lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 14 Oct 2010 09:41:18 +1100
From: silky <michaelslists@...il.com>
To: Mutiny <mutiny@...inbeardsucks.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Filezilla's silent caching of user's
	credentials

On Wed, Oct 13, 2010 at 2:33 PM, Mutiny <mutiny@...inbeardsucks.com> wrote:
> The issue is that someone gained access to that file.  You sharing your
> drives over the internet with read privileges?  You have other
> vulnerable software being leveraged to read that file?  Would you prefer
> they MD5'd it?  It sounds like your issue is that your password is
> stored.  I mean, they moved your encrypted password from passwd to
> shadow for a reason, but that doesn't change the fact that it's stored
> and if someone doesn't need access to shadow or passwd, they shouldn't
> have it.
>
> Stop logging into your FTP server from a public terminal with Filezilla.

Rubbish.

The passwords should be encoded so-as to avoid trivial searching. End
of story. It takes 10 minutes to do from a development point of view,
and there is no excuse.

-- 
silky

http://dnoondt.wordpress.com/

"Every morning when I wake up, I experience an exquisite joy — the joy
of being this signature."

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