[url=http://meincmagazine.com/civis/viewtopic.php?p=28149395#p28149395:19z4bzb1 said:seajack0[/url]":19z4bzb1]Why isn't this pinned to the front page? You guys always vilify other companies for allowing themselves to be hacked and smear it all over the front page, only to bury your own site getting hacked in the sidebar. What gives? Also, MD5? What is this, 2004?
[url=http://meincmagazine.com/civis/viewtopic.php?p=28141599#p28141599:1eh7bm7c said:epixoip[/url]":1eh7bm7c]Hi everyone. This is noted password cracking expert and D-list Internet celebrity Jeremi Gosney. You might remember me from here, here, here, here, here, here, or even here or here.
I would like to take a minute to address some of the comments being made about the password hashing algorithm that is used by the forum software Ars is using. Let's have a look at some of those comments.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28140531#p28140531:1eh7bm7c said:pk![/url]":1eh7bm7c]MD5, really? After having printed several articles on password cracking I'd have hoped you'd at least have leveraged a stronger hashing algorithm.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140525#p28140525:1eh7bm7c said:Abhi Beckert[/url]":1eh7bm7c]
2,048 iterations is not enough to prevent a brute force attack on MD5.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140725#p28140725:1eh7bm7c said:d0x[/url]":1eh7bm7c]
Seriously? Ars themselves have posted many articles about this very method of encrypted password storage to be easily breakable either via brute force or with rainbow tables.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140735#p28140735:1eh7bm7c said:Threz_[/url]":1eh7bm7c]One the one hand, Ars calls the use of MD5 hashes for storing passwords as "unfortunate and irresponsible", and on the other (above) uses it as a way to argue that the passwords were well-"encrypted." Which is it?[url=http://meincmagazine.com/civis/viewtopic.php?p=28140883#p28140883:1eh7bm7c said:FF22[/url]":1eh7bm7c]
No wonder your server was hacked if you really thought running MD5 multiple thousand times over the password would harden the hashes by any means. If anything, it weakened them.
Wow. Powerful stuff there. Too bad these armchair experts are all dead wrong.
First, when we talk about MD5 being a poor and irresponsible choice for password hashing, we're talking about raw MD5. As in a single, unsalted iteration of MD5. As in md5($pass). And as the keen Ars reader will note, the reason this is a bad choice has nothing to do with any cryptographic weakness in the MD5 algorithm itself. It's simply because MD5 is very fast and very amenable to acceleration.
One of the ways we make an algorithm resistant to acceleration is to salt it and iterate it. And no, iterating a hash does not weaken it, that's utter horseshit. Iterating a hash is what almost all password hashing algorithms do, including all crypt(3) algorithms, PBKDF2, and even bcrypt.
Ars uses phpBB, which uses the Openwall PHPass password hashing algorithm, designed by none other than the venerable Solar Designer himself. PHPass uses salted and iterated MD5 to hash passwords. It is similar to md5crypt with some key differences, and even similar to PBKDF2 to some extent. And while it may not be the best choice for password hashing, it is a solid one.
To see just how solid PHPass is, let's look back at another famous breach which used PHPass: Forbes. Back in February, Forbes had 1,071,961 password hashes dumped by SEA. Out of those 1,071,961 password hashes, 1,071,734 were hashed using PHPass.
Now as the keen Ars reader will recall, normally us professional password crackers can get a public dump 85-95% cracked within a rather short period of time. And indeed, the 227 passwords that weren't hashed with PHPass were 100% cracked in just a few short minutes. But after 10 months, we currently only have the Forbes PHPass hashes 16.19% cracked. Yes, you read that correctly. We've only managed to crack 173,548 -- or 16.19% -- of the Forbes passwords, and most of those were Top 20K passwords.
If you want to put this into "OL Hashcat" terms, a single R9 290X can pull ~ 12.2 GH/s on raw MD5, but only 3 MH/s against PHPass. Divide that by 1,071,734 unique salts, and that means our effective speed is only 2.86 H/s. That's beyond properly slow. Multiply that by 100 GPUs and that's still only 286 H/s. We can't do very much with that, and that's why this list is only 16.19% cracked.
So obviously PHPass is pretty good at what it does, and Ars has done absolutely nothing wrong by using this algorithm. It is perfectly suitable for what this site is. I've said before that password hashing is like an insurance policy, and Ars has bought you ample time to change your passwords.
