The pedantry in some of the comments have me practically smashing my head into my desk. The semantic arguments about whether the actual password storage mechanism is encrypted, encoded, etc, are wholly irrelevant.
If a web site can sent you a "I forgot my password" reminder email which includes your plaintext password then the site operator is storing the password in a plaintext-equivalent format. If the password is stored as a plaintext-equivalent then attackers can steal your plaintext password when they "own" the site.
To address the encryption pedantry: If a site is using encryption to store the password but the key to decrypt the password is available in the site's servers then, arguably, the encryption just amounts to an encoding. Symmetric encryption requires that the key be kept secret. Keeping the key on the servers means that it's not secret and means that it's not really encryption.
Edit:
I see that the discussion is heading this way so I'll head it off at the pass: I would argue that there is no reason that any site operator ever needs the plaintext of a user's password to be stored persistently for any reason. There is no valid reason passwords should be stored in a reversible manner.
(Somebody is going to bring up storing credit card numbers with symmetric encryption, too. That's a broken system and, arguably, needs to be replaced with something based on asymmetric encryption instead of "secret numbers" that we have to transmit between quasi-trusted parties.)
Devil's advocate: why is it pedantry to ask for security alarms to be precise? We ask for e.g. the TSA to be precise about what it needs, should not computer security professionals be held to the same bar? Making bogus claims about a system's vulnerability (be it shoes at airports or passwords) damages the credibility of the next security alarm.
Note: I'm not defending the practice of sending passwords in the clear. But I don't think it's too much to ask for security professionals to make precise claims, when doing so is a 5-second op.
Don't smash your head. :-) Issues of authentication are inherently difficult for us humans to think about. Look at an issue one way and it's obvious, from a slightly different perspective it's extremely subtle.
Omer here, one of the two guys behind this website. I'd like to thank the Hacker News community, who are in part the reason for our site's popularity.
Thanks, everyone. Please keep spreading the word! :)
I wonder how they can be sure that a website stores their website in plain text? Just because a website sends an email confirmation with the password doesn't mean they store it in plain text. The developer could just send the email before hashing the password.
Not saying it's a good practice to send the password by email but it seems the website stretches the truth a bit.
The majority of the items on the website are password reminder emails. This is after the initial sign up, which means the do indeed store it in plain text.
You're entirely correct; an outsider cannot determine whether a password is stored in encrypted format or not.
I agree that sending passwords by email is a bad idea, but I also believe that the folks behind this site should learn what it means to say "website storing a password in plain text" (from their about page). They're right, but for the wrong reasons.
Sending passwords in plain-text over email is bad enough in itself, and it also tells a lot about how they think about plain-text passwords in general.
Apparently, George Mason University is still on the list... two years after I sent them multiple emails and phone calls complaining about such a big security issue. It's kind of sad that you can't even depend on educational institutions to follow the security guidelines they probably teach to hundreds of students (even if that part of their website was done by a contractor).
My site would fall under this and I use two layer sha-2 512 keys with unique salts... just because I send you one email does not mean I know your password (and for that matter somehow you have to be given an initial password in a lot of systems)
I'm unclear what you mean when you say "and I use two layer sha-2 512 keys with unique salts".
The Plain-Text Offenders site is concerned with web sites that can email you back your original password in plain text. Personally, I'd be most concerned when these emails are in response to an "I forgot my password" request. (Initial registration emails that send you back your plaintext password are dumb, but don't necessarily indicate that the site operator can reconstruct your plaintext password.)
If you are physically incapable of reconstructing the user's plaintext password and emailing it back to them then I'd say you're in good shape. If you have enough information to reconstruct the plaintext password then you're doing it wrong.
Does that mean that if/when an attacker uses a SQL injection vulnerability to obtain the contents of your database, will he then have a password equivalent that allows him to login as the users?
Will it enable him to mount brute-force attacks against the users' plaintext passwords?
[+] [-] EvanAnderson|13 years ago|reply
If a web site can sent you a "I forgot my password" reminder email which includes your plaintext password then the site operator is storing the password in a plaintext-equivalent format. If the password is stored as a plaintext-equivalent then attackers can steal your plaintext password when they "own" the site.
To address the encryption pedantry: If a site is using encryption to store the password but the key to decrypt the password is available in the site's servers then, arguably, the encryption just amounts to an encoding. Symmetric encryption requires that the key be kept secret. Keeping the key on the servers means that it's not secret and means that it's not really encryption.
Edit:
I see that the discussion is heading this way so I'll head it off at the pass: I would argue that there is no reason that any site operator ever needs the plaintext of a user's password to be stored persistently for any reason. There is no valid reason passwords should be stored in a reversible manner.
(Somebody is going to bring up storing credit card numbers with symmetric encryption, too. That's a broken system and, arguably, needs to be replaced with something based on asymmetric encryption instead of "secret numbers" that we have to transmit between quasi-trusted parties.)
[+] [-] runako|13 years ago|reply
Devil's advocate: why is it pedantry to ask for security alarms to be precise? We ask for e.g. the TSA to be precise about what it needs, should not computer security professionals be held to the same bar? Making bogus claims about a system's vulnerability (be it shoes at airports or passwords) damages the credibility of the next security alarm.
Note: I'm not defending the practice of sending passwords in the clear. But I don't think it's too much to ask for security professionals to make precise claims, when doing so is a 5-second op.
[+] [-] marshray|13 years ago|reply
[+] [-] omervk|13 years ago|reply
[+] [-] marshray|13 years ago|reply
How do you determine by external observation that a site's password handling is sufficiently bad to merit the Plain Text Offender title?
[+] [-] laurent123456|13 years ago|reply
Not saying it's a good practice to send the password by email but it seems the website stretches the truth a bit.
[+] [-] conroy|13 years ago|reply
[+] [-] runako|13 years ago|reply
I agree that sending passwords by email is a bad idea, but I also believe that the folks behind this site should learn what it means to say "website storing a password in plain text" (from their about page). They're right, but for the wrong reasons.
[+] [-] _ikke_|13 years ago|reply
[+] [-] martin-adams|13 years ago|reply
[+] [-] icebraining|13 years ago|reply
[+] [-] hmemcpy|13 years ago|reply
[+] [-] shitlord|13 years ago|reply
[+] [-] jayzalowitz|13 years ago|reply
[+] [-] EvanAnderson|13 years ago|reply
The Plain-Text Offenders site is concerned with web sites that can email you back your original password in plain text. Personally, I'd be most concerned when these emails are in response to an "I forgot my password" request. (Initial registration emails that send you back your plaintext password are dumb, but don't necessarily indicate that the site operator can reconstruct your plaintext password.)
If you are physically incapable of reconstructing the user's plaintext password and emailing it back to them then I'd say you're in good shape. If you have enough information to reconstruct the plaintext password then you're doing it wrong.
[+] [-] marshray|13 years ago|reply
Will it enable him to mount brute-force attacks against the users' plaintext passwords?
[+] [-] omervk|13 years ago|reply
And why use a custom scheme when there's quite a few very good methods like bcrypt et al that we mention on the website?
[+] [-] unknown|13 years ago|reply
[deleted]