(no title)
eksith | 11 years ago
The McGill Password length has also been increased from exactly eight
characters to a variable length of eight to 18 characters.
So they're not using bcrypt (usable length 72). Even PBKDF2 would have been acceptable, but my guess is that they were sold a "layer over" on their stack with this. I can already tell this is a hacky patch. Every year, about 1,200 to 1,500 McGill accounts are compromised in
one way or another.
Phishing + guessing. I know someone who gets about 2-3 emails a week asking to enter their login info into some site in Brazil or the Czech Republic.If every site properly salted and hashed passwords, reuse isn't even a problem. But as we know :
- Most people choose crappy passwords.
- Most sites use crappy hashing schemes (if they hash at all)
When other sites are compromised, there's an easy list of ready passwords to try against other potential targets.McGill's problem isn't Heartbleed.
danudey|11 years ago
eksith|11 years ago
cgriswald|11 years ago
andrewstuart2|11 years ago
It bothers me less now that I use a good password generator/safe, but still bothers me nonetheless.
jschwartzi|11 years ago
Why on earth would you ever need to truncate a username?
fabulist|11 years ago
I think it probably has something to do with this.
https://www.mcgill.ca/it/channels/news/email-subject-interna...
eksith|11 years ago
http://www.mcgill.ca/it/news/phishing-attack-mcgill-email-11...
baby|11 years ago
Bcrypt is not the ONLY secure solution to securely store passwords (contrarily to what everyone is trying to tell you). See Thomas Pornin's answer on SO:
http://stackoverflow.com/questions/2772014/is-sha-1-secure-f...