And that's the way it is.
It gets worse. They could demand all the money in the world or they would reveal it, to get some return on their investment.[url=http://meincmagazine.com/civis/viewtopic.php?p=28145635#p28145635:mlvh2836 said:viatori[/url]":mlvh2836]If they spent $10^17 they could crack my 16 character password
214365. There you go. GTBOS.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149725#p28149725:1y13607i said:eddy15[/url]":1y13607i]my old password was 123456 please change for me...
You should have attended basic calculus sober and not high as Mount Everest. Then you would have known that your password offers little advantage if none over 'ohbaithooyohf8ohCo9Oix9Eecei0oocho' or 'effect hung noted represent whiskey'.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149757#p28149757:1inynx2o said:leexgxreal[/url]":1inynx2o]
i probably did not need to change my password as not sure how long it would take to get something like Ðlï®cÝ?:Ü«ç?w?ô???Þ¼G2Ä_B®&?EH from MD5 at 2k
[url=http://meincmagazine.com/civis/viewtopic.php?p=28149663#p28149663:1kernw6o said:infusednz[/url]":1kernw6o][url=http://meincmagazine.com/civis/viewtopic.php?p=28141599#p28141599:1kernw6o said:epixoip[/url]":1kernw6o]Hi everyone. This is noted password cracking expert and D-list Internet celebrity Jeremi Gosney. You might remember me from here, here, here, here, here, here, or even here or here.
I would like to take a minute to address some of the comments being made about the password hashing algorithm that is used by the forum software Ars is using. Let's have a look at some of those comments.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28140531#p28140531:1kernw6o said:pk![/url]":1kernw6o]MD5, really? After having printed several articles on password cracking I'd have hoped you'd at least have leveraged a stronger hashing algorithm.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140525#p28140525:1kernw6o said:Abhi Beckert[/url]":1kernw6o]
2,048 iterations is not enough to prevent a brute force attack on MD5.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140725#p28140725:1kernw6o said:d0x[/url]":1kernw6o]
Seriously? Ars themselves have posted many articles about this very method of encrypted password storage to be easily breakable either via brute force or with rainbow tables.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140735#p28140735:1kernw6o said:Threz_[/url]":1kernw6o]One the one hand, Ars calls the use of MD5 hashes for storing passwords as "unfortunate and irresponsible", and on the other (above) uses it as a way to argue that the passwords were well-"encrypted." Which is it?[url=http://meincmagazine.com/civis/viewtopic.php?p=28140883#p28140883:1kernw6o said:FF22[/url]":1kernw6o]
No wonder your server was hacked if you really thought running MD5 multiple thousand times over the password would harden the hashes by any means. If anything, it weakened them.
Wow. Powerful stuff there. Too bad these armchair experts are all dead wrong.
First, when we talk about MD5 being a poor and irresponsible choice for password hashing, we're talking about raw MD5. As in a single, unsalted iteration of MD5. As in md5($pass). And as the keen Ars reader will note, the reason this is a bad choice has nothing to do with any cryptographic weakness in the MD5 algorithm itself. It's simply because MD5 is very fast and very amenable to acceleration.
One of the ways we make an algorithm resistant to acceleration is to salt it and iterate it. And no, iterating a hash does not weaken it, that's utter horseshit. Iterating a hash is what almost all password hashing algorithms do, including all crypt(3) algorithms, PBKDF2, and even bcrypt.
Ars uses phpBB, which uses the Openwall PHPass password hashing algorithm, designed by none other than the venerable Solar Designer himself. PHPass uses salted and iterated MD5 to hash passwords. It is similar to md5crypt with some key differences, and even similar to PBKDF2 to some extent. And while it may not be the best choice for password hashing, it is a solid one.
To see just how solid PHPass is, let's look back at another famous breach which used PHPass: Forbes. Back in February, Forbes had 1,071,961 password hashes dumped by SEA. Out of those 1,071,961 password hashes, 1,071,734 were hashed using PHPass.
Now as the keen Ars reader will recall, normally us professional password crackers can get a public dump 85-95% cracked within a rather short period of time. And indeed, the 227 passwords that weren't hashed with PHPass were 100% cracked in just a few short minutes. But after 10 months, we currently only have the Forbes PHPass hashes 16.19% cracked. Yes, you read that correctly. We've only managed to crack 173,548 -- or 16.19% -- of the Forbes passwords, and most of those were Top 20K passwords.
