need
more than that to last you for a while. You can upload that list
to CCBill.

Your user management system is totally closed source, encrypted,
so I can't modify it for you to store the passwords using strong
encryption. The only people who can make any adjustments
to it are the guys you bought it from, so you'd have to talk
to them about having it store the passwords as an MD5 hash.
Then we'll configure Strongbox to read directly from that
database and to compare based on MD5 hash.

i would like to do a review of proxypass, strongbox, and pennywize for protectadult.com
__________________
Since 1999: 69 Adult Industry awards for Best Hosting Company and professional excellence.


WP Stuff
fris is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 04:07 PM   #6
WebGemsHosting
Registered User
 
Join Date: Jan 2004
Location: South Florida
Posts: 98
Nice, Raymor!

I will contact our strongbox customers and let know to contact you.
__________________
Web Gems Hosting
[email protected]
www.webgemshosting.com
ICQ# 8447977

Quality, Performance, Value
WebGemsHosting is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 05:18 PM   #7
Kevin2
Confirmed User
 
Join Date: May 2003
Location: Australia
Posts: 1,429
Ray has always been a fountain of knowledge Thanks for the informative post Ray
__________________

Webmasters Trade Traffic!!!
Kevin2 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 05:20 PM   #8
nofx
Too lazy to set a custom title
 
Join Date: Nov 2002
Location: Virgin Mary's womb
Posts: 16,826
you can still always bruteforce
__________________

Often times I wonder why
There's love and hate, theres live or die.
When sickness comes I must decide:
When feelings go, theres suicide.
nofx is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 05:23 PM   #9
pstation
Confirmed User
 
Join Date: Jul 2003
Location: chicago
Posts: 1,135
you should also always add a salt hash as well....
pstation is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 04-30-2005, 08:54 PM   #10
raymor
Confirmed User
 
Join Date: Oct 2002
Posts: 3,745
Quote:
Originally Posted by nofx
you can still always bruteforce
Note that with good passwords it would have to be a true
brute force attack and not the far more common and
much easier dictionary attack. With reasonably long passwords
and MD5 a brute force attack would take a very long time.
It'd be possible to do, but why bother when it just takes a
few minutes to rip the whole password file of some other site?
Also Strongbox will prevent a web based brute attack.
To even attempt a brute force attack they first have to get the
password list.
__________________
For historical display only. This information is not current:
support@bettercgi.com ICQ 7208627
Strongbox - The next generation in site security
Throttlebox - The next generation in bandwidth control
Clonebox - Backup and disaster recovery on steroids
raymor is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-01-2005, 03:19 PM   #11
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Very good info's Raymor
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-01-2005, 03:32 PM   #12
JFPdude
Confirmed User
 
Join Date: Jan 2002
Location: Mountains of Western North Carolina.
Posts: 4,027
and if your host doesn't make mod_auth_mysql available for you for gods sake get the .htpasswd file out of the web accessible directory and into a secured area and at a minimum rename it.

There are a lot of precautions you can take so that your are more secure and most of them are easy to implement.

Most people use http://mygreatpaysite.com/members/.htpasswd to store their password then wonder why they were hacked so easily.
JFPdude is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-01-2005, 03:33 PM   #13
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Quote:
Originally Posted by nofx
you can still always bruteforce

Haha... sure you could. First you'd have to write bruteforce program that can OCR strongbox's turing test. Then it'd have to run very slow or Strongbox will close of the form for a while so that no one can use it. Then you would have to have the list of username/password pairs that the site used because dictionary words would be pointless, as would the password files of any other site. Or you would need to bruteforce the characters. Even if it was basic authentication this would be a daunting task.
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-01-2005, 03:46 PM   #14
Babagirls
Text Writer
 
Babagirls's Avatar
 
Join Date: Feb 2001
Location: Wisconsin
Posts: 18,812
i have my own codes for passwords, dont need to all that LOL
__________________




Need a Text Writer?
Blogs|Reviews|Descriptions|Paysites|TGP's|Stories

ICQ: 397892500
Babagirls is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-16-2009, 01:27 PM   #15
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Good thread... Still crazy after all of these years... Still the same companies having the same problems.
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-16-2009, 03:39 PM   #16
Lace
Too lazy to set a custom title
 
Lace's Avatar
 
Industry Role:
Join Date: Mar 2004
Posts: 16,116
Jesus 4+ year bump...
__________________
Your Paysite Partner
Strength In Numbers!
StickyDollars | RadicalCash | KennysPennies | HomegrownCash
Lace is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks
Thread Tools



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.