![]() |
FlyerTalk Website security
Originally Posted by Middle_Seat
(Post 20553856)
FlyerTalk does not use SSL, and so its cookies are presumably easy to copy and therefore the bad guys can subsequently log into FT as you.
<!-- login form --> <form action="login.php?do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)"> <script type="text/javascript" src="http://ui.ibsrv.net/ibsrv/res/src:www.flyertalk.com/get/forum/clientscript/vbulletin_md5.js?v=376"></script> |
Originally Posted by NameCoin
(Post 20553968)
It seems that FlyerTalk does not encrypt the login process either. Although the password hash is sent instead of the actual password, the function used is MD5 and there isn't any salting. This setup seems especially weak these days. I suppose an attacker could sniff the hash out of the open network and attempt some kind of dictionary attack against it, straight-out compromising the FT account and possibly others, if the password has been reused.
|
Originally Posted by Zarf4
(Post 20564209)
NameCoin is exactly right. These days MD5 are extraordinarily vulnerable to dictionary attacks especially since RockYou.com was hacked and 32+ million actual user passwords were made public. This dictionary is the gold standard and has allowed script kiddies to be credible hackers. Agree with others that FlyerTalk logins are a low value target, but salting the passwords is a relatively trivial task which would greatly improve the security.
|
> I'll suggest this to the board admins and we'll see what they say.
We're all going to learn something important about the technical chops of the board admins. |
I moved these posts to their own thread, and will now move it to the Board Technical issues forum. In looking at the JavaScript that FT uses to hash passwords for login (and beautifying it to make it readable), we get:
Code:
var hexcase = 0;
Originally Posted by IBxAnders
1) FT does not currently store very valuable private information that requires SSL; we don't collect medical or credit card data. SSL may be a good practice - but, perhaps an overkill. There are very few SSL'ed vBulletin sites.
2) Unsalted hash? Passwords are salted and encrypted well. Even if you received a copy of the database, decryption of the password field would be very difficult, although as with anything - not impossible. |
Sorry to revive a dead post. I forgot about this.
My original comment was actually to point out the fact that on the client side, the FlyerTalk forum does not do anything too sophisticated to login information. Here is an example: I tried to login as user "username" whose password is "thepassword". This is information from a packet I sniffed out: vb_login_username=username&vb_login_password=&vb_l ogin_password_text=Password&s=&securitytoken=guest &do=login&vb_login_md5password=3c41ff681c1e3dcb68b 4d8573bf1c74c&vb_login_md5password_utf=3c41ff681c1 e3dcb68b4d8573bf1c74c --------- I think that my post at the very top was taken in the context of the security of financial information over an open wireless internet connection. While it can be secure, my point was that usage of less sensitive sites (like FlyerTalk) can create a side security issue for people who reuse login information. |
Originally Posted by NameCoin
(Post 20627581)
Sorry to revive a dead post. I forgot about this.
My original comment was actually to point out the fact that on the client side, the FlyerTalk forum does not do anything too sophisticated to login information. Here is an example: I tried to login as user "username" whose password is "thepassword". This is information from a packet I sniffed out: You can clearly see that I tried to login as "username". Now, instead of seeing the password in the clear, you see its MD5 hash: "3c41ff681c1e3dcb68b4d8573bf1c74c". The problem is that MD5 has been pretty well-studied and is considered to be very weak (e.g. collision attacks, pre-image attacks, etc...). There are also loads of lookup tables. In this example, you can go to http://www.md5-lookup.com/ and put in the hash mentioned above. It returns "thepassword" as the original string. --------- I think that my post at the very top was taken in the context of the security of financial information over an open wireless internet connection. While it can be secure, my point was that usage of less sensitive sites (like FlyerTalk) can create a side security issue for people who reuse login information. Fortunately, I almost never need to actually "log in" to FlyerTalk, as I am on FT frequently enough that my login session never times out. (I assume my password isn't being stored in a cookie somewhere and transmitted occasionally but rather some session ID is stored that--while it possibly could be spoofed to gain access to my FT account--won't compromise my actual password.) IB, what are you going to do about this? |
Originally Posted by jackal
(Post 20788909)
That's actually pretty scary.