If you want to put this into "OL Hashcat" terms, a single R9 290X can pull ~ 12.2 GH/s on raw MD5, but only 3 MH/s against PHPass. Divide that by 1,071,734 unique salts, and that means our effective speed is only 2.86 H/s. That's beyond properly slow. Multiply that by 100 GPUs and that's still only 286 H/s. We can't do very much with that, and that's why this list is only 16.19% cracked.
So obviously PHPass is pretty good at what it does, and Ars has done absolutely nothing wrong by using this algorithm. It is perfectly suitable for what this site is. I've said before that password hashing is like an insurance policy, and Ars has bought you ample time to change your passwords.
And that's the way it is.
Very good post.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28144129#p28144129:3ofqj27w said:gmerrick[/url]":3ofqj27w][url=http://meincmagazine.com/civis/viewtopic.php?p=28141861#p28141861:3ofqj27w said:cheriff[/url]":3ofqj27w]When the article states that payment info was not compromised, does that mean for sure nothing at all?
On the account settings page I see my credit card type and last 4 digits being displayed to me. Not that this is any great secret in and of itself, but I'd still appreciate knowing whether this redacted payment info is in the same database as the possibly compromised one.
At the very least I know which statement to keep a closer eye on, just in case.
unless I am mistaken PCI regulations forbid vendors from storing this information in the first place. The only time you should be entering your CC info is when you pay for something online. After the fact, the vendor should not be keeping that information.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28149823#p28149823:2i8y7fxo said:burne_[/url]":2i8y7fxo]You should have attended basic calculus sober and not high as Mount Everest. Then you would have known that your password offers little advantage if none over 'ohbaithooyohf8ohCo9Oix9Eecei0oocho' or 'effect hung noted represent whiskey'.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149757#p28149757:2i8y7fxo said:leexgxreal[/url]":2i8y7fxo]
i probably did not need to change my password as not sure how long it would take to get something like Ðlï®cÝ?:Ü«ç?w?ô???Þ¼G2Ä_B®&?EH from MD5 at 2k
e.g. a hash that can only be cracked in a billion billion years is "enough" for me to not care about brute force. That's also a fact.[url=http://meincmagazine.com/civis/viewtopic.php?p=28143861#p28143861:wwzdfw6r said:Melzeebub92[/url]":wwzdfw6r]Nothing is enough to stop brute force. The time to crack gets exponentially longer per character but given time everything will fall to brute force. You can downvote if you like but that is fact.[url=http://meincmagazine.com/civis/viewtopic.php?p=28140525#p28140525:wwzdfw6r said:Abhi Beckert[/url]":wwzdfw6r]I hope you're going to change that soon? 2,048 iterations is not enough to prevent a brute force attack on MD5.hashed using 2,048 iterations of the MD5 algorithm and salted with a random series of characters
Please switch to something "memory-hard" like scrypt.
I should make a support group for people who exclusively use the password "ªx¬K°âÎZ±³eßà¦?qt)¡¥"[url=http://meincmagazine.com/civis/viewtopic.php?p=28150253#p28150253:4iv670hv said:leexgxreal[/url]":4iv670hv][url=http://meincmagazine.com/civis/viewtopic.php?p=28149823#p28149823:4iv670hv said:burne_[/url]":4iv670hv]You should have attended basic calculus sober and not high as Mount Everest. Then you would have known that your password offers little advantage if none over 'ohbaithooyohf8ohCo9Oix9Eecei0oocho' or 'effect hung noted represent whiskey'.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149757#p28149757:4iv670hv said:leexgxreal[/url]":4iv670hv]
i probably did not need to change my password as not sure how long it would take to get something like Ðlï®cÝ?:Ü«ç?w?ô???Þ¼G2Ä_B®&?EH from MD5 at 2k
but i can use ò=Ïo1Óøªx¬K°âÎZ±³eßà¦?qt)¡¥âlÞ if i want to as uj7nXedJy0WuVNXdtwuYBEvImATnml is no way i would type both of them any way (or want to)
