Snitz Forums 2000
Snitz Forums 2000
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Snitz Forums 2000 DEV-Group
 DEV Discussions (General)
 security flaw with new forums
 New Topic  Topic Locked
 Printer Friendly
Previous Page | Next Page
Author Previous Topic Topic Next Topic
Page: of 3

Asha
Starting Member

39 Posts

Posted - 05 May 2003 :  20:09:53  Show Profile
Given Snitz's popularity, it seems likely that one day, someone will write a little program to find all the Snitz forums on the web that it can, look up who the admins are, and try a dictionary attack on their passwords. This is a standard kind of attack.

Modifying one forum's source won't address this type of attack.

My main goal was to raise this vulnerability and let the Snitz heavy developers decide what, if anything, to do about it. It seems to me to be unwise to wait until an attack of this kind before doing something about it, but I do not have the same perspective as the Snitz developers, and maybe they see things here that I do not.

So, the situation has been reported, the Snitz developers are aware of it, and they can evaluate it as they see fit. I appreciate their having considered the vulnerability. If other people want to continue the discussion here, that is fine; otherwise, I think I'll move on.
Go to Top of Page

Doug G
Support Moderator

USA
6493 Posts

Posted - 06 May 2003 :  00:29:20  Show Profile
quote:
Modifying one forum's source won't address this type of attack.

I guess there is no hope then ...

======
Doug G
======
Computer history and help at www.dougscode.com
Go to Top of Page

Nikkol
Forum Moderator

USA
6907 Posts

Posted - 06 May 2003 :  00:49:17  Show Profile
lol

Nikkol ~ Help Us Help You | ReadMe | 3.4.03 fixes | security fixes ~
Go to Top of Page

laser
Advanced Member

Australia
3859 Posts

Posted - 06 May 2003 :  01:05:26  Show Profile
Yes, Asha, but any Forum Admin worth their salt would understand enough about "stuff" to NOT fall victim of a dictionary password attack.

All the Snitz code is there, just change it yourself to how you want it to work. Better still ... write a MOD and then everyone can join in the fun
Go to Top of Page

TestMagic
Senior Member

USA
1568 Posts

Posted - 06 May 2003 :  01:29:18  Show Profile  Visit TestMagic's Homepage
Wouldn't it take something like a month of continuous processor power (PIII or so) to crack a password that is not based on dictionary words, not all numbers or letters, contains a _, ., or -, and is more than ten characters long?

Snitz rocks! · Search 2
Go to Top of Page

laser
Advanced Member

Australia
3859 Posts

Posted - 06 May 2003 :  01:45:13  Show Profile
I have written some password-generating code before. I also ran the same code on my new P4, 2.2GHz laptop when I first got it. It was churning out about 27 million passwords/hour. This time includes password authentication, but that didn't take much time in the application I was using at the time.

A proper case-sensitive password with numbers would take years to break.
Go to Top of Page

TestMagic
Senior Member

USA
1568 Posts

Posted - 06 May 2003 :  01:56:14  Show Profile  Visit TestMagic's Homepage
From a theoretical point of view, changing the super admin's login name is simply adding one more hurdle to leap to gain access; i.e., instead of one (the password), there are two. So it would seem logical that if two were better than one, then three would be better than two. And in a sense, the new super admin name would become simply an extension of the password.

I actually like the idea of having a login name different from the screen name, but I don't think my users would. After all, what is there to "steal" in a forum such as this?

Snitz rocks! · Search 2
Go to Top of Page

Gremlin
General Help Moderator

New Zealand
7528 Posts

Posted - 06 May 2003 :  08:34:55  Show Profile  Visit Gremlin's Homepage
quote:
A proper case-sensitive password with numbers would take years to break.
That would have to be quite a lengthy password, though thats a year to search the entire keyspace, it's not improbable that the correct password could be located in the first month or two of searching

To brute-force one average length SHA256 Password 8-10 characters takes a little under a month of time on a single machine of around 2Ghz (trust me I've done it a few times), length of time is obviously dependant on the size of the keyspace (length of password) and the algorithim used to encrypt it for instance MD5 doesnt take anywhere near that long, even a 14 Character NT password doesn't take me much longer than about 1 week now (though I split the work up over 7 machines) ... and before anyone asks why I'm "cracking" NT passwords, I do have a quite legitimate reason.

