Explain me how anyone can unconditionally translate a hash to a plain text password? That is, of course you can get a string which maps to the same user's password hash, but you can't determine if that string is effectively the user's password.
For example:
user: macfanboy
pass (not stored in the database): imamacfanboy
md5 hash (stored in the database): 811016fb8de4e4abfdbf84a3a50b38a6
Of course there are ways to crack this and get a string which maps to that hash, but you can't assume that guessed string will effectively be "imamacfanboy" since md5 is not a invertible function. In short, in most cases you can just guess a character sequence that fits a hash but not the user's intended character sequence (the effective password).
This said, hackers will be able to log into other forums which use the same hash function (e.g. md5(md5(...)), but logging into sites that use different hash schemes will be a harder work.
There are other md5 tricks that allow hackers to infer the effective string employed by the user as a password (e.g. using dictionaries) but this is an issue only for single-word, very easy passwords. But easy passwords are an issue no matter what hash is used.
Why isn't this story top of the list?
If the website was compromised and users personal info / passwords taken MacRumors should make it a priority to let everyone know. But now this is just moving down the list like every other story here.
It's more like matching a hash to an input that generates that hash.
If you assume it's not salted, then yeah. However, they are salted, so that's not what's stored in the database.
Well, what you would typically do in the offline brute forcing is using a dictionary combined with some rules (i.e. replace all instances of 'e' with '3' in the input string), then hash the input, then check the table of passwords to see if it matches. If it does, then you know that that was probably that user's plaintext password. While it's theoretically possible that you found a hash collision, the chances are astronomically small and you'd be more likely to stub your toe on a solid gold bar when you're walking to the bathroom.
Well, only if they use the same salt, too. Again, not likely.
Not really. There are programs like oclhashcat, wherein one of the defined rules for generating an input string to hash is combing words, or other input phrases.
I think you will find there are some laws in place that require the site to notify anyone who is affected by this.
Happened to me here until I logged out of here, and then logged back in (don't just change your password; log out after changing password). Upon logging back in, I was asked if I wanted to update my password in keychain.
I think the issue is caused because you don't allow keychain to save the password. Why not? If you don't, people will just use dictionary words.
They are vBulletin's standard md5 hashed and salted.cs02rm0 said:Were passwords hashed, salted, plain text...?
Was very nice, participating in the MacRumor forums. But I do not want to participate, anymore
Bye!
Shouldn't macrumors be held responsible or pay some kind of restitution for punitive damages?
I was going to avoid this, but I decided to use LastPass to change my password. Looks like I won't logging onto MacRumors much in the future in my mobile devices.![]()
Shouldn't macrumors be held responsible or pay some kind of restitution for punitive damages?
But how do I log back in if I don't have my new password? Safari won't let me copy the generated password.
If your life depended on it or was in peril - possibly. Lol
It's a freaking message board. Who gives a crap. You probably have more stuff readily accessible on Facebook and you're worried about a simple password/account you have here that may or may not have been divulged? Ugh.
PRIORITIES!
Example - you live in Queens right?
As I believe you are a fellow Brit mate? Are you not covered under your own country's respective laws with security breaches as opposed to those where the site is hosted?
I'm finding odd behavior on AppShopper.com.
When I go to the MyApps or Wishlist tab it shows me as logged on as another user.
Starting to get worried...
Why weren't the passwords encrypted?
I find it absurd that MacRumors.com moderators spend so much time policing views and ideas -- particularly those critical of Apple, rather than actually spending more time on improving the security of the site.
Maybe the mods and arn as the owner can take a step back and reflect about their lapses.
Encrypting passwords is entry level stuff. Any decent site should have done it already.
And if the article is to be believed, the hack was similar to a previous hack -- so why weren't security measures taken to patch the site? After all, it is not an unknown issue.
why are you worried about where i live ? thats not the point here
As unfortunate as this is, it really speaks as much to vBulletin's poor security (using MD5, albeit a double md5 with salt) as it does MR's decision to use vBulletin (even though it's hard to migrate a massive vBulletin to something else).
I would hope that in light of two high-profile hacks like this that vBulletin consider switching hashing algorithms, at the very least, and I think it would be a straightforward patch to make. phpass these days uses blowfish, then extended des, then md5 only as a last resort.
Someone has already used this password to get into my Steam account. Changed both, but don't know yet what else might be compromised.