[url=http://meincmagazine.com/civis/viewtopic.php?p=28150287#p28150287:1dhx3bkc said:somini[/url]":1dhx3bkc]I should make a support group for people who exclusively use the password "ªx¬K°âÎZ±³eßà¦?qt)¡¥"[url=http://meincmagazine.com/civis/viewtopic.php?p=28150253#p28150253:1dhx3bkc said:leexgxreal[/url]":1dhx3bkc][url=http://meincmagazine.com/civis/viewtopic.php?p=28149823#p28149823:1dhx3bkc said:burne_[/url]":1dhx3bkc]You should have attended basic calculus sober and not high as Mount Everest. Then you would have known that your password offers little advantage if none over 'ohbaithooyohf8ohCo9Oix9Eecei0oocho' or 'effect hung noted represent whiskey'.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149757#p28149757:1dhx3bkc said:leexgxreal[/url]":1dhx3bkc]
i probably did not need to change my password as not sure how long it would take to get something like Ðlï®cÝ?:Ü«ç?w?ô???Þ¼G2Ä_B®&?EH from MD5 at 2k
but i can use ò=Ïo1Óøªx¬K°âÎZ±³eßà¦?qt)¡¥âlÞ if i want to as uj7nXedJy0WuVNXdtwuYBEvImATnml is no way i would type both of them any way (or want to)
It's also a fact that Scientologists sign multi-billion year contracts. They could be up shit creek due to this breach.[url=http://meincmagazine.com/civis/viewtopic.php?p=28150269#p28150269:1rhdul90 said:DarthShiv[/url]":1rhdul90]a hash that can only be cracked in a billion billion years is "enough" for me to not care about brute force. That's also a fact.

It should be possible to put it as your mom's maiden name...[url=http://meincmagazine.com/civis/viewtopic.php?p=28150315#p28150315:39skpdv4 said:leexgxreal[/url]":39skpdv4][url=http://meincmagazine.com/civis/viewtopic.php?p=28150287#p28150287:39skpdv4 said:somini[/url]":39skpdv4]I should make a support group for people who exclusively use the password "ªx¬K°âÎZ±³eßà¦?qt)¡¥"[url=http://meincmagazine.com/civis/viewtopic.php?p=28150253#p28150253:39skpdv4 said:leexgxreal[/url]":39skpdv4][url=http://meincmagazine.com/civis/viewtopic.php?p=28149823#p28149823:39skpdv4 said:burne_[/url]":39skpdv4]You should have attended basic calculus sober and not high as Mount Everest. Then you would have known that your password offers little advantage if none over 'ohbaithooyohf8ohCo9Oix9Eecei0oocho' or 'effect hung noted represent whiskey'.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149757#p28149757:39skpdv4 said:leexgxreal[/url]":39skpdv4]
i probably did not need to change my password as not sure how long it would take to get something like Ðlï®cÝ?:Ü«ç?w?ô???Þ¼G2Ä_B®&?EH from MD5 at 2k
but i can use ò=Ïo1Óøªx¬K°âÎZ±³eßà¦?qt)¡¥âlÞ if i want to as uj7nXedJy0WuVNXdtwuYBEvImATnml is no way i would type both of them any way (or want to)
vote up just for that post alone
its still a valid password, Most sites do not support more than basic upper and lowercase and numbers (nothing else not even spaces, some even limit to 16 chars or even less so to try Protect themselves from code Injection)
[url=http://meincmagazine.com/civis/viewtopic.php?p=28150315#p28150315:zymmuqjg said:leexgxreal[/url]":zymmuqjg][url=http://meincmagazine.com/civis/viewtopic.php?p=28150287#p28150287:zymmuqjg said:somini[/url]":zymmuqjg]I should make a support group for people who exclusively use the password "ªx¬K°âÎZ±³eßà¦?qt)¡¥"[url=http://meincmagazine.com/civis/viewtopic.php?p=28150253#p28150253:zymmuqjg said:leexgxreal[/url]":zymmuqjg][url=http://meincmagazine.com/civis/viewtopic.php?p=28149823#p28149823:zymmuqjg said:burne_[/url]":zymmuqjg]You should have attended basic calculus sober and not high as Mount Everest. Then you would have known that your password offers little advantage if none over 'ohbaithooyohf8ohCo9Oix9Eecei0oocho' or 'effect hung noted represent whiskey'.[url=http://meincmagazine.com/civis/viewtopic.php?p=28149757#p28149757:zymmuqjg said:leexgxreal[/url]":zymmuqjg]
i probably did not need to change my password as not sure how long it would take to get something like Ðlï®cÝ?:Ü«ç?w?ô???Þ¼G2Ä_B®&?EH from MD5 at 2k
but i can use ò=Ïo1Óøªx¬K°âÎZ±³eßà¦?qt)¡¥âlÞ if i want to as uj7nXedJy0WuVNXdtwuYBEvImATnml is no way i would type both of them any way (or want to)
vote up just for that post alone
its still a valid password, Most sites do not support more than basic upper and lowercase and numbers (nothing else not even spaces, some even limit to 16 chars or even less so to try Protect themselves from code Injection)
[url=http://meincmagazine.com/civis/viewtopic.php?p=28140583#p28140583:30e4a3md said:adfad666[/url]":30e4a3md]My password was dMSXQmpTRfsN3h5HHvEY and I only know that because I just looked it up in Chrome's password manager.