Fortunately, I almost never need to actually "log in" to FlyerTalk, as I am on FT frequently enough that my login session never times out. (I assume my password isn't being stored in a cookie somewhere and transmitted occasionally but rather some session ID is stored that--while it possibly could be spoofed to gain access to my FT account--won't compromise my actual password.) IB, what are you going to do about this? http://www.flyertalk.com/forum/20564390-post1607.html Short answer: logins are secure. |
Originally Posted by IBobi
(Post 20790159)
Answered here on 4/9:
http://www.flyertalk.com/forum/20564390-post1607.html Short answer: logins are secure. You're talking about salting the database the passwords are stored in on your servers. NameCoin is talking about the hash of the password as it is sent from our browsers to your servers during the login process--and he proved that it was easily broken. |
Originally Posted by jackal
(Post 20790264)
Different issue.
You're talking about salting the database the passwords are stored in on your servers. NameCoin is talking about the hash of the password as it is sent from our browsers to your servers during the login process--and he proved that it was easily broken. We are not currently planning on putting the entire site behind an HTTPS proxy, nor re-writing core vBulletin components for additional encryption. While the perceived threat is real if some conditions are met, the use-case is not direct and I do not think presents a danger. |
Originally Posted by IBxAnders
(Post 20790363)
If you are on a network that has been compromised and packets are actively being sniffed - then yes, a hacker can absolutely intercept and decode a password, not only for Flyertalk - but almost every forum and other web app.
We are not currently planning on putting the entire site behind an HTTPS proxy, nor re-writing core vBulletin components for additional encryption. While the perceived threat is real if some conditions are met, the use-case is not direct and I do not think presents a danger. It is extremely dangerous for you to tell people "don't worry, that coffee shop network you're using is probably secure." You should never assume that. Always treat browsing the Internet in a public place as if someone is looking over your shoulder at all times. I think you need to have a serious talk with your product people and rethink your entire company's approach to security. The lackadaisical attitude I'm seeing towards it is not very comforting to me. |
Originally Posted by jackal
(Post 20790910)
Most every other site that asks me to submit a password has at least an encrypted login screen (if the entire site isn't encrypted), whether it's banking, email, or even Facebook. I'm hard-pressed to think of another site I use with any regularity that presents a possible threat of sniffing my password in [almost] clear-text.
It is extremely dangerous for you to tell people "don't worry, that coffee shop network you're using is probably secure." You should never assume that. Always treat browsing the Internet in a public place as if someone is looking over your shoulder at all times. I think you need to have a serious talk with your product people and rethink your entire company's approach to security. The lackadaisical attitude I'm seeing towards it is not very comforting to me. - We will evaluate the improvement request, it's a valid request. - This is not an emergency: this is an improvement request to prevent a potential vector if your network is already compromised. |
Originally Posted by IBxAnders
(Post 20791090)
This is not an emergency: this is an improvement request to prevent a potential vector if your network is already compromised.
--Posted from a public wifi spot in Panama City, Panama and hoping my account remains secure |
Quick update on this request:
HTTPS / SSL is now available on Flyertalk. It is not yet made a default choice for all users, but those that wish to use the secure version may do so by manually requesting the forum via https instead of http. Global mandatory rollout requires additional time due to obvious use-cases where we need to rebuild several components needed to support SSL. But again - those that would like to use the SSL version, may do so via manually altering the URL (once) to HTTPS instead of HTTP. For example: https://www.flyertalk.com/forum/tech...-security.html Thank you |
Originally Posted by IBxAnders
(Post 20916792)
Quick update on this request:
HTTPS / SSL is now available on Flyertalk. It is not yet made a default choice for all users, but those that wish to use the secure version may do so by manually requesting the forum via https instead of http. Global mandatory rollout requires additional time due to obvious use-cases where we need to rebuild several components needed to support SSL. But again - those that would like to use the SSL version, may do so via manually altering the URL (once) to HTTPS instead of HTTP. For example: https://www.flyertalk.com/forum/tech...-security.html Thank you I look forward to being able to turn it on globally, but for now, when I am in a public place, I will use the secure login page and rest much easier using FT. :) |
| All times are GMT -6. The time now is 1:31 am. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.