Kiwihosting.Net - The Forum Hosting Specialists
Go to Top of Page

Davio
Development Team Member

Jamaica
12217 Posts

Posted - 06 May 2003 :  08:48:30  Show Profile
quote:
I do have a quite legitimate reason.
Uh-huh. Suuuuuure you do!

Support Snitz Forums
Go to Top of Page

GauravBhabu
Advanced Member

4288 Posts

Posted - 06 May 2003 :  08:59:33  Show Profile
All Crackers have their reasons

Edited by - GauravBhabu on 06 May 2003 09:05:27
Go to Top of Page

Asha
Starting Member

39 Posts

Posted - 06 May 2003 :  09:17:16  Show Profile
quote:
Originally posted by TestMagic

... I actually like the idea of having a login name different from the screen name, but I don't think my users would. After all, what is there to "steal" in a forum such as this?


All sorts of evil things could happen. It wouldn't be too cool if all the postings at snitz.com disappeared, for example, or if someone started impersonating someone else. If there was nothing bad that could happen, then Snitz wouldn't be set up to use passwords!

If only the admins and moderators had different login names than their display names, then the other users would never even have to think about the display name / login name distinction. Many forum users would not even be aware of the distinction.
Go to Top of Page

Gremlin
General Help Moderator

New Zealand
7528 Posts

Posted - 06 May 2003 :  09:41:10  Show Profile  Visit Gremlin's Homepage
quote:
It wouldn't be too cool if all the postings at snitz.com disappeared
Thats why part of any security regime includes backup and restore procedures.

Kiwihosting.Net - The Forum Hosting Specialists
Go to Top of Page

davemaxwell
Access 2000 Support Moderator

USA
3020 Posts

Posted - 06 May 2003 :  10:51:53  Show Profile  Visit davemaxwell's Homepage  Send davemaxwell an AOL message  Send davemaxwell an ICQ Message  Send davemaxwell a Yahoo! Message
quote:
Originally posted by Asha


If only the admins and moderators had different login names than their display names, then the other users would never even have to think about the display name / login name distinction. Many forum users would not even be aware of the distinction.



Yeah, but then the users would have to learn a new userID/password combo when they are made admins/mods so those forum users would know that then anyways.

IMHO, the only thing we really should do that we aren't doing now is to force users to change their passwords on a regular basis. That would reduce the chances of people stealing passwords and/or sharing them with the world. Those passwords would only be valid for x number of days.

Dave Maxwell
Barbershop Harmony Freak
Go to Top of Page

MasterOfTheCats
Junior Member

103 Posts

Posted - 06 May 2003 :  13:21:16  Show Profile
A better aproach is to force different levels of password complesity. Similar to w2k AD install (min chars, mix of alphanumberic etc).
Go to Top of Page

Doug G
Support Moderator

USA
6493 Posts

Posted - 06 May 2003 :  14:03:17  Show Profile
3 strikes and you're out works well. You can easily add some code that blocks the user's IP for a few minutes to hours after x number of failed login attempts.


======
Doug G
======
Computer history and help at www.dougscode.com
Go to Top of Page
Page: of 3 Previous Topic Topic Next Topic  
Previous Page | Next Page
 New Topic  Topic Locked
 Printer Friendly
Jump To:
Snitz Forums 2000 © 2000-2021 Snitz™ Communications Go To Top Of Page
This page was generated in 0.25 seconds. Powered By: Snitz Forums 2000 Version 3.4.07