Now that I've set a new one I can safely forget it again.
You only registered 15 minutes ago to make this one post. Why on Earth would you change a password that was only added to the system post-breach? Why would you have been asked to change a password that didn't yet exist?[url=http://meincmagazine.com/civis/viewtopic.php?p=28151155#p28151155:avld4b5l said:Dolores Haze[/url]":avld4b5l]But anyhow, I have changed my password just like you asked me to.
Just pointing out that the fact that anything can be brute forced <> compromised. Brute-forcable doesn't win an argument in encryption. It's a meaningless metric on it's own.[url=http://meincmagazine.com/civis/viewtopic.php?p=28150365#p28150365:ijuojzra said:Dark Steve[/url]":ijuojzra]It's also a fact that Scientologists sign multi-billion year contracts. They could be up shit creek due to this breach.[url=http://meincmagazine.com/civis/viewtopic.php?p=28150269#p28150269:ijuojzra said:DarthShiv[/url]":ijuojzra]a hash that can only be cracked in a billion billion years is "enough" for me to not care about brute force. That's also a fact.
![]()
[url=http://meincmagazine.com/civis/viewtopic.php?p=28151223#p28151223:28lp9kmj said:Dolores Haze[/url]":28lp9kmj]Because!
You can't be too careful!
So I registered and then I read this crazy message about hacking!
So what am I like, supposed to do?
I do WHAT THESE GUYS ask! My mother taught me this, before she got killed inn a car accident.
What IS YOUR PROBLEM? Can't I be a little more careful?
And like, wtf is a "centurion"? Are you some sort of two-bit Russell Crowe, stuck in an cheesie online version of "Gladdy-Ate-Her"?
Go jump a kangaaroo, you insensitive outbacher!
I completely agree, and I wasn't having a go at you. I was simply taking advantage of the opportunity to mock the deeply held belief-systems of the lunatic fringe[url=http://meincmagazine.com/civis/viewtopic.php?p=28151297#p28151297:j3yxu1nz said:DarthShiv[/url]":j3yxu1nz]Just pointing out that the fact that anything can be brute forced <> compromised. Brute-forcable doesn't win an argument in encryption. It's a meaningless metric on it's own.[url=http://meincmagazine.com/civis/viewtopic.php?p=28150365#p28150365:j3yxu1nz said:Dark Steve[/url]":j3yxu1nz]It's also a fact that Scientologists sign multi-billion year contracts. They could be up shit creek due to this breach.
![]()
Because that's overkill. A lot of us have strong passwords that we only use on ars. Assuming they crack it, what's the worst that could happen? They gonna log in and comment for me? Besides super strong passwords randomly salted with 2048 iterations is gonna take a while to crack. Meh. Not concerned.[url=http://meincmagazine.com/civis/viewtopic.php?p=28141389#p28141389:ta0g4ctf said:Jensen G[/url]":ta0g4ctf]Why would you only "encourage" readers to change their passwords, instead of forcing a password reset on all accounts to ensure that accounts do not get compromised?
[url=http://meincmagazine.com/civis/viewtopic.php?p=28151767#p28151767:zvvyfxx4 said:WpgGuy[/url]":zvvyfxx4]"It is a bit shocking how many commenters went from "I have seen md5 mentioned in prior articles a few times" to "I am an expert on cryptography and clearly Ars, phpBB, et al. don't know what they're doing and don't take security seriously.""
Don't go blaming readers for the incorrect knowledge transmitted by your articles.
You're not a mass media publication, you've got a technical audience.
You should be transmitting technically correct information in your articles.