The downtime must've mucked something up - my thread just vanished. Was there prior to the downtime. Now it's gone.
Just noticed as well
The downtime must've mucked something up - my thread just vanished. Was there prior to the downtime. Now it's gone.
It's not a PHP problem. It's a poor/dated code problem. PHP is perfectly fine if you write it correctly.
@arn Can I ask - I know you're still on vB 3.x but have you patched it to use a better password hash than MD5 and/or SHA1? I only ask as if you've not people need to know that basically users passwords WILL be retrieved (reversing MD5 and SHA1 strings takes a matter of seconds).
vBulletin 5 has a mobile interface built-in, and it's kind of simian. I mean similar.
Just noticed as well
Seriously, you don't need to lecture me about password hashing and salting - I do it for a livingThere is nothing wrong with using md5 hashes.
Passwords are salted, with a custom seed that can be viewed from only inside the dedicated script page. Google will help you understand what does that mean.
I'm not sure if you realize vBulletin is not some test script written by a hobbyist in 2 minutes on a rainy afternoon.
We're talking about a professional forum platform. The incident happened because some classes with privileges were able to write html directly into an announcement, and a password got stolen.
This needs to be on the front page.
Security through obscurity is... not security.
Seriously, you don't need to lecture me about password hashing and salting - I do it for a living
Whilst you're correct that salting the raw password string before hashing it does add a (moderate) level of security, with MD5 and SHA1 that's nullified by the fact that the strings can be reversed.
As an example lets say you have:
Password: My4ws0meP455W0Rd!
Salt: 5Vu9.<emDF6k$&
You combine it: My4ws0meP455W0Rd!5Vu9.<emDF6k$&
And you then MD5 it to get: 6ff01f01a2b090ce34acf1fbc28d04cd
Now that's in the database as your password.
See the big flaw? You've added no security at all really. Because MD5 and SHA1 take seconds to decode, you can reverse the MD5 hash and you'll get the combined string back. Then because vB stores a raw copy of the salt, all they have to do is strip off that salt string and hey presto, they have your password.
There's a reason nobody uses MD5 or SHA1 anymore.
Modern systems use Bcrypt based hashing, and in some cases combine that with an RSA Public/Private key system or an AES based initialisation vector system - this makes passwords a LOT more secure as there is no way of knowing the vector. Currently it's the strongest method of encryption, and when its done on top of a hashing algorithm will mean an extreme level of security.
You should browse around Stackoverflow at the cryptography guides.
P.S - there is EVERYTHING wrong with using MD5 hashes, you never, ever, ever use MD5 or SHA1 for passwords, no matter how many times you iterate over the string, or how many times you salt it. It will always be possible to decode it very fast.
@arn Can I ask - I know you're still on vB 3.x but have you patched it to use a better password hash than MD5 and/or SHA1? I only ask as if you've not people need to know that basically users passwords WILL be retrieved (reversing MD5 and SHA1 strings takes a matter of seconds).
^^^THIS.
ASAP
Very unprofessional arn.
This needs to be on the front page.
Security through obscurity is... not security.
Rather than update the main age with new news stories, why not halt all publishing and at least give users a heads up about a potential security risk. What good are front page stories if the site is still having issues.We're on the standard hash, which isn't great.
I've slept 2 hours since this started, and we just (10 minutes) ago have gotten the forums stable (I think). There are a lot of fires to put out. We're going as fast as we can, and we are still figuring some stuff out.
arn
We're on the standard hash, which isn't great.
I've slept 2 hours since this started, and we just (10 minutes) ago have gotten the forums stable (I think). There are a lot of fires to put out. We're going as fast as we can, and we are still figuring some stuff out.
arn
I'm gonna sound like a jerk but that's par for me.
The members shouldn't be concerned with how much sleep you got. They should be concerned about their personal security.
It's your company not ours. Unless you wish to send out dividends I'd suggest putting a front page story up so your members know.
/being the ass that had to say it.
I'm gonna sound like a jerk but that's par for me.
The members shouldn't be concerned with how much sleep you got. They should be concerned about their personal security.
It's your company not ours. Unless you wish to send out dividends I'd suggest putting a front page story up so your members know.
/being the ass that had to say it.
1) change your password on MacRumors and
2) make sure you aren't using that password anywhere else. In general, it's best practice to use a unique password everywhere